Главная
Study mode:
on
1
Introduction
2
Living in the future
3
Systems programming vs binary exploitation
4
Patricia Aas
5
Back in time
6
Back in 2000
7
Example
8
Memory Allocation
9
Free Function
10
Typical Unlinking
11
Basic Insight
12
Bad Binder
13
Android IPC
14
Googles Response
15
Config Debug List
16
Use After Free
17
Overwrite Address Limits
18
Address Sanitizer
19
Frack Magazine
20
Undefined Behavior
21
CV 201716
22
CV 201717
23
CV 201718
24
CV 2021
25
CV 2010 Code
26
Format Streams 2010
27
Apple iOS 2021
28
Compilers
29
Crosspollination
30
Heap Overflow
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the rich history of native exploitation and classic vulnerabilities in this NDC Security 2022 conference talk by Patricia Aas. Delve into decades-old vulnerabilities and exploitation techniques that continue to surface in recent years. Learn how modern tooling equips us to find and fix these "classic" vulnerabilities. Examine specific examples from the past, including memory allocation issues, Android IPC vulnerabilities, and use-after-free exploits. Discover how undefined behavior and compiler optimizations can lead to security risks. Gain insights into recent CVEs and their connections to long-standing security challenges. Understand the importance of cross-pollination in security knowledge and the ongoing relevance of heap overflow vulnerabilities in today's software landscape.

Classic Vulnerabilities

NDC Conferences
Add to list