YoVDO

Like Lightning From the Cloud - Finding RCEs in an Embedded TLS Library

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Security Assessment Courses Vulnerability Research Courses

Course Description

Overview

Explore the process of discovering Remote Code Execution (RCE) vulnerabilities in an embedded TLS library in this 29-minute Black Hat conference talk. Gain insights into the techniques and methodologies used to identify and exploit security flaws in critical networking components. Learn about the potential risks associated with embedded systems and the importance of thorough security auditing in TLS implementations. Discover how researchers approach the challenge of finding vulnerabilities in complex, low-level code and the implications of these findings for network security.

Syllabus

Like Lightning From the Cloud: Finding RCEs in an Embedded TLS Library


Taught by

Black Hat

Related Courses

Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack
Cyber Mentor via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
macOS Security Features Bypasses by Example
nullcon via YouTube
Exploiting Android Messengers with WebRTC
nullcon via YouTube
XNU Heap Exploitation - From Kernel Bug to Kernel Control
nullcon via YouTube