-
Assume that we detected a buffer overflow vulnerability, but we don’t have enough space on the stack for our shellcode or the binary’s stack is marked as not-executable (DEP enabled). Then we can try to call a common library which is also loaded (wie the plt). Walkthrough of a ret2lib attack Before we start, disable ASLR as…