YoVDO

Format String Vulnerabilities 101 - Lecture 4

Offered By: YouTube

Tags

Application Security Courses Software Development Courses C Programming Courses Buffer Overflow Courses Memory Corruption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the fundamentals of format string vulnerabilities in this comprehensive 53-minute conference talk from Derbycon 2012. Delve into the intricacies of this critical security issue as Deral Heiland provides an in-depth introduction to format string vulnerabilities, their potential impact, and how they can be exploited. Gain valuable insights into identifying, understanding, and mitigating these vulnerabilities to enhance your application security knowledge. Learn from real-world examples and practical demonstrations that illustrate the importance of addressing format string vulnerabilities in software development and security practices.

Syllabus

4 2 4 Deral Heiland Format String Vulnerabilities 101


Related Courses

Binder - The Bridge To Root - Hongli Han and Mingjian Zhou
Hack In The Box Security Conference via YouTube
JARVIS Never Saw It Coming - Hacking Machine Learning in Speech, Text and Face Recognition
44CON Information Security Conference via YouTube
SyScan360'16 Singapore - Memory Corruption Is For Wussies
SyScan360 via YouTube
Select Code Execution From Using SQLite
media.ccc.de via YouTube
BLEEDINGBIT - Your APs Belong to Us
Black Hat via YouTube