neox Posted August 29, 2016 Report Posted August 29, 2016 (edited) Buffer Overflow Attacks Explained: Saved Return Pointer Overwrite In today’s Whiteboard Wednesday, David Maloney, Senior Security Researcher at Rapid7, will discuss buffer overflow attacks. David will walk you through a buffer overflow exploit called “saved return pointer overwrite” to show you specifically how buffer overflow attacks work. Watch this week’s Whiteboard Wednesday to learn more. https://www.rapid7.com/resources/videos/buffer-overflow-exploit-explained.jsp Mitigating Buffer Overflow Attacks with Stack Cookies In today’s Whiteboard Wednesday, David Maloney, Senior Security Researcher at Rapid7, will share a technique to help mitigate buffer overflow attacks. In a previous Whiteboard Wednesday, we explained how buffer overflow attacks work. This week, we are going to explain how to help mitigate buffer overflow vulnerabilities with stack cookies. Watch this week’s Whiteboard Wednesday to learn more. https://www.rapid7.com/resources/videos/mitigating-buffer-overflow-attacks-with-stack-cookies.jsp Exploit Explained: Structured Exception Handler Overwrite In today’s Whiteboard Wednesday, David Maloney, Sr. Security Engineer at Rapid7, will talk about structured exception handler overwrite vulnerabilities and how they work. Watch this week’s Whiteboard Wednesday to learn more. https://www.rapid7.com/resources/videos/structured-exception-handler-overwrite-explained.jsp SEHOP: Mitigating Structured Exception Handler Overwrite Vulnerabilities In today’s Whiteboard Wednesday, David Maloney, Sr. Security Researcher at Rapid7, will discuss how SEHOP can help you mitigate structured exception handler overwrite vulnerabilities. https://www.rapid7.com/resources/videos/mitigating-seh-overwrites-with-sehop.jsp Exploit Explained: Return Oriented Processing (ROP) In today’s Whiteboard Wednesday, David Maloney, Sr. Security Researcher at Rapid7, will discuss the ROP exploit technique for buffer overflow vulnerabilities. https://www.rapid7.com/resources/videos/rop-exploit-explained.jsp Mitigating Return Oriented Processing (ROP) Vulnerabilities In today’s Whiteboard Wednesday, David Maloney, Sr. Security Researcher at Rapid7, will discuss the ROP exploit technique for buffer overflow vulnerabilities and how to mitigate these security issues. https://www.rapid7.com/resources/videos/mitigating-rop-vulnerabilities.jsp Edited September 7, 2016 by neox 3 Quote