SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe exploit that this paper will cover is one that has been in use for some time - the buffer overrun vulnerability that was discovered in the majority of Microsoft's Operating Systems' RPC DCOM handling. This vulnerability was found in July 2003 by a group known as LSD, or Last Stage of Delirium [1]. Microsoft released a Security Bulletin (MS03-026) that addressed this with a patch on July 16, 2003. The particular exploit code relevant to this vulnerability that is employed in this paper is a Windows port of H.D. Moore's dcom.c code [2] called DcomExpl_UnixWin32.
Dave Shackleford, founder of Voodoo Security, has advanced cybersecurity through his leadership roles, including serving as CTO for the Center for Internet Security, where he coordinated the first published virtualization security benchmarks.
Read more about Dave Shackleford