The Evolution of Exploiting Memory Vulnerabilities in Linux
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolution of exploiting memory vulnerabilities in Linux through this comprehensive 35-minute conference talk from OWASP 2023 Global AppSec DC. Dive into an in-depth examination of binary file exploitation, covering outdated techniques, the rise of binary hardening, and cutting-edge methods to bypass security measures. Gain insight into the prevalence of binary hardening in real-world applications, starting with an overview of the ELF structure. Learn about various binary hardening techniques, their detailed explanations, and developed bypass methods, complete with real-world CVEs and PoCs. Discover how binary hardening is implemented across common platforms and analyze statistical data on its prevalence. By the end, acquire a thorough understanding of binary hardening types, their importance, and the value of combining them to prevent discussed attacks. Presented by Ofri Ouzan, an experienced Security Researcher specializing in Windows, Linux, cloud platforms, and containerized applications vulnerabilities.
Syllabus
The evolution of exploiting memory vulnerabilities in Linux
Taught by
OWASP Foundation
Related Courses
OWASP Top 10 - A10:2021 - Server-Side Request Forgery (SSRF)Cybrary From Software Engineer to Security Researcher - Suz Hinton's Career Journey
freeCodeCamp Assembly Language Adventures (1): Counting with two digits
Udemy Assembly Language Adventures: Complete Course
Udemy Reticle Dropping - An Intelligent F-BOMB
YouTube