Unwinding the Stack for Fun and Profit
Offered By: Black Hat via YouTube
Course Description
Overview
Dive into a 36-minute Black Hat conference talk exploring the resurrection of stack-based buffer overflow exploits in modern software. Learn how exception handling mechanisms can be manipulated to bypass stack protection measures like cookies. Discover techniques for control flow hijacking, manipulating local variables, and abusing the chop. Follow along with a comprehensive demonstration and recap of these advanced exploitation methods, breathing new life into previously thwarted attack vectors. Gain insights from security experts Victor Duta, Fabian Freyer, Cristiano Giuffrida, Marius Muench, and Fabio Pagani as they challenge conventional wisdom about software vulnerability mitigation.
Syllabus
Intro
Control Flow Hijacking
Control local variables
Abuse the chop
Summary
Review
Demo
Recap
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube