Sept. 29, 2023, 7 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

In this video, we'll discuss the basics of software exploitation by beginning with the stack-based buffer overflow. For many, learning how to exploit buffer overflows is the gateway to learning many other exploitation techniques. In addition, you will learn how compilers and modern day operating systems have evolved to mitigate these vulnerabilities.

In this demo, we'll use a sample C program to create a vulnerable program. We'll discuss different compiler flags that we have to use to disable some safety …

addition basics buffer buffer overflow buffer overflows compilers discuss exploit exploitation gateway learn operating systems overflow software stack systems techniques video what is

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden