The Evolution of Exploiting Memory Vulnerabilities in Linux
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the evolution of exploiting memory vulnerabilities in Linux through this comprehensive 35-minute conference talk from OWASP 2023 Global AppSec DC. Dive into an in-depth examination of binary file exploitation, covering outdated techniques, the rise of binary hardening, and cutting-edge methods to bypass security measures. Gain insight into the prevalence of binary hardening in real-world applications, starting with an overview of the ELF structure. Learn about various binary hardening techniques, their detailed explanations, and developed bypass methods, complete with real-world CVEs and PoCs. Discover how binary hardening is implemented across common platforms and analyze statistical data on its prevalence. By the end, acquire a thorough understanding of binary hardening types, their importance, and the value of combining them to prevent discussed attacks. Presented by Ofri Ouzan, an experienced Security Researcher specializing in Windows, Linux, cloud platforms, and containerized applications vulnerabilities.
Syllabus
The evolution of exploiting memory vulnerabilities in Linux
Taught by
OWASP Foundation
Related Courses
Linux Server Management and SecurityUniversity of Colorado System via Coursera Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera Operating Systems and Security
IBM via edX Linux Security and Hardening, The Practical Security Guide.
Udemy The Complete Cyber Security Course : Hackers Exposed!
Udemy