Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting Linux and Pax ASLR's Weaknesses on 32-Bit and 64-Bit Systems

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of Linux and PaX ASLR vulnerabilities in this 58-minute Black Hat conference talk by Dr. Hector Marco-Gisbert and Dr. Ismael Ripoll. Delve into four critical weaknesses in current ASLR design and implementation: low entropy, non-uniform distribution, object correlation, and inheritance. Witness a proof-of-concept demonstration bypassing Full ASLR Linux on 64-bit systems in under a second. Gain insights into a proposed new ASLR design, ASLR-NG, which addresses these vulnerabilities and surpasses existing solutions, including PaX. Learn about ASLRA, a tool suite for analyzing ASLR entropy in Linux systems. Enhance your understanding of cybersecurity challenges and cutting-edge solutions in both 32-bit and 64-bit environments.

Syllabus

Exploiting Linux and Pax ASLR's Weaknesses on 32-Bit and 64-Bit Systems

Taught by

Black Hat

Reviews

Start your review of Exploiting Linux and Pax ASLR's Weaknesses on 32-Bit and 64-Bit Systems

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.