YoVDO

Abusing RWX-S Binaries for Post-Exploitation

Offered By: Security BSides London via YouTube

Tags

Post Exploitation Courses Defensive Security Courses Offensive Security Courses Code Injection Courses Binary Exploitation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced post-exploitation techniques focusing on abusing RWX-S binaries in this concise 12-minute conference talk from Security BSides London. Gain insights into leveraging executable memory segments for enhanced persistence and evasion strategies. Learn how to identify and exploit vulnerable binaries, understand the implications of RWX-S permissions, and discover practical methods for implementing these techniques in real-world scenarios. Delve into the intricacies of memory manipulation and code injection, equipping yourself with cutting-edge knowledge to improve both offensive and defensive security practices.

Syllabus

Abusing RWX-S Binaries For Post-exploitation - At0m


Taught by

Security BSides London

Related Courses

Penetration Testing - Post Exploitation
New York University (NYU) via edX
Metasploit Framework: Penetration Testing with Metasploit
Udemy
Metasploit
Cybrary
Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
CAE in Cybersecurity Community via YouTube
Advanced Phishing Tactics Beyond User Awareness
YouTube