Reversing the Root - Identifying the Exploited Vulnerability in 0-Days Used In-The-Wild
Offered By: Black Hat via YouTube
Course Description
Overview
Explore advanced reverse engineering techniques for identifying root cause vulnerabilities in exploited 0-day attacks. This 42-minute conference talk from Black Hat delves into Project Zero's analysis of eleven 0-day vulnerabilities exploited in the wild over a 12-month period. Learn about various methods employed, including binary patch diffing, exploit sample minimization, source code patch diffing, manual reverse engineering, and targeted bug hunting. Gain insights into the critical process of root cause analysis and how to effectively determine the underlying vulnerabilities in exploited systems. Presented by Maddie Stone, this talk offers valuable knowledge for security researchers and professionals looking to enhance their skills in vulnerability identification and analysis.
Syllabus
Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network