YoVDO

The Evolution of Exploiting Memory Vulnerabilities in Linux

Offered By: OWASP Foundation via YouTube

Tags

Linux Security Courses Security Research Courses Binary Exploitation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolution of exploiting memory vulnerabilities in Linux through this comprehensive 35-minute conference talk from OWASP 2023 Global AppSec DC. Dive into an in-depth examination of binary file exploitation, covering outdated techniques, the rise of binary hardening, and cutting-edge methods to bypass security measures. Gain insight into the prevalence of binary hardening in real-world applications, starting with an overview of the ELF structure. Learn about various binary hardening techniques, their detailed explanations, and developed bypass methods, complete with real-world CVEs and PoCs. Discover how binary hardening is implemented across common platforms and analyze statistical data on its prevalence. By the end, acquire a thorough understanding of binary hardening types, their importance, and the value of combining them to prevent discussed attacks. Presented by Ofri Ouzan, an experienced Security Researcher specializing in Windows, Linux, cloud platforms, and containerized applications vulnerabilities.

Syllabus

The evolution of exploiting memory vulnerabilities in Linux


Taught by

OWASP Foundation

Related Courses

Linux Server Management and Security
University of Colorado System via Coursera
Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera
Operating Systems and Security
IBM via edX
Linux Security and Hardening, The Practical Security Guide.
Udemy
The Complete Cyber Security Course : Hackers Exposed!
Udemy