From 54084d448d7bd4eb76cb31729084183fcb5721e3 Mon Sep 17 00:00:00 2001 From: Tarcisio Fischer Date: Mon, 20 Oct 2025 10:42:04 +0100 Subject: [PATCH] Fix rop reference --- book.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/book.md b/book.md index db3505d..acb769e 100644 --- a/book.md +++ b/book.md @@ -342,7 +342,7 @@ Some examples of how the attacker may use the obtained primitives: * Leak information, such as pointers to specific data structures or code, or the stack pointer. -* Overwrite the stack contents, e.g. to perform a [ROP attack](#rop). +* Overwrite the stack contents, e.g. to perform a [ROP attack](#return-oriented-programming). * Overwrite non-control data, e.g. authorization state. Sometimes this step is sufficient to achieve the attacker's goal, bypassing the need for arbitrary code execution.