Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Directory Traversal and Remote Code Execution in Binwalk - CVE-2022-4510 Analysis

CryptoCat via YouTube

Overview

Learn about a critical path traversal vulnerability (CVE-2022-4510) in a 13-minute technical video that examines the security flaw affecting ReFirm Labs binwalk versions 2.1.2b through 2.3.3. Explore how this vulnerability enables remote attackers to execute arbitrary code on affected binwalk installations when users extract malicious files using the -e option. Dive deep into the PFS extractor plugin's weaknesses, understand the technical breakdown of the vulnerability, and see a practical demonstration of exploitation techniques. Follow along with detailed explanations of the proof of concept, examine real-world CTF use cases, and gain insights into securing against this type of attack. Perfect for security researchers, penetration testers, and those interested in vulnerability analysis and exploit development.

Syllabus

Start:
Overview:
PFS pfstool:
Vulnerability Breakdown:
Exploitation Details:
Proof of Concept PoC:
CTF Use Cases:
End:

Taught by

CryptoCat

Reviews

Start your review of Directory Traversal and Remote Code Execution in Binwalk - CVE-2022-4510 Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.