Linux Exploits & Mitigation: Linux Exploit Architecture

Ubuntu 20.04    |    Expert
  • 14 videos | 56m 8s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 6 users Rating 4.7 of 6 users (6)
Vulnerabilities vary by architecture and family of processor. Recognizing the processor implementations and the differences that lead to an exploit is essential. In this course, you'll explore different classes of vulnerabilities based on the computing environment. You'll learn about the architectural differences and system implementations that lead to race conditions, shellcode and out-of-order execution vulnerabilities. You'll explore mitigations and protections to prevent stack smashing, use-after-free, and integer vulnerabilities. Next, you'll examine contemporary exploits such as Spectre and Meltdown and mitigations provided by Write XOR Execute (W^X). Finally, you'll investigate protections to prevent privileged escalation and exploiting processes and tasks.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe race conditions, their potential for vulnerabilities, and approaches to avoiding race conditions
    Disable compiler protections to construct and execute shellcode in c
    Describe out-of-order execution and related processor concepts and vulnerabilities
    Describe common weaknesses and errors made when working with integers and how to prevent them
    Explore compiler warnings that are vital to security and program stability
    Explore how stack smashing vulnerabilities occur and how they are mitigated
  • Describe use-after-free vulnerabilities, how they occur, and typical target examples to keep in mind
    Describe the impact and mitigations in place to avoid and mitigate the spectre and meltdown vulnerabilities
    Describe the write xor execute (w^x) feature and its impact on memory security
    Various processor and operating system considerations that need to be taken into account when developing mitigations to vulnerabilities and exploits
    Targets for privilege escalation exploits and common privilege control mechanisms
    Targets for exploiting processes and tasks of a running linux system
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 21s
  • 4m 23s
  • Locked
    3.  Executing Shellcode
    5m 28s
  • Locked
    4.  Out-of-order Execution
    4m 47s
  • Locked
    5.  Integer Vulnerabilities and Prevention
    6m 43s
  • Locked
    6.  Compiler Warnings for Security and Stability
    5m 46s
  • Locked
    7.  Stack Smashing Mitigations
    4m 29s
  • Locked
    8.  Use-after-free Consequences
    4m 40s
  • Locked
    9.  Spectre and Meltdown Vulnerabilities and Mitigation
    3m 47s
  • Locked
    10.  Write XOR Execute (W^X)
    3m 25s
  • Locked
    11.  Considerations and Mitigations to Vulnerabilities and Exploits
    3m 21s
  • Locked
    12.  Privilege Escalation Targets
    3m 55s
  • Locked
    13.  Processes and Tasks Exploits
    3m 14s
  • Locked
    14.  Course Summary
    49s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 17 users Rating 4.6 of 17 users (17)
Journey OS Exploits
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 7 users Rating 4.4 of 7 users (7)
Rating 4.8 of 28 users Rating 4.8 of 28 users (28)
Rating 4.0 of 2 users Rating 4.0 of 2 users (2)