COD 412: Buffer Overflows - Attacks and Countermeasures
This course provides all the required information to understand, avoid and mitigate the risks posed by buffer overflows. The students are first provided with a detailed background on the mechanisms of exploit of stack-based and heap-based buffer overflows. The course then delves into the protections provided by the Microsoft compiler and the Windows operating system, such as the /GS flag and Address Space Layout Randomization (ASLR), followed by practical advice on how to avoid buffer overflows during the design, development, and verification phases of the software development life cycle. Practical examples are provided throughout the course to help students understand and defend against buffer overflows.
Upon completion of this course, participants will be able to:
- Identify the dangers posed by buffer overflows
- Describe the exploitation techniques for stack-based and heap-based buffer overflows
- Leverage built-in system defenses that protect against buffer overflow exploits
- Apply best practices to avoid buffer overflows
- Perform testing that detects buffer overflows
This course can be customized for Instructor-Led training. Course contents and duration may vary. Contact us for details.