YoVDO

Demonstrating Binary Exploitation

Offered By: NDC Conferences via YouTube

Tags

NDC Conferences Courses Software Development Courses Cybersecurity Courses Ethical Hacking Courses Binary Exploitation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore binary exploitation techniques in this NDC Oslo 2021 conference talk by Marit Iren and Christian Resell. Gain insights into memory corruption vulnerabilities and their relevance in modern software. Learn about stack overflows, heap exploitation, and memory allocation through code examples and live demonstrations. Witness a real-world exploit of a recent Exim mail server vulnerability, understanding both the vulnerability itself and the exploit process. Discover methods for detecting and preventing memory corruption vulnerabilities in your own software. Engage with concepts such as stack growth, shared library code, and exploit mechanics through practical demonstrations and analogies.

Syllabus

Intro
Meet Marit Christian
Introduction
Stack Overflow
The Stack
Questions
Stack growth
Memory Allocation
Code snippet
Heap explanation
Running the program
Summary
Example
Code
In Memory
Summary of vulnerability
What is stored in memory
Recontrol overflow size
Shared library code
Running the exploit
Behind the scenes
Safety analogy
Question


Taught by

NDC Conferences

Related Courses

Software as a Service
University of California, Berkeley via Coursera
Software Testing
University of Utah via Udacity
The Hardware/Software Interface
University of Washington via Coursera
Software Debugging
Saarland University via Udacity
Introduction to Systematic Program Design - Part 1
The University of British Columbia via Coursera