A Deep Look at Stack Buffer Overflows and Format String Vulnerabilities
Offered By: YouTube
Course Description
Overview
Dive deep into stack buffer overflows and format string vulnerabilities in this comprehensive 3-hour conference talk from SecureWV/Hack3rCon 2018. Explore reverse engineering techniques, essential tools, and debuggers like Immunity and IDA Pro. Learn about registers, calling conventions, stacks, and fast calls. Gain hands-on experience with practical examples and debugger code. Perfect for security professionals and enthusiasts looking to enhance their understanding of these critical vulnerabilities and defensive strategies.
Syllabus
Intro
Overview
Outline
Reverse Engineering
Getting Started
Tools
Debuggers
Immunity
Ida Pro
Registers
Calling conventions
Stacks
Fast Call
What do I need
Local Variables
Handson
Example
Debugger
Code
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network