Unwinding the Stack for Fun and Profit
Offered By: Black Hat via YouTube
Course Description
Overview
Dive into a 36-minute Black Hat conference talk exploring the resurrection of stack-based buffer overflow exploits in modern software. Learn how exception handling mechanisms can be manipulated to bypass stack protection measures like cookies. Discover techniques for control flow hijacking, manipulating local variables, and abusing the chop. Follow along with a comprehensive demonstration and recap of these advanced exploitation methods, breathing new life into previously thwarted attack vectors. Gain insights from security experts Victor Duta, Fabian Freyer, Cristiano Giuffrida, Marius Muench, and Fabio Pagani as they challenge conventional wisdom about software vulnerability mitigation.
Syllabus
Intro
Control Flow Hijacking
Control local variables
Abuse the chop
Summary
Review
Demo
Recap
Taught by
Black Hat
Related Courses
Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld SystemsVanderbilt University via Coursera Engineering Maintainable Android Apps
Vanderbilt University via Coursera Software Design as an Element of the Software Development Lifecycle
University of Colorado System via Coursera Secure Software Development
Pluralsight Secure Software Concepts for CSSLPĀ®
Pluralsight