35% Off Finance Skills That Get You Hired - Code CFI35
AI Engineer - Learn how to integrate AI into software applications
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore binary exploitation techniques in this NDC Security 2022 conference talk. Discover why this attack method remains highly relevant in 2022, despite misconceptions about its obsolescence. Learn about memory-unsafe programs and their vulnerabilities through code examples. Witness a live demonstration of exploiting a recent Sudo vulnerability, complete with explanations of the vulnerability and exploit process. Gain insights into detecting and preventing memory corruption vulnerabilities in software. Delve into topics such as stack and heap, memory safety, and stack overflow, with practical code demonstrations. Enhance your understanding of cybersecurity threats and defense strategies in this informative presentation by Marit Iren Rognli Tokle and Christian Resell.
Syllabus
Introduction
Introducing Christian Resell
Stack and Heap
Pwn
Memory Safety
Buying Expectations
Relevance
Stack Overflow
Code
Taught by
NDC Conferences