Incredible video! You just explained a difficult topic in minutes. Amazing work!
@themistoclesnelson2163
3 жыл бұрын
This was helpful. Thanks!
@adohalim9385
6 ай бұрын
It is very nice channel, respect for your work.
@yeayea8448
2 жыл бұрын
Glad I found this channel, hope you will make more videos in the future!
@GuentherJongeling-hu6oe
Жыл бұрын
Small correction: As far as I know, JIT compilation is possible (and even done) in a way where the memory isn't writable and executable at the same time, but first writable and then (after JIT compilation) readable and executable.
@miguellopes7651
2 жыл бұрын
Thank you. Really good explanation!
@pegasuso1743
2 жыл бұрын
Great video! This channel really deserves more views
@user-rv8iz3yq6u
Ай бұрын
thank you!! you just save my exam tomorrow!!!
@gameruify
7 ай бұрын
Cheers for explaining DEP from a historical standpoint. No one talks about the stack being executable in 2024, so I was pretty confused as to what DEP was doing when only .text has execution rights anyway.
@Redrios
2 жыл бұрын
thank you! this is the only short vid for us lay people, concise and friendly
@brianchang1617
Жыл бұрын
your videos are so great miss you lots hope SF has been fannnTASTIC!
@SimonVideo
3 жыл бұрын
I really like the animation! Keep up the good work.
@aaronyoo9490
3 жыл бұрын
Thanks, will do!
@blaz2892
2 ай бұрын
It makes sense to me that data would be executable by default. Code is just another form of data (assembly opcodes are just numbers after all). Unless you dedicate memory or circuitry to it, the only obvious way to know whether a program is reading code or data is by essentially setting some kind of flag in the program and update it whenever a program starts or ends - to keep track of whether the program saw a "start of executable section" or "end of execution" section. It would be expensive to check every single byte between the current and target locations before executing a jump, so all we can do is put it in the normal program code. Its unsurprising that an exploit that alters program control can be used to skip over part of the program control process.
@maximusmadman
Жыл бұрын
no way man youre covering all the topics I wanna know about legend
@vladislavkaras491
9 ай бұрын
Really great video! Thank you!
@LorenzoMarkovian
Жыл бұрын
Excellent content, please make more
@mariafailli5558
Жыл бұрын
that was very clear, thank you. Would be cool to see a video from you on ROP
@TheDarkBusinessman
4 ай бұрын
Stack execution was used back in the day for self modifying code which is seen as bad nowadays.
@titomarifrancis
2 жыл бұрын
in OpenBSD, I think this is the W^X feature where a memory location is exclusively either writable or executable, so once a memory location is writable, it will never be executable
@alexanderyelich817
2 жыл бұрын
THANK YOU!
@zigaudrey
3 жыл бұрын
Difficult to understand. I found this term while looking for correcting a solution on GIMP. If you open the picture on both GIMP and a photo viewer program, GIMP will crash. It says that DEP may be the cause. I don't wanted to upgrade to W10 right now. I wonder why this will be linked because picture can't trigger the buffer (except if a code was injected on the meta data with cmd prompt)
Пікірлер: 23