YoVDO

Reversing the Root - Identifying the Exploited Vulnerability in 0-Days Used In-The-Wild

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Reverse Engineering Courses Vulnerability Analysis Courses Bug Hunting Courses

Course Description

Overview

Explore advanced reverse engineering techniques for identifying root cause vulnerabilities in exploited 0-day attacks. This 42-minute conference talk from Black Hat delves into Project Zero's analysis of eleven 0-day vulnerabilities exploited in the wild over a 12-month period. Learn about various methods employed, including binary patch diffing, exploit sample minimization, source code patch diffing, manual reverse engineering, and targeted bug hunting. Gain insights into the critical process of root cause analysis and how to effectively determine the underlying vulnerabilities in exploited systems. Presented by Maddie Stone, this talk offers valuable knowledge for security researchers and professionals looking to enhance their skills in vulnerability identification and analysis.

Syllabus

Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network