Articles Blog | G5 Cyber Security

Research – no-nx.pdf

x86-64 buffer overflow exploits and the borrowed code chunk exploitation technique. Whitepaper describing NX technology and its limitations. It contains in depth discussion and sample code for the Hammer/Linux platform, analyzes the weaknesses and discusses countermeasures.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/40442/no-nx.pdf

Source: https://packetstormsecurity.com/files/40442/no-nx.pdf.html

Exit mobile version