From the course: CISSP Cert Prep (2021): 8 Software Development Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Memory vulnerabilities
From the course: CISSP Cert Prep (2021): 8 Software Development Security
Memory vulnerabilities
- [Instructor] Computers have to manage the memory resources used by both the operating system and applications. When a single system supports many different uses, it becomes critical to isolate the memory used by each process to prevent that memory from being read or altered in an unauthorized way. We covered the issues associated with memory overflows earlier in this course. You learned how attackers can exploit overflow vulnerabilities to overwrite the contents of memory belonging to other processes, and trick the system into executing attacker provided code with administrative privileges. One of the issues that we need to watch for with memory or any other limited resource on a system is resource exhaustion. Whether intentional or accidental, systems may consume all of the memory storage processing time or other resources available to them, rendering the system disabled or crippled for other uses. Memory leaks are…
Contents
-
-
-
-
-
(Locked)
OWASP Top 105m 36s
-
(Locked)
Application security4m 13s
-
(Locked)
Preventing SQL injection4m 25s
-
(Locked)
Understanding cross-site scripting3m 17s
-
(Locked)
Request forgery4m 8s
-
(Locked)
Defending against directory traversal3m 6s
-
(Locked)
Overflow attacks3m 21s
-
(Locked)
Explaining cookies and attachments4m 25s
-
(Locked)
Session hijacking4m 8s
-
(Locked)
Code execution attacks2m 43s
-
(Locked)
Privilege escalation1m 56s
-
(Locked)
Driver manipulation2m 16s
-
(Locked)
Memory vulnerabilities3m 34s
-
(Locked)
Race condition vulnerabilities2m 13s
-
(Locked)
-
-
-