On 26/03/13 16:45, Javier Juan Martínez Cabezón wrote:
> On 26/03/13 16:11, "Tóth Attila" wrote:
> 
>>
>> I wonder how these ROP techniques can theoretically perform in a
>> java virtual machine? What are the possbile target vectors for
>> Python or Ruby? What about JIT code?
> 
> http://www.grant-olson.net/python/pyasm
I'm not sure if I understood you wrongly, do you want mean how can
someone do ROP in python? or how a python script could be objetive of a
ROP attack?

Python is linked against libc too, and finally it finish being executed
in machine (assembler) code, the main difference is that C for example
needs compilation, python scripts "are compiled" on the fly.

Reply via email to