Abusing RWX-S Binaries for Post-Exploitation
Offered By: Security BSides London via YouTube
Course Description
Overview
Explore advanced post-exploitation techniques focusing on abusing RWX-S binaries in this concise 12-minute conference talk from Security BSides London. Gain insights into leveraging executable memory segments for enhanced persistence and evasion strategies. Learn how to identify and exploit vulnerable binaries, understand the implications of RWX-S permissions, and discover practical methods for implementing these techniques in real-world scenarios. Delve into the intricacies of memory manipulation and code injection, equipping yourself with cutting-edge knowledge to improve both offensive and defensive security practices.
Syllabus
Abusing RWX-S Binaries For Post-exploitation - At0m
Taught by
Security BSides London
Related Courses
Arm assembly for HackersUdemy Intro to Binary Exploitation
HTB Academy via Independent HackIM CTF - Do's and Don'ts
nullcon via YouTube File Structures - Another Binary Exploitation Technique
Hack In The Box Security Conference via YouTube ELFPack - ELF Binary Section Docking in Stageless Payload Delivery
Ekoparty Security Conference via YouTube