Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

A common exploit technique is to use what’s called “Return Oriented Programming” to jump to different locations throughout the file to trigger little “ROP gadget” instruction combos to accomplish what you need to do.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: