Sept. 29, 2023, 7 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

In this video, we'll discuss the basics of software exploitation by beginning with the stack-based buffer overflow. For many, learning how to exploit buffer overflows is the gateway to learning many other exploitation techniques. In addition, you will learn how compilers and modern day operating systems have evolved to mitigate these vulnerabilities.

In this demo, we'll use a sample C program to create a vulnerable program. We'll discuss different compiler flags that we have to use to disable some safety …

addition basics buffer buffer overflow buffer overflows compilers discuss exploit exploitation gateway learn operating systems overflow software stack systems techniques video what is

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC