Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Heap Overflows
Showing:
9
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Hack In The Box Security Conference
Timekiller: Escape From QEMU/KVM - Exploiting Asynchronous Clock Vulnerabilities
0
rewiews
Demonstrating a novel guest-to-host escape exploit in QEMU/KVM using asynchronous clock vulnerabilities. Introduces "Timekiller" technique to turn heap overflow into arbitrary address write, achieving full VM escape.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Linux Foundation
Android: Protecting the Kernel - Kernel Security Strategies
0
rewiews
Explore Android kernel security, attack vectors, and defense strategies. Learn about SELinux, DAC capabilities, and new protections implemented in AOSP/Android-N to safeguard against rooting exploits.
Add to list
23
Lesons
42 minutes
On-Demand
Free-Video
Linux Foundation
Meaningful Bounds Checking in the Linux Kernel - Addressing Buffer Overflows
0
rewiews
Exploring buffer overflow vulnerabilities in the Linux kernel and innovative solutions for enhanced security through improved bounds checking and compiler optimizations.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
DHCP Is Hard
0
rewiews
Explore DHCP vulnerabilities and exploits in popular implementations, including dnsmasq, ISC DHCP, and systemd networkd, with insights on architecture and attack techniques.
Add to list
15
Lesons
48 minutes
On-Demand
Free-Video
Black Hat
WebKit Everywhere - Secure or Not?
0
rewiews
Explore WebKit security, vulnerabilities, and exploitation techniques across platforms. Learn about security enhancements, mitigation strategies, and advanced exploit methods with real-world demos.
Add to list
20
Lesons
33 minutes
On-Demand
Free-Video
Black Hat
The Info Leak Era on Software Exploitation
0
rewiews
Explore advanced techniques for exploiting software vulnerabilities through information leaks, focusing on defeating ASLR and converting various vulnerabilities into effective info leaks.
Add to list
19
Lesons
51 minutes
On-Demand
Free-Video
Cooper
Ghosts and Gadgets - Common Buffer Overflows That Still Haunt Our Networks
0
rewiews
Explore common buffer overflow vulnerabilities in network systems, their detection methods, and practical mitigation strategies for securing modern networks.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Exposing Critical Threats in Cellular Modem Security - Telit Vulnerabilities Analysis
0
rewiews
Uncover critical security vulnerabilities in Telit cellular modems, including remote code execution flaws, SMS-based attacks, and MIDlet compromise methods that affect millions of connected devices.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
NDC Conferences
Classic Vulnerabilities
0
rewiews
Explore classic vulnerabilities in native exploitation, their recent resurgence, and modern tools for detection and prevention in this comprehensive security talk.
Add to list
30
Lesons
1 hour 5 minutes
On-Demand
Free-Video
load more...