Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Abusing RWX-S Binaries for Post-Exploitation

Security BSides London via YouTube

Overview

Explore advanced post-exploitation techniques focusing on abusing RWX-S binaries in this concise 12-minute conference talk from Security BSides London. Gain insights into leveraging executable memory segments for enhanced persistence and evasion strategies. Learn how to identify and exploit vulnerable binaries, understand the implications of RWX-S permissions, and discover practical methods for implementing these techniques in real-world scenarios. Delve into the intricacies of memory manipulation and code injection, equipping yourself with cutting-edge knowledge to improve both offensive and defensive security practices.

Syllabus

Abusing RWX-S Binaries For Post-exploitation - At0m

Taught by

Security BSides London

Reviews

Start your review of Abusing RWX-S Binaries for Post-Exploitation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.