Skip to navigation Skip to main content Skip to footer

Our Research

Cyber security research from our global team of experts.

Download our 2024 Annual Research Report

Download

Filter content

Reset filters

Defeating Windows DEP With A Custom ROP Chain

Overview This article explains how to write a custom ROP (Return Oriented Programming) chain to bypass Data Execution Prevention (DEP) on a Windows 10 system. DEP makes certain parts of memory (e.g., the stack) used by an application non-executable. This means that overwriting EIP with a “JMP ESP” (or similar) instruction and then freely executing […]