Google AI Professional Certificate - Learn AI Skills That Get You Hired
Advanced Techniques in Data Visualization - Self Paced Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore binary exploitation techniques in this NDC Oslo 2021 conference talk by Marit Iren and Christian Resell. Gain insights into memory corruption vulnerabilities and their relevance in modern software. Learn about stack overflows, heap exploitation, and memory allocation through code examples and live demonstrations. Witness a real-world exploit of a recent Exim mail server vulnerability, understanding both the vulnerability itself and the exploit process. Discover methods for detecting and preventing memory corruption vulnerabilities in your own software. Engage with concepts such as stack growth, shared library code, and exploit mechanics through practical demonstrations and analogies.
Syllabus
Intro
Meet Marit Christian
Introduction
Stack Overflow
The Stack
Questions
Stack growth
Memory Allocation
Code snippet
Heap explanation
Running the program
Summary
Example
Code
In Memory
Summary of vulnerability
What is stored in memory
Recontrol overflow size
Shared library code
Running the exploit
Behind the scenes
Safety analogy
Question
Taught by
NDC Conferences