just in the Google search this article, it is intended to translate it, it is not clear whether anyone in the country has been translated. The author is the winner of Pwn2Own 2010 from Pitt Villegdenchier of the Netherlands (Peter Vreugdenhil). Pwn2Own, 2010, was the first public appearance tobreak the IE browser protected by the ASLR +DEP, so I was more concerned about it. Of course, for now (2016), these are already the standard of exploit. So it was an archaeological translation.
I decided to write a technical article about the IE8 browser that I hacked with DEP and ASLR protection under Windows7.
The entire utilization process is divided into two major steps
The first step is to find the load base address of a certain DLL file, and then in the second step use the information in the first step to use some ret2libc techniques to bypass DEP, then hijack the process to execute shellcode.
"Archaeological Translation" Pwn2Own Windows 7 Internet Explorer 8 exploit