Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

File Structures - Another Binary Exploitation Technique

Hack In The Box Security Conference via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course teaches participants how to exploit the FILE structure in the GNU C Library (Glibc) as a binary exploitation technique. The learning outcomes include understanding how to bypass modern operating system protections like DEP, ASLR, and RELRO, breaking data protections, launching remote code execution, and utilizing different FILE structures for attacks. The course covers topics such as File Stream Oriented Programming and explores advanced exploit techniques. The teaching method involves a combination of theoretical explanations, demonstrations, and practical examples. This course is intended for individuals interested in cybersecurity, binary exploitation, and Linux system security.

Syllabus

Introduction
Agenda
File Structure
Exploit Path
Advanced Exploit
Verification
Demo
Conclusion

Taught by

Hack In The Box Security Conference

Reviews

Start your review of File Structures - Another Binary Exploitation Technique

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.