A Deep Look at Stack Buffer Overflows and Format String Vulnerabilities
Offered By: YouTube
Course Description
Overview
Dive deep into stack buffer overflows and format string vulnerabilities in this comprehensive 3-hour conference talk from SecureWV/Hack3rCon 2018. Explore reverse engineering techniques, essential tools, and debuggers like Immunity and IDA Pro. Learn about registers, calling conventions, stacks, and fast calls. Gain hands-on experience with practical examples and debugger code. Perfect for security professionals and enthusiasts looking to enhance their understanding of these critical vulnerabilities and defensive strategies.
Syllabus
Intro
Overview
Outline
Reverse Engineering
Getting Started
Tools
Debuggers
Immunity
Ida Pro
Registers
Calling conventions
Stacks
Fast Call
What do I need
Local Variables
Handson
Example
Debugger
Code
Related Courses
Unlocking Information Security II: An Internet PerspectiveTel Aviv University via edX Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera Complete Ethical Hacking Bootcamp
Udemy Cyber Security Advanced Persistent Threat Defender Preview
Udemy Performing Threat Modeling with the PASTA Methodology
Pluralsight