Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore simple techniques for bug hunting on big iron UNIX systems in this 40-minute conference talk from the 44CON Information Security Conference. Build upon the work previously presented in the "Breaking The Links" paper, with a focus on AIX and associated IBM products. Learn a straightforward methodology for discovering vulnerabilities, and gain insights into newly discovered bugs. Enhance your understanding of security weaknesses in large-scale UNIX environments and improve your ability to identify and address potential threats.