Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolution of exploiting memory vulnerabilities in Linux through this comprehensive 35-minute conference talk from OWASP 2023 Global AppSec DC. Dive into an in-depth examination of binary file exploitation, covering outdated techniques, the rise of binary hardening, and cutting-edge methods to bypass security measures. Gain insight into the prevalence of binary hardening in real-world applications, starting with an overview of the ELF structure. Learn about various binary hardening techniques, their detailed explanations, and developed bypass methods, complete with real-world CVEs and PoCs. Discover how binary hardening is implemented across common platforms and analyze statistical data on its prevalence. By the end, acquire a thorough understanding of binary hardening types, their importance, and the value of combining them to prevent discussed attacks. Presented by Ofri Ouzan, an experienced Security Researcher specializing in Windows, Linux, cloud platforms, and containerized applications vulnerabilities.
Syllabus
The evolution of exploiting memory vulnerabilities in Linux
Taught by
OWASP Foundation