In this section, we will look at the most critical components required for exploitation. We will discuss a wide variety of registers supported in different architectures. We will also discuss the Extended Instruction Pointer (EIP) and Extended Stack Pointer (ESP), and their importance in writing exploits. We will also look at No Operation (NOP) and Jump (JMP) instructions and their significance in writing exploits for various software.
The absolute basics of exploitation
The basics
Let's cover the basics that are necessary when learning about exploit writing.
The following terms are based on the hardware, software, and security perspectives in exploit development:
- Register: This is an area on the processor used to store information...