Java Every-Days - Exploiting Software Running on 3 Billion Devices
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
Solution
Introduction
Vulnerability Sample Set
Oracle Java's Footprint and Software Architecture
Vulnerability Trending and Attack Surface
Vulnerability Statistics 2011-2013
Oracle Java Patch Statistics
Zero Day Initiative Submission Trends
Insight into Vulnerability Classes (CWE)
CWE-265 Breakdown and Historical Timeline
Styles of Memory Corruption
Top 7 Vulnerability Classes in the Java
Extrapolating Sub-component Weaknesses
Java Sub-component Weaknesses
Library Sub-component Weaknesses
2D Sub-component Weaknesses
JavaFX Sub-component Weaknesses
Leveraging Sub-component Weaknesses
Threat Landscape
Vulnerability Prevalence in Toolkits
Exploitation Techniques
Case Study
Vendor Response Review
Handling Vulnerability Disclosure
Package Restriction List Modifications
Oracle Weathered Quite The Storm
Good Luck Bug Hunting!
Taught by
Black Hat
Related Courses
Cybersecurity Best PracticesCoursera Instructor Network via Coursera Endpoint Security Fundamentals
Cybrary Mobile App Security
Cybrary Career Essentials in Cybersecurity by Microsoft and LinkedIn
LinkedIn Learning Cyber Resilience: An Overview
LinkedIn Learning