TST 354 - Penetration Testing for Memory Corruption Vulnerabilities
Occurring when the contents of a memory location are modified due to programmatic behavior that exceeds the intention of the original programmer or program/language constructs. This type of programming error can lead to a program crash or strange and bizarre program behavior. This course teaches how to identify, test, and exploit these vulnerabilities.
After completing this course, you will be able to:
- Identify common memory corruption vulnerabilities
- Test for buffer overflows + Exploit known memory corruption vulnerabilities
- Understand advanced techniques for finding memory corruption vulnerabilities