Exploits 2: Exploitation in the Windows Environment (OST)

Exploits 2: Exploitation in the Windows Environment (OST)
Free Course
Categories
Effort
Certification
Languages
Must have a basic understanding of the C programming language, as this class will show how C code can be exploited. Must have taken Intro x86 and Exploits 1.
Misc

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Exploits 2: Exploitation in the Windows Environment (OST)
A survey of more advanced stack-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code. The class also covers exploit mitigation technologies found in Microsoft Windows and how attackers bypass these techniques.

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

A survey of more advanced stack-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code. The class also covers exploit mitigation technologies found in Microsoft Windows and how attackers bypass these techniques.


Recommended Readings:



0
No votes yet

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Free Course
Must have a basic understanding of the C programming language, as this class will show how C code can be exploited. Must have taken Intro x86 and Exploits 1.

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.