Webcasts

To attend this webcast, login to your SANS Account or create your Account.

Your App is Leaking! - Bypassing Exploit Mitigations for Pentesters...

  • Monday, September 8th, 2014 at 1:00 PM EDT (17:00:00 UTC)
  • Stephen Sims
This webcast has been archived. You can view the webcast presentation and download the slides by logging into your SANS Portal Account or creating an Account. Click the Register Now button after you have logged in to view the Webcast.

You can now attend the webcast using your mobile device!

Overview

In this presentation we will go over a sampling of exploit mitigation controls such as Address Space Layout Randomization (ASLR) and how different types of memory leaks can allow access to memory, bypassing the protection. We will look at a simple POC example using format strings on Linux, and another using flash objects with IE10.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.