Demonstrating Binary Exploitation
Offered By: NDC Conferences via YouTube
Course Description
Overview
Explore binary exploitation techniques in this NDC Security 2022 conference talk. Discover why this attack method remains highly relevant in 2022, despite misconceptions about its obsolescence. Learn about memory-unsafe programs and their vulnerabilities through code examples. Witness a live demonstration of exploiting a recent Sudo vulnerability, complete with explanations of the vulnerability and exploit process. Gain insights into detecting and preventing memory corruption vulnerabilities in software. Delve into topics such as stack and heap, memory safety, and stack overflow, with practical code demonstrations. Enhance your understanding of cybersecurity threats and defense strategies in this informative presentation by Marit Iren Rognli Tokle and Christian Resell.
Syllabus
Introduction
Introducing Christian Resell
Stack and Heap
Pwn
Memory Safety
Buying Expectations
Relevance
Stack Overflow
Code
Taught by
NDC Conferences
Related Courses
Software as a ServiceUniversity of California, Berkeley via Coursera Software Testing
University of Utah via Udacity The Hardware/Software Interface
University of Washington via Coursera Software Debugging
Saarland University via Udacity Introduction to Systematic Program Design - Part 1
The University of British Columbia via Coursera