Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Auditing Binaries for Security Vulnerabilities

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced techniques for auditing closed-source software and identifying security vulnerabilities in Windows binaries in this comprehensive Black Hat conference talk. Delve into legal considerations, stress testing methodologies, manual audit approaches, and strategies for detecting suspicious constructs. Gain insights into essential auditor skills and tools, refresh C/C++ code auditing knowledge, and learn to navigate disassembly for effective vulnerability detection. Examine a real-world example using iWS 4.1 SHTML, and discover advanced automation topics to enhance your binary auditing capabilities.

Syllabus

Intro
Auditing Closed-Source Software
Legal considerations (EU)
Why audit binaries?
Approach A: Stress Testing
Approach B: Manual Audit
Approach C. Looking for suspicious constructs
Skills the auditor needs
Tools the auditor needs
C/C++ code auditing recap
Finding it in the disassembly
An Example: iWS 4.1 SHTML
Advanced topics: Automation

Taught by

Black Hat

Reviews

Start your review of Auditing Binaries for Security Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.