Completed
Conclusions and Black Hat Sound Bytes
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
A New Method to Bypass 64-bit Linux ASLR
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Motivation
- 3 Overview
- 4 Brief of the Linux ASLR
- 5 The real battlefield: The Attached code
- 6 2. The real battlefield: Why it is attached to the exec?
- 7 Return-to-csu: 64-bit ASLR bypass
- 8 3. Return-to-csu: A controlled call
- 9 3. Return-to-csu: looking for a destination
- 10 black hat 3. Return-to-csu: Building the final attack
- 11 Making return-to-csu attack profitable
- 12 Mitigations and solutions
- 13 Conclusions and Black Hat Sound Bytes