Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore binary exploitation techniques in this NDC Security 2022 conference talk. Discover why this attack method remains highly relevant in 2022, despite misconceptions about its obsolescence. Learn about memory-unsafe programs and their vulnerabilities through code examples. Witness a live demonstration of exploiting a recent Sudo vulnerability, complete with explanations of the vulnerability and exploit process. Gain insights into detecting and preventing memory corruption vulnerabilities in software. Delve into topics such as stack and heap, memory safety, and stack overflow, with practical code demonstrations. Enhance your understanding of cybersecurity threats and defense strategies in this informative presentation by Marit Iren Rognli Tokle and Christian Resell.
Syllabus
Introduction
Introducing Christian Resell
Stack and Heap
Pwn
Memory Safety
Buying Expectations
Relevance
Stack Overflow
Code
Taught by
NDC Conferences