YoVDO

Binary Defense Without Privilege

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses C Programming Courses Software Security Courses Stack Overflows Courses Binary Exploitation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn defensive programming techniques for binary applications without relying on privileged access in this 47-minute conference talk. Explore a range of strategies including inline patching, stack overflow prevention, heap management, alarm calls, sandboxing, network filtering, and environment variable handling. Discover practical examples in C code and gain insights into useful tools like CAP logging. Understand how to implement security measures such as fake chroot and forking to enhance application protection. Ideal for developers and security professionals seeking to improve binary defense without elevated privileges.

Syllabus

Intro
Who am I
What can we do
The best solution
Example
C Code
Inline Patch
Stack Overflow
Dont Return
Stack Overflows
Heaps
Alarm Calls
Sandbox
Fake chroot
Network Filtering
CAP Logging Tool
Environment Variables
Forking
Other useful things
Got No Bind
Questions


Related Courses

Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
100+ Exercises - Advanced Python Programming
Udemy
230+ Exercises - Python for Data Science - NumPy + Pandas
Udemy
Don't Ruck Us Too Hard - Owning All of Ruckus AP Devices
nullcon via YouTube
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime
Black Hat via YouTube