Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Demonstrating Binary Exploitation

NDC Conferences via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore binary exploitation techniques in this NDC Oslo 2021 conference talk by Marit Iren and Christian Resell. Gain insights into memory corruption vulnerabilities and their relevance in modern software. Learn about stack overflows, heap exploitation, and memory allocation through code examples and live demonstrations. Witness a real-world exploit of a recent Exim mail server vulnerability, understanding both the vulnerability itself and the exploit process. Discover methods for detecting and preventing memory corruption vulnerabilities in your own software. Engage with concepts such as stack growth, shared library code, and exploit mechanics through practical demonstrations and analogies.

Syllabus

Intro
Meet Marit Christian
Introduction
Stack Overflow
The Stack
Questions
Stack growth
Memory Allocation
Code snippet
Heap explanation
Running the program
Summary
Example
Code
In Memory
Summary of vulnerability
What is stored in memory
Recontrol overflow size
Shared library code
Running the exploit
Behind the scenes
Safety analogy
Question

Taught by

NDC Conferences

Reviews

Start your review of Demonstrating Binary Exploitation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.