YoVDO

File Structures - Another Binary Exploitation Technique

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Binary Exploitation Courses Remote Code Execution Courses

Course Description

Overview

Explore a new attack technique exploiting FILE structures in GNU C Library (Glibc) to circumvent modern operating system protections in this 49-minute conference talk from the Hack In The Box Security Conference. Learn how to break data protections, launch remote code execution, and utilize different FILE structures for attacks through File Stream Oriented Programming. Discover methods to abuse FILE structures even with the latest Glibc mitigations. Gain insights from An-Jie Yang (Angelboy), a renowned cybersecurity expert and CTF champion, as he covers topics including file structures, exploit paths, advanced exploitation techniques, verification methods, and practical demonstrations.

Syllabus

Introduction
Agenda
File Structure
Exploit Path
Advanced Exploit
Verification
Demo
Conclusion


Taught by

Hack In The Box Security Conference

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera