In this course we look at typical mitigation techniques and/or bypassing techniques which make software exploitation hard. We cover the basics of memory corruption issues, specifics of embedded device and kernel exploitation as well as common mitigation techniques and the different approaches to bypass them. We additionally touch upon less common mitigation techniques that try to address these shortcomings.
Key learning objectives
• Exploit stack and corruption vulnerabilities.
• Apply common mitigation techniques, including stack cookies, ASLR and XN
• Apply techniques for bypassing the most common mitigation techniques.
• Use state-of-the-art countermeasures against software exploitation, such as Control Flow Integrity and
You selected to get the course Introduction to Software Ex... (20190521). Please Login or Signup to get it.