I\'m writing a test webpage which calls into a function in a DLL file. But every time before i use IE or FF to open it i have to disable DEP(Data Execution Prevention) or the sc
You can't disable it for a given process after it's enabled, but SetProcessDEPPolicy might help.
If you need to disable it for during boot, you'd have to set the nx
boot entry with BCDEdit /set
.
Buffer overflow exploits for windows will often call SetProcessDEPPolicy()
after they have gained control of the instruction pointer(EIP). This step is used to make shellcode executable.
In linux, you can use the compiler flag "-z execstack"