Introduction
Introduction Statistics Contact Development Disclaimer Help
Day 1 Part 6: Introduction to Software Exploits
by Corey K.
Thumbnail
Download
Web page
Get the class materials to follow along at
http://www.OpenSecurityTraining.info/IntroductionToSoftwareE
xploits.html
Follow us on Twitter for class news @OpenSecTraining
or via RSS at
http://www.opensecuritytraining.info/ChangeB
log/ChangeBlog.html
Software vulnerabilities are flaws in program logic that
can be leveraged by an attacker to execute arbitrary code
on a target system. This class will cover both the
identification of software vulnerabilities and the
techniques attackers use to exploit them. In addition,
current techniques that attempt to remediate the threat
of software vulnerability exploitation will be discussed.
This will be a lab driven class where specific software
vulnerability types in particular environments are
discussed and then exploited in a lab setting. Examples
of lab components of the class as well as specific topics
covered include:
* Shellcode development
* Stack overflow exploitation
* Heap overflow exploitation
* Static source code analysis
* Defeating non-executable stack protection
This class by Corey K. will help students be more aware
of the specific details and mechanisms of software
exploits we see in the wild. This knowledge will enable
the students to better analyze their own software for
vulnerabilities in an effort to produce more secure code.
Introductory Intel x86
(http://www.OpenSecurityTraining.info/IntroX86.html) is a
direct and very necessary prerequisite which should be
taken before this class.
Date Published: 2012-07-07 17:36:47
Identifier: Day1Part6IntroductionToSoftwareExploits
Item Size: 1264876215
Media Type: movies
# Topics
OpenSecurityTraining.info;Exploits;so...
# Collections
opensecuritytraining
computersandtechvideos
# Uploaded by
@opensecuritytraining_info
# Similar Items
View similar items
PHAROS
You are viewing proxied material from tilde.pink. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.