In this webcast we will take a look at utilizing Return Oriented Programming (ROP) to disable Data Execution Prevention (DEP) on Windows 10. On modern operating systems an attacker has no choice but to deal with disabling or bypassing exploit mitigations. We will show you how to get around one of the most common ones, DEP, and how you can stop successful exploitation from a defensive perspective. This material is a taste of the more advanced content in SANS SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking. Attendees should have a basic understanding of buffer overflows in order to take the most advantage of this material.