Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

A General Approach to Bypassing Many Kernel Protections and Its Mitigation

Black Hat via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course teaches learners how to bypass various kernel protections and provides mitigation strategies. The course covers analyzing exploits that bypass KASLR using flexible objects in the Linux kernel, extending the concept to elastic objects, and demonstrating a general exploitation approach. The teaching method involves practical demonstrations and theoretical explanations. This course is intended for cybersecurity professionals, ethical hackers, and individuals interested in kernel security.

Syllabus

A General Approach to Bypassing Many Kernel Protections and its Mitigation

Taught by

Black Hat

Reviews

Start your review of A General Approach to Bypassing Many Kernel Protections and Its Mitigation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.