Read the article and answer the following questios:
- how does W xor X protects against typical shell injection attack as a part of payload (e.g. in the case of a stack buffer overflow vulnerability)?
- What are the shortcomings of W xor X (DEP) w.r.t. to ite inability to prevent attacks?
- How can mprotect function be used to perform an attack in the presence of a small unrandomized code region with a shellcode to execute? [see the section “Unrandomized Code”]