YoVDO

Reversing the Root - Identifying the Exploited Vulnerability in 0-Days Used In-The-Wild

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Reverse Engineering Courses Vulnerability Analysis Courses Bug Hunting Courses

Course Description

Overview

Explore advanced reverse engineering techniques for identifying root cause vulnerabilities in exploited 0-day attacks. This 42-minute conference talk from Black Hat delves into Project Zero's analysis of eleven 0-day vulnerabilities exploited in the wild over a 12-month period. Learn about various methods employed, including binary patch diffing, exploit sample minimization, source code patch diffing, manual reverse engineering, and targeted bug hunting. Gain insights into the critical process of root cause analysis and how to effectively determine the underlying vulnerabilities in exploited systems. Presented by Maddie Stone, this talk offers valuable knowledge for security researchers and professionals looking to enhance their skills in vulnerability identification and analysis.

Syllabus

Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild


Taught by

Black Hat

Related Courses

Dal Reverse engineering alla stampa 3D
University of Naples Federico II via Federica
Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam
Generative Design for Industrial Applications
Autodesk via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam