SANS Cyber Defense Initiative® 2020 Live Online: 30+ Interactive Courses | Virtual NetWars Tournaments. Save $300 thru 11/18

Webcasts

To attend this webcast, login to your SANS Account or create your Account.

This webcast has been archived. To view the webcast login into your SANS Portal Account or create an account by clicking the "Get Registered" button on the right. Sorry, the slides for this webcast are not available for download.

Your App is Leaking! - Bypassing Exploit Mitigations for Pentesters...

  • Monday, September 08, 2014 at 1:00 PM EDT (2014-09-08 17:00:00 UTC)
  • Please Check Back

You can now attend the webcast using your mobile device!

  

Overview

In this presentation we will go over a sampling of exploit mitigation controls such as Address Space Layout Randomization (ASLR) and how different types of memory leaks can allow access to memory, bypassing the protection. We will look at a simple POC example using format strings on Linux, and another using flash objects with IE10.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.