Главная
Study mode:
on
1
Intro
2
Overview
3
Outline
4
Reverse Engineering
5
Getting Started
6
Tools
7
Debuggers
8
Immunity
9
Ida Pro
10
Registers
11
Calling conventions
12
Stacks
13
Fast Call
14
What do I need
15
Local Variables
16
Handson
17
Example
18
Debugger
19
Code
Description:
Dive deep into stack buffer overflows and format string vulnerabilities in this comprehensive 3-hour conference talk from SecureWV/Hack3rCon 2018. Explore reverse engineering techniques, essential tools, and debuggers like Immunity and IDA Pro. Learn about registers, calling conventions, stacks, and fast calls. Gain hands-on experience with practical examples and debugger code. Perfect for security professionals and enthusiasts looking to enhance their understanding of these critical vulnerabilities and defensive strategies.

A Deep Look at Stack Buffer Overflows and Format String Vulnerabilities

Add to list