YoVDO

Exploiting Buffer Overflows on RISC-V

Offered By: Linux Foundation via YouTube

Tags

Conference Talks Courses Cybersecurity Courses C Programming Courses Assembly Language Courses Buffer Overflow Courses

Course Description

Overview

Explore the intricacies of buffer overflow exploitation on the RISC-V architecture in this 36-minute conference talk. Gain an introduction to RISC-V and understand how exploitation techniques differ from Intel and ARM platforms. Learn to overflow buffers, create shellcode in assembly language, and perform ret2libc attacks. Delve into important registers, local variables, and hacking approaches specific to RISC-V. Discover techniques for manipulating buffer sizes, utilizing odd numbers, and leveraging writable stacks. Examine practical examples of overwriting buffers, fixing stacks, and analyzing object dumps. Suitable for those with a basic understanding of assembly and C programming.

Syllabus

Introduction
Agenda
License Fees
Architecture
Important registers
Local variables
Hacking
Buffer Overflow
Approach
Shell Code
Buffer Size
Snail bites
Using odd numbers
Using larger numbers
Writable stack
Shellcode
Overwrite Buffer
Program nominee
Object dump
Fill the buffer
Fix the stack
Questions
Userspace
Outro


Taught by

Linux Foundation

Tags

Related Courses

Software Design Threats and Mitigations
University of Colorado System via Coursera
Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX
Unlocking Information Security
Tel Aviv University via edX
Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy