Linux Exploits & Mitigation: Memory and Pointer Vulnerabilities

Ubuntu 20.04    |    Expert
  • 14 videos | 1h 10m 39s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 7 users Rating 4.4 of 7 users (7)
Memory and pointer vulnerabilities come from a number of common programmer mistakes. Being able to recognize, debug, and fix unsafe memory allocation and access errors is essential to avoiding vulnerabilities. In this course, you'll explore how memory and pointer vulnerabilities arise and how they lead to program errors and exploits. You'll look at how memory is allocated and accessed in a typical C program. You'll investigate what causes heap and stack overflows, use-after-free (UAF) vulnerabilities, and out-of-bounds access errors. In addition, you'll recognize dangling pointers, NULL dereferences, and off-by-one loops. Finally, you'll delve into how coding errors lead to corrupted memory and arbitrary code execution.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe methods and goals for allocating memory
    Investigate what it means to overflow the heap
    Recognize and avoid dangling pointers in a c program
    Recognize and avoid null dereferences in a c program
    Investigate what it means to exploit the heap
    Illustrate use-after-free (uaf) vulnerabilities
  • Recognize and avoid stack buffer overflows
    Describe the nature of out-of-bounds write vulnerabilities and their impact
    Recognize and avoid looping off-by-one in a c program
    Describe how coding errors and vulnerabilities lead to corrupting memory
    Illustrate how to execute arbitrary code introduced by coding errors
    Illustrate how out-of-bounds errors are exploited
    Summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.1 of 9 users Rating 4.1 of 9 users (9)
Journey OS Exploits
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.5 of 39 users Rating 4.5 of 39 users (39)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 19 users Rating 4.3 of 19 users (19)
Rating 4.6 of 17 users Rating 4.6 of 17 users (17)
Rating 4.5 of 15 users Rating 4.5 of 15 users (15)