Exploiting Java Memory Corruption Vulnerabilities
Offered By: YouTube
Course Description
Overview
Explore Java memory corruption vulnerabilities in this 43-minute conference talk by Joshua Drake (jduck). Gain insights into exploiting Java applets, security background, and technical hurdles. Learn about setup, arbitrary call exploitation, format string vulnerabilities, and a practical lab on CVE-2009-3867. Conclude with recommendations for addressing these security concerns in Java applications.
Syllabus
Intro
Overview
Motivation
Background - Applets
Background - Security
Background - Technical
Hurdles - 1
Hurdles - Watchdog
Hurdles - Encoding
Exploiting: Setup
Exploiting: Arbitrary Call
Exploiting: Format String
LABS Exploiting: CVE-2009-3867
Conclusions
Recommendations
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube