YoVDO

Demonstrating Binary Exploitation

Offered By: NDC Conferences via YouTube

Tags

NDC Conferences Courses Software Development Courses Cybersecurity Courses Ethical Hacking Courses Binary Exploitation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore binary exploitation techniques in this NDC Oslo 2021 conference talk by Marit Iren and Christian Resell. Gain insights into memory corruption vulnerabilities and their relevance in modern software. Learn about stack overflows, heap exploitation, and memory allocation through code examples and live demonstrations. Witness a real-world exploit of a recent Exim mail server vulnerability, understanding both the vulnerability itself and the exploit process. Discover methods for detecting and preventing memory corruption vulnerabilities in your own software. Engage with concepts such as stack growth, shared library code, and exploit mechanics through practical demonstrations and analogies.

Syllabus

Intro
Meet Marit Christian
Introduction
Stack Overflow
The Stack
Questions
Stack growth
Memory Allocation
Code snippet
Heap explanation
Running the program
Summary
Example
Code
In Memory
Summary of vulnerability
What is stored in memory
Recontrol overflow size
Shared library code
Running the exploit
Behind the scenes
Safety analogy
Question


Taught by

NDC Conferences

Related Courses

Health Informatics: Data and Interoperability Standards
Georgia Institute of Technology via edX
Fractal Architecture
NDC Conferences via YouTube
Strangling the Monolith - Applied Patterns & Practices from the Trenches
NDC Conferences via YouTube
Refactoring Is Not Just Clickbait
NDC Conferences via YouTube
Amazing Algorithms for Solving Problems in Software
NDC Conferences via YouTube