Like Lightning From the Cloud - Finding RCEs in an Embedded TLS Library
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the process of discovering Remote Code Execution (RCE) vulnerabilities in an embedded TLS library in this 29-minute Black Hat conference talk. Gain insights into the techniques and methodologies used to identify and exploit security flaws in critical networking components. Learn about the potential risks associated with embedded systems and the importance of thorough security auditing in TLS implementations. Discover how researchers approach the challenge of finding vulnerabilities in complex, low-level code and the implications of these findings for network security.
Syllabus
Like Lightning From the Cloud: Finding RCEs in an Embedded TLS Library
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network