Editing HENkaku
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 54: | Line 54: | ||
=== ROP === | === ROP === | ||
In early 2012, the first ROP exploit was achieved through the [[Web Browser]]. Memory dumps of the browser were obtained through a disclosed WebKit vulnerability that was not patched because Sony did not use the most up-to-date WebKit version. The same vulnerability allowed ROP code execution. [[ROPTool]] was written to make creation and testing of ROP payloads easy. | In early 2012, the first ROP exploit was achieved through the [[Web Browser]]. Memory dumps of the browser were obtained through a disclosed WebKit vulnerability that was not patched because Sony did not use the most up-to-date WebKit version. The same vulnerability allowed allowed ROP code execution. [[ROPTool]] was written to make creation and testing of ROP payloads easy. | ||
=== PSP === | === PSP === | ||
Line 94: | Line 94: | ||
[http://www.customprotocol.com/forum/ps-vita/ Custom Protocol] | [http://www.customprotocol.com/forum/ps-vita/ Custom Protocol] | ||