Answer:
Attackers can use ROP to bypass non-executable stack protections by chaining together existing code snippets (gadgets) that are part of executable memory, avoiding the need to inject new code.
Attackers can use ROP to bypass non-executable stack protections by chaining together existing code snippets (gadgets) that are part of executable memory, avoiding the need to inject new code.
You may be interested in:
Web Security MCQs