Главная
Study mode:
on
1
Intro
2
About us
3
Agenda
4
What is binary exploitation
5
Memory safety
6
Statistics
7
Questions
8
Stack
9
Dynamic Memory Allocation
10
Heap Allocation
11
Chunks
12
Happy Pass
13
What is this bug
14
The code
15
How it works
16
Summary
17
Stack Overflows
18
What to target
19
Library
20
Demo
21
Safety analogy
22
Question
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore binary exploitation techniques in this 58-minute conference talk from NDC Conferences. Delve into the world of memory-unsafe programs and learn why binary exploitation remains a relevant and common attack method in 2021. Follow along as Marit Iren Rognli Tokle and Christian Resell provide code examples and demonstrate the exploitation of a recent Sudo vulnerability. Gain insights into detecting and preventing memory corruption vulnerabilities in your software. Topics covered include memory safety, stack and heap allocation, dynamic memory allocation, stack overflows, and practical demonstrations. Enhance your understanding of cybersecurity threats and defense strategies through this informative presentation.

Demonstrating Binary Exploitation

NDC Conferences
Add to list
0:00 / 0:00