Completed
Exploitation Techniques
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Java Every-Days - Exploiting Software Running on 3 Billion Devices
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Solution
- 3 Introduction
- 4 Vulnerability Sample Set
- 5 Oracle Java's Footprint and Software Architecture
- 6 Vulnerability Trending and Attack Surface
- 7 Vulnerability Statistics 2011-2013
- 8 Oracle Java Patch Statistics
- 9 Zero Day Initiative Submission Trends
- 10 Insight into Vulnerability Classes (CWE)
- 11 CWE-265 Breakdown and Historical Timeline
- 12 Styles of Memory Corruption
- 13 Top 7 Vulnerability Classes in the Java
- 14 Extrapolating Sub-component Weaknesses
- 15 Java Sub-component Weaknesses
- 16 Library Sub-component Weaknesses
- 17 2D Sub-component Weaknesses
- 18 JavaFX Sub-component Weaknesses
- 19 Leveraging Sub-component Weaknesses
- 20 Threat Landscape
- 21 Vulnerability Prevalence in Toolkits
- 22 Exploitation Techniques
- 23 Case Study
- 24 Vendor Response Review
- 25 Handling Vulnerability Disclosure
- 26 Package Restriction List Modifications
- 27 Oracle Weathered Quite The Storm
- 28 Good Luck Bug Hunting!