Completed
Pool Spray Pattern: Find Data Copy With Memcpy
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Select Bugs From Binary Where Pattern Like CVE Days
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Background for Static Code Analysis
- 3 Challenges for Static Code Analysis
- 4 What is Workspace, Exactly?
- 5 Workflow - Run Query
- 6 Query Mode Limitation
- 7 Example SQL Query Running Script Mode
- 8 Leviathan Utility & Pattern Search Primitives
- 9 File Hijacking Pattern: Seed Vulnerabilities
- 10 File Hijacking Pattern: Vulnerability Modeling
- 11 File Hijacking Pattern Extraction
- 12 Reparse Point Pattern: Seed Vulnerability
- 13 Reparse Point Pattern: Vulnerability Modeling
- 14 Reparse Point Pattern: Code Query Construction
- 15 ACL Overwritten Pattern: Seed Vulnerability
- 16 RDP Pool Spray Primitive Pattern Extraction
- 17 Pool Spray Pattern: Find Data Copy With Memcpy
- 18 Connect RDP PDU To Data Copy With Memcpy
- 19 Summary