This topic consists of 3 sessions:
- BROP Principle - dump memory to attacker and do exploit
- BROP Practice1 - attack conduct
- BROP Practice2 - code analysis
The principle of BROP can be found in the 1st session and the real attack exploit can be found in the 2nd session, and in this page I would like to write a code analysis blog which shows how I understand the code of the attack.