Java Every-Days - Exploiting Software Running on 3 Billion Devices
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
Solution
Introduction
Vulnerability Sample Set
Oracle Java's Footprint and Software Architecture
Vulnerability Trending and Attack Surface
Vulnerability Statistics 2011-2013
Oracle Java Patch Statistics
Zero Day Initiative Submission Trends
Insight into Vulnerability Classes (CWE)
CWE-265 Breakdown and Historical Timeline
Styles of Memory Corruption
Top 7 Vulnerability Classes in the Java
Extrapolating Sub-component Weaknesses
Java Sub-component Weaknesses
Library Sub-component Weaknesses
2D Sub-component Weaknesses
JavaFX Sub-component Weaknesses
Leveraging Sub-component Weaknesses
Threat Landscape
Vulnerability Prevalence in Toolkits
Exploitation Techniques
Case Study
Vendor Response Review
Handling Vulnerability Disclosure
Package Restriction List Modifications
Oracle Weathered Quite The Storm
Good Luck Bug Hunting!
Taught by
Black Hat
Related Courses
CVE Series: Log4J (CVE-2021-44228)Cybrary JavaScript Security
Infosec via Coursera Ivanti Avalanche Vulnerability: What You Should Know
Pluralsight Ivanti Connect Secure VPN Vulnerability: What You Should Know
Pluralsight OpenPrinting CUPS Remote Code Execution Exploit Chain: What You Should Know
Pluralsight