Linux Exploits & Mitigation: Linux Exploit Architecture
Ubuntu 20.04
| Expert
- 14 videos | 56m 8s
- Includes Assessment
- Earns a Badge
Vulnerabilities vary by architecture and family of processor. Recognizing the processor implementations and the differences that lead to an exploit is essential. In this course, you'll explore different classes of vulnerabilities based on the computing environment. You'll learn about the architectural differences and system implementations that lead to race conditions, shellcode and out-of-order execution vulnerabilities. You'll explore mitigations and protections to prevent stack smashing, use-after-free, and integer vulnerabilities. Next, you'll examine contemporary exploits such as Spectre and Meltdown and mitigations provided by Write XOR Execute (W^X). Finally, you'll investigate protections to prevent privileged escalation and exploiting processes and tasks.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe race conditions, their potential for vulnerabilities, and approaches to avoiding race conditionsDisable compiler protections to construct and execute shellcode in cDescribe out-of-order execution and related processor concepts and vulnerabilitiesDescribe common weaknesses and errors made when working with integers and how to prevent themExplore compiler warnings that are vital to security and program stabilityExplore how stack smashing vulnerabilities occur and how they are mitigated
-
Describe use-after-free vulnerabilities, how they occur, and typical target examples to keep in mindDescribe the impact and mitigations in place to avoid and mitigate the spectre and meltdown vulnerabilitiesDescribe the write xor execute (w^x) feature and its impact on memory securityVarious processor and operating system considerations that need to be taken into account when developing mitigations to vulnerabilities and exploitsTargets for privilege escalation exploits and common privilege control mechanismsTargets for exploiting processes and tasks of a running linux systemSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 21s
-
4m 23s
-
5m 28s
-
4m 47s
-
6m 43s
-
5m 46s
-
4m 29s
-
4m 40s
-
3m 47s
-
3m 25s
-
3m 21s
-
3m 55s
-
3m 14s
-
49s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.