<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>PE &#8211; NTCore</title>
	<atom:link href="https://ntcore.com/tag/pe/feed/" rel="self" type="application/rss+xml" />
	<link>https://ntcore.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2009 22:38:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://ntcore.com/wp-content/uploads/2018/07/cropped-ntcore_icon-2-32x32.png</url>
	<title>PE &#8211; NTCore</title>
	<link>https://ntcore.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">184274875</site>	<item>
		<title>Data Execution Prevention (NX) flag</title>
		<link>https://ntcore.com/data-execution-prevention-nx-flag/</link>
					<comments>https://ntcore.com/data-execution-prevention-nx-flag/#respond</comments>
		
		<dc:creator><![CDATA[Erik Pistelli]]></dc:creator>
		<pubDate>Fri, 10 Apr 2009 22:38:47 +0000</pubDate>
				<category><![CDATA[Update]]></category>
		<category><![CDATA[CFF Explorer]]></category>
		<category><![CDATA[PE]]></category>
		<guid isPermaLink="false">http://rcecafe.net/?p=85</guid>

					<description><![CDATA[As you probably know the DEP (Data Execution Prevention) was introduced in XPSP2 and it prevents code to be executed from data sections. Let&#8217;s consider this code snippet: [cc lang=&#8221;cpp&#8221;]unsigned char b = 0xC3; // ret int _tmain(int argc, _TCHAR* argv[]) { void *addr = &#038;b; __asm call addr; getchar(); return 0; }[/cc] This code &#8230; <a href="https://ntcore.com/data-execution-prevention-nx-flag/" class="more-link">Continue reading<span class="screen-reader-text"> "Data Execution Prevention (NX) flag"</span></a>]]></description>
										<content:encoded><![CDATA[<p>As you probably know the DEP (Data Execution Prevention) was introduced in XPSP2 and it prevents code to be executed from data sections.</p>
<p>Let&#8217;s consider this code snippet:</p>
<p>[cc lang=&#8221;cpp&#8221;]unsigned char b = 0xC3; // ret</p>
<p>int _tmain(int argc, _TCHAR* argv[])<br />
{<br />
	void *addr = &b;<br />
	__asm call addr;<br />
	getchar();<br />
	return 0;<br />
}[/cc]</p>
<p>This code sample will crash if the DEP is enabled. DEP is a very important security improvement against buffer overlow exploits, but it might be generate incompatibility with older applications which rely on executing code inside the data section.</p>
<p>The DEP can be disabled individually for an executable. The only thing which needs to be done is to unset the &#8220;NX Compatibility&#8221; flag inside &#8220;Optional Header -> Characteristics&#8221;.</p>
<p>Make sure to have the latest CFF Explorer release. I also updated the flags of the &#8220;Characteristics&#8221; field, because they were outdated. Among the new flags there is the ASLR flag (DLL can move), which enables the executable to be relocated at a random (256 possibilities) address if it contains a relocation table.</p>
<p>Both the ASLR and the DEP flag are enabled by default in Visual C++.</p>
<p>Another flag is the &#8220;Code Integrity&#8221; one. This flag when set checks the digital signature of the executable and runs it only if the signature is correct.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ntcore.com/data-execution-prevention-nx-flag/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">85</post-id>	</item>
	</channel>
</rss>
