WEBVTT

00:00.840 --> 00:03.630
Welcome to the module Exploited Mitigation Techniques.

00:04.490 --> 00:10.710
This section of the course is going to be relatively harder than the section where we cover basic stack

00:10.710 --> 00:12.210
based buffer overflows.

00:12.990 --> 00:19.470
As you can guess, the reason behind that is we are going to deal with exploit mitigations using various

00:19.470 --> 00:19.970
techniques.

00:20.640 --> 00:25.080
We are going to specifically discuss three different explosive mitigation techniques.

00:26.010 --> 00:30.750
The first one is Anex, which makes the stack not executable.

00:31.350 --> 00:37.050
The second one is ASALA, which stands for Edra Space Layout Randomisation.

00:37.380 --> 00:45.720
When Isela is enabled, the base addresses of Stack and the libraries that are being loaded are going

00:45.720 --> 00:46.710
to be randomized.

00:47.670 --> 00:51.300
The third one is Stack Guarneris or Stack Cookies.

00:51.750 --> 00:57.720
Stack can detect if a buffer overflow attempt is made against the binary.

00:58.800 --> 01:05.580
We will begin by understanding how these exploit mitigations work and how they are going to affect our

01:05.580 --> 01:06.800
existing exploit.

01:07.620 --> 01:14.520
Once we understand these required fundamentals, we will explore some techniques to bypass these exploit

01:14.520 --> 01:15.550
mitigation techniques.

01:16.170 --> 01:17.370
That's all for this video.

01:17.640 --> 01:21.570
In the next video, we are going to discuss what AmEx's.
