description |
---|
08/22/2023 |
Also known as Data Execution Prevention (DEP) when working in a Microsoft Windows environment.
On Unix-based systems, it is known as NX.
This helps protect against malicious shellcode.
It focuses on making areas of the program as not executable. Your data will be stored as data and any attempt to run it as instructions will crash the program through segmentation fault and eliminate your shellcode.
A common bypass to binaries protected with NX is the ret2libc attack.
{% embed url="https://ir0nstone.gitbook.io/notes/types/stack/no-execute" %}
{% content-ref url="../ret2libc/" %} ret2libc {% endcontent-ref %}