Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Evolution of Exploiting Memory Vulnerabilities in Linux

OWASP Foundation via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolution of exploiting memory vulnerabilities in Linux through this comprehensive 35-minute conference talk from OWASP 2023 Global AppSec DC. Dive into an in-depth examination of binary file exploitation, covering outdated techniques, the rise of binary hardening, and cutting-edge methods to bypass security measures. Gain insight into the prevalence of binary hardening in real-world applications, starting with an overview of the ELF structure. Learn about various binary hardening techniques, their detailed explanations, and developed bypass methods, complete with real-world CVEs and PoCs. Discover how binary hardening is implemented across common platforms and analyze statistical data on its prevalence. By the end, acquire a thorough understanding of binary hardening types, their importance, and the value of combining them to prevent discussed attacks. Presented by Ofri Ouzan, an experienced Security Researcher specializing in Windows, Linux, cloud platforms, and containerized applications vulnerabilities.

Syllabus

The evolution of exploiting memory vulnerabilities in Linux

Taught by

OWASP Foundation

Reviews

Start your review of The Evolution of Exploiting Memory Vulnerabilities in Linux

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.