Nmap Development mailing list archives

Enabling DEP and ASLR on Nmap for Windows


From: Nomen Nescio <nobody () dizum com>
Date: Tue, 13 Jul 2010 15:56:49 +0200 (CEST)

Hi Fyodor,

I read your post on http://seclists.org/nmap-dev/2010/q3/12
about Enabling DEP and ASLR on Nmap for Windows.

A very easy way to check the results from setting this protection is to use the Enhanced Mitigation Evaluation Toolkit 
(EMET) without recompiling the program with a special compiler flag. I run it on one Windows machine with several 
programs for nearly a year without any problems.
I check always with http://www.erratasec.com/lookingglass.html if DEP and ALSR are set and if not I enable it in EMET.
I run nmap since your post as well with EMET and had no 

Here are a few urls with more details
http://www.h-online.com/news/item/Free-tool-from-Microsoft-hardens-programs-against-attack-843914.html
http://blogs.technet.com/srd/archive/2009/10/27/announcing-the-release-of-the-enhanced-mitigation-evaluation-toolkit.asp
http://www.microsoft.com/downloads/details.aspx?FamilyID=4a2346ac-b772-4d40-a750-9046542f343d&displaylang=en
http://isc.sans.edu/diary.html?storyid=7513

Regards
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: