filmov
tv
Day 1 Part 5: Exploits1: Introduction to Software Exploits

Показать описание
Follow us on Twitter for class news @OpenSecTraining.
Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit them. In addition, current techniques that attempt to remediate the threat of software vulnerability exploitation will be discussed.
This will be a lab driven class where specific software vulnerability types in particular environments are discussed and then exploited in a lab setting. Examples of lab components of the class as well as specific topics covered include:
•Shellcode development
•Stack overflow exploitation
•Heap overflow exploitation
•Static source code analysis
•Defeating non-executable stack protection
This class by Corey K. will help students be more aware of the specific details and mechanisms of software exploits we see in the wild. This knowledge will enable the students to better analyze their own software for vulnerabilities in an effort to produce more secure code.
Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit them. In addition, current techniques that attempt to remediate the threat of software vulnerability exploitation will be discussed.
This will be a lab driven class where specific software vulnerability types in particular environments are discussed and then exploited in a lab setting. Examples of lab components of the class as well as specific topics covered include:
•Shellcode development
•Stack overflow exploitation
•Heap overflow exploitation
•Static source code analysis
•Defeating non-executable stack protection
This class by Corey K. will help students be more aware of the specific details and mechanisms of software exploits we see in the wild. This knowledge will enable the students to better analyze their own software for vulnerabilities in an effort to produce more secure code.
Day 1 Part 5: Exploits1: Introduction to Software Exploits
OpenSecurityTraining: Introduction To Software Exploits (day 1, part 5)
Day 1 Part 5: Introductory Intel x86: Architecture, Assembly, Applications
Day 1 Part 4: Exploits1: Introduction to Software Exploits
Day 1 Part 6: Exploits1: Introduction to Software Exploits
Day 2 Part 5: Exploits1: Introduction to Software Exploits
Day 1 Part 5: Intro to Software RE (Reverse Engineering)
Day 1 Part 5: Exploits 2: Exploits in the Windows Environment
Day 1 Part 3: Exploits1: Introduction to Software Exploits
Day 1 Part 2: Exploits1: Introduction to Software Exploits
Can I MAX My Stardew Fishing Skill in One In-Game Day?
Day 2 Part 1: Exploits1: Introduction to Software Exploits
Mastering my skills in Saitama Battleground Day 1
Day 1 Part 1: Exploits1: Introduction to Software Exploits
OpenSecurityTraining: Introduction To Software Exploits (day 1, part 6)
Day 2 Part 2: Exploits1: Introduction to Software Exploits
Can I MAX My Stardew Skills in One In-Game Day?
Day 2 Part 3: Exploits1: Introduction to Software Exploits
Day 2 Part 4: Exploits1: Introduction to Software Exploits
OpenSecurityTraining: Introduction To Software Exploits (day 1, part 4)
Day 1 Part 3: Rootkits: What they are, and how to find them
Is It Possible To Beat Stardew Valley Without Earning Gold?
Day 1 Part 6: Rootkits: What they are, and how to find them
Youtube Is Broken - How To Kill A Youtube Video
Комментарии