Using Data Execution Prevention (DEP) in Windows XP and Vista:Fighting back against buffer overflows and memory corruption(Hacking Illustrated Series InfoSec Tutorial Videos)
Using Data Execution Prevention (DEP) in Windows XP and Vista
Fighting back against buffer overflows and memory corruption
I've recently become interested in measures that modern CPUs can take to prevent various types of memory corruption attacks. One such feature is the NX bit (as AMD calls it, XD is Intel's term), which allows for memory pages to me marked as not executable. Microsoft Windows started using this ability with XP SP2 as part of their Data Execution Prevention (DEP) feature. Unfortunately, to get most out of DEP you have to configure it. This video will show how to configure DEP protection in Windows XP and Vista.
If the embedded video below does not show RIGHT click here to save the file to your hard drive.
Printable version of this article