Главная
Study mode:
on
1
Intro
2
Meet Marit Christian
3
Introduction
4
Stack Overflow
5
The Stack
6
Questions
7
Stack growth
8
Memory Allocation
9
Code snippet
10
Heap explanation
11
Running the program
12
Summary
13
Example
14
Code
15
In Memory
16
Summary of vulnerability
17
What is stored in memory
18
Recontrol overflow size
19
Shared library code
20
Running the exploit
21
Behind the scenes
22
Safety analogy
23
Question
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore binary exploitation techniques in this NDC Oslo 2021 conference talk by Marit Iren and Christian Resell. Gain insights into memory corruption vulnerabilities and their relevance in modern software. Learn about stack overflows, heap exploitation, and memory allocation through code examples and live demonstrations. Witness a real-world exploit of a recent Exim mail server vulnerability, understanding both the vulnerability itself and the exploit process. Discover methods for detecting and preventing memory corruption vulnerabilities in your own software. Engage with concepts such as stack growth, shared library code, and exploit mechanics through practical demonstrations and analogies.

Demonstrating Binary Exploitation

NDC Conferences
Add to list