Data Execution Prevention

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 ธ.ค. 2024

ความคิดเห็น • 24

  • @GuentherJongeling-hu6oe
    @GuentherJongeling-hu6oe ปีที่แล้ว +2

    Small correction: As far as I know, JIT compilation is possible (and even done) in a way where the memory isn't writable and executable at the same time, but first writable and then (after JIT compilation) readable and executable.

  • @yeayea8448
    @yeayea8448 2 ปีที่แล้ว +2

    Glad I found this channel, hope you will make more videos in the future!

  • @gabrijel9129
    @gabrijel9129 8 หลายเดือนก่อน

    Incredible video! You just explained a difficult topic in minutes. Amazing work!

  • @themistoclesnelson2163
    @themistoclesnelson2163 3 ปีที่แล้ว +6

    This was helpful. Thanks!

  • @deepBlueHaze117
    @deepBlueHaze117 2 ปีที่แล้ว

    Great video! This channel really deserves more views

  • @jimmyryan5880
    @jimmyryan5880 2 หลายเดือนก่อน

    Great explanation

  • @miguellopes7651
    @miguellopes7651 3 ปีที่แล้ว +2

    Thank you. Really good explanation!

  • @adohalim9385
    @adohalim9385 10 หลายเดือนก่อน

    It is very nice channel, respect for your work.

  • @brianchang1617
    @brianchang1617 2 ปีที่แล้ว

    your videos are so great miss you lots hope SF has been fannnTASTIC!

  • @blaz2892
    @blaz2892 6 หลายเดือนก่อน

    It makes sense to me that data would be executable by default. Code is just another form of data (assembly opcodes are just numbers after all). Unless you dedicate memory or circuitry to it, the only obvious way to know whether a program is reading code or data is by essentially setting some kind of flag in the program and update it whenever a program starts or ends - to keep track of whether the program saw a "start of executable section" or "end of execution" section. It would be expensive to check every single byte between the current and target locations before executing a jump, so all we can do is put it in the normal program code. Its unsurprising that an exploit that alters program control can be used to skip over part of the program control process.

  • @Redrios
    @Redrios 3 ปีที่แล้ว

    thank you! this is the only short vid for us lay people, concise and friendly

  • @שמיניתשעטצביהאשקלון
    @שמיניתשעטצביהאשקלון 4 หลายเดือนก่อน

    thank you!! you just save my exam tomorrow!!!

  • @gameruify
    @gameruify 10 หลายเดือนก่อน

    Cheers for explaining DEP from a historical standpoint. No one talks about the stack being executable in 2024, so I was pretty confused as to what DEP was doing when only .text has execution rights anyway.

  • @vladislavkaras491
    @vladislavkaras491 ปีที่แล้ว

    Really great video!
    Thank you!

  • @LorenzoMarkovian
    @LorenzoMarkovian 2 ปีที่แล้ว

    Excellent content, please make more

  • @maximusmadman
    @maximusmadman ปีที่แล้ว +1

    no way man youre covering all the topics I wanna know about legend

  • @SimonVideo
    @SimonVideo 3 ปีที่แล้ว +1

    I really like the animation! Keep up the good work.

  • @mariafailli5558
    @mariafailli5558 ปีที่แล้ว

    that was very clear, thank you. Would be cool to see a video from you on ROP

  • @titomarifrancis
    @titomarifrancis 2 ปีที่แล้ว

    in OpenBSD, I think this is the W^X feature where a memory location is exclusively either writable or executable, so once a memory location is writable, it will never be executable

  • @zigaudrey
    @zigaudrey 3 ปีที่แล้ว

    Difficult to understand. I found this term while looking for correcting a solution on GIMP. If you open the picture on both GIMP and a photo viewer program, GIMP will crash.
    It says that DEP may be the cause. I don't wanted to upgrade to W10 right now. I wonder why this will be linked because picture can't trigger the buffer (except if a code was injected on the meta data with cmd prompt)

  • @TheDarkBusinessman
    @TheDarkBusinessman 8 หลายเดือนก่อน

    Stack execution was used back in the day for self modifying code which is seen as bad nowadays.

  • @alexanderyelich817
    @alexanderyelich817 2 ปีที่แล้ว

    THANK YOU!

  • @Miles-co5xm
    @Miles-co5xm 2 ปีที่แล้ว

    bro please make more videooosssssssssss