YoVDO

Deconstructing DeFeNeStRaTe.C

Offered By: 0xdade via YouTube

Tags

ShmooCon Courses C Programming Courses Unix Courses Buffer Overflow Courses Privilege Escalation Courses

Course Description

Overview

Dive into a captivating 50-minute conference talk that unravels the mystery behind a potentially dangerous C program discovered in the aftermath of a Swedish federal mainframe breach. Follow along as Soldier of FORTRAN, a renowned mainframe security expert, meticulously deconstructs the enigmatic DeFeNeStRaTe.C file. Explore the intricacies of mainframe privilege escalation, APF unix programs, buffer overflows, return address hijacking, debugging techniques, and ACEE modifications. Gain valuable insights into the Unix component of mainframe systems and witness the program in action. By the end of this presentation, acquire a comprehensive understanding of DeFeNeStRaTe.C's intended functionality and its potential impact on mainframe security.

Syllabus

Deconstructing DeFeNeStRaTe.C - Soldier of FORTRAN


Taught by

0xdade

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Enterprise Security Fundamentals
Microsoft via edX
Penetration Testing - Post Exploitation
New York University (NYU) via edX
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy