Linux Exploits & Mitigation: String Vulnerability Analysis
Ubuntu 20.04
| Intermediate
- 14 videos | 1h 8m 53s
- Includes Assessment
- Earns a Badge
String vulnerabilities are at the core of a wide range of exploits. Being able to recognize, debug, and fix unsafe string manipulation code is essential to avoiding vulnerabilities. In this course, you'll explore how string code can be written safely and how strings vulnerabilities are exploited. You'll look at the most common format string vulnerabilities in the C programming language and what it means to overflow a string buffer. You'll debug string exploits, including vulnerabilities introduced by common string output and manipulation functions. Next, you'll correct common errors, check strings for safety, loop over strings, and see what happens when unsafe strings are executed in a program. Finally, you'll describe how code can be injected via strings and how strings can be returned safely.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe how strings are exploited in computer programsIllustrate the weaknesses caused by string formatting methodsPerform a string buffer overflow in a c programApply flags to the gcc compiler to catch string weaknesses by converting warnings into errorsRecognize and correct weaknesses introduced by poorly implemented string copiesRecognize and correct common input string vulnerabilities
-
Explore how generating command line string inputs can exploit insecure string methodsCheck input strings for validity and safetyPerform loops over characters in a string in a safe mannerRun programs that fail due to unsafe stringsDescribe how strings executed dynamically can lead to vulnerabilitiesRecognize safe and unsafe methods of returning strings in cSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 26s
-
5m 2sUpon completion of this video, you will be able to describe how strings are used in computer programs. FREE ACCESS
-
7m 32sAfter completing this video, you will be able to illustrate the weaknesses caused by string formatting methods. FREE ACCESS
-
7m 45sIn this video, find out how to perform a string buffer overflow attack in a C program. FREE ACCESS
-
4m 13sDuring this video, you will learn how to apply flags to the gcc compiler to catch string weaknesses by converting warnings into errors. FREE ACCESS
-
9m 13sUpon completion of this video, you will be able to recognize and correct weaknesses introduced by string copies that are not implemented well. FREE ACCESS
-
4m 52sUpon completion of this video, you will be able to recognize and correct common input string vulnerabilities. FREE ACCESS
-
5m 15sIn this video, you will explore how generating command line string inputs can exploit insecure string methods. FREE ACCESS
-
4m 57sIn this video, you will learn how to check input strings for validity and safety. FREE ACCESS
-
4m 41sLearn how to safely perform loops over characters in a string. FREE ACCESS
-
4m 31sIn this video, you will run programs that fail due to unsafe strings. FREE ACCESS
-
3m 5sAfter completing this video, you will be able to describe how strings executed dynamically can lead to vulnerabilities. FREE ACCESS
-
5m 29sAfter completing this video, you will be able to recognize safe and unsafe methods of returning strings in C. FREE ACCESS
-
52s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.