YoVDO

A Deep Look at Stack Buffer Overflows and Format String Vulnerabilities

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Reverse Engineering Courses IDA Pro Courses Vulnerability Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive deep into stack buffer overflows and format string vulnerabilities in this comprehensive 3-hour conference talk from SecureWV/Hack3rCon 2018. Explore reverse engineering techniques, essential tools, and debuggers like Immunity and IDA Pro. Learn about registers, calling conventions, stacks, and fast calls. Gain hands-on experience with practical examples and debugger code. Perfect for security professionals and enthusiasts looking to enhance their understanding of these critical vulnerabilities and defensive strategies.

Syllabus

Intro
Overview
Outline
Reverse Engineering
Getting Started
Tools
Debuggers
Immunity
Ida Pro
Registers
Calling conventions
Stacks
Fast Call
What do I need
Local Variables
Handson
Example
Debugger
Code


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network