YoVDO

Demonstrating Binary Exploitation

Offered By: NDC Conferences via YouTube

Tags

NDC Conferences Courses Software Development Courses Cybersecurity Courses Stack Overflows Courses Memory Safety Courses Binary Exploitation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore binary exploitation techniques in this 58-minute conference talk from NDC Conferences. Delve into the world of memory-unsafe programs and learn why binary exploitation remains a relevant and common attack method in 2021. Follow along as Marit Iren Rognli Tokle and Christian Resell provide code examples and demonstrate the exploitation of a recent Sudo vulnerability. Gain insights into detecting and preventing memory corruption vulnerabilities in your software. Topics covered include memory safety, stack and heap allocation, dynamic memory allocation, stack overflows, and practical demonstrations. Enhance your understanding of cybersecurity threats and defense strategies through this informative presentation.

Syllabus

Intro
About us
Agenda
What is binary exploitation
Memory safety
Statistics
Questions
Stack
Dynamic Memory Allocation
Heap Allocation
Chunks
Happy Pass
What is this bug
The code
How it works
Summary
Stack Overflows
What to target
Library
Demo
Safety analogy
Question


Taught by

NDC Conferences

Related Courses

1C:Enterprise Junior Developer Course
Moscow Institute of Physics and Technology via Coursera
A Beginner’s Guide to Docker
Packt via FutureLearn
A Beginner’s Guide to Scrum Project Management
Packt via FutureLearn
Google Professional Cloud DevOps Engineer Certification Path Introduction (GCP DevOps Engineer Track Part 1)
A Cloud Guru
Introduction to Amazon CodeGuru
A Cloud Guru