YoVDO

A Deep Look at Stack Buffer Overflows and Format String Vulnerabilities

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Reverse Engineering Courses IDA Pro Courses Vulnerability Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive deep into stack buffer overflows and format string vulnerabilities in this comprehensive 3-hour conference talk from SecureWV/Hack3rCon 2018. Explore reverse engineering techniques, essential tools, and debuggers like Immunity and IDA Pro. Learn about registers, calling conventions, stacks, and fast calls. Gain hands-on experience with practical examples and debugger code. Perfect for security professionals and enthusiasts looking to enhance their understanding of these critical vulnerabilities and defensive strategies.

Syllabus

Intro
Overview
Outline
Reverse Engineering
Getting Started
Tools
Debuggers
Immunity
Ida Pro
Registers
Calling conventions
Stacks
Fast Call
What do I need
Local Variables
Handson
Example
Debugger
Code


Related Courses

Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX
Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera
Complete Ethical Hacking Bootcamp
Udemy
Cyber Security Advanced Persistent Threat Defender Preview
Udemy
Performing Threat Modeling with the PASTA Methodology
Pluralsight