Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Demonstrating Binary Exploitation

NDC Conferences via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course aims to teach learners about binary exploitation, a prevalent attack method in memory unsafe programs. By providing code examples and demonstrating how to exploit a recent vulnerability in the Exim mail server, participants will learn how to detect and prevent memory corruption vulnerabilities in software. The teaching method includes live demonstrations and explanations of vulnerabilities and exploits. This course is intended for individuals interested in cybersecurity, software development, or ethical hacking.

Syllabus

Intro
Meet Marit Christian
Introduction
Stack Overflow
The Stack
Questions
Stack growth
Memory Allocation
Code snippet
Heap explanation
Running the program
Summary
Example
Code
In Memory
Summary of vulnerability
What is stored in memory
Recontrol overflow size
Shared library code
Running the exploit
Behind the scenes
Safety analogy
Question

Taught by

NDC Conferences

Reviews

Start your review of Demonstrating Binary Exploitation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.