Linux Exploits & Mitigation: Linux Exploit Architecture
Vulnerabilities vary by architecture and family of processor. Recognizing the processor implementations and the differences that lead to an exploit is essential. In this course youll explore different classes of vulnerabilities based on the computing environment. Youll learn about the architectural differences and system implementations that lead to race conditions shellcode and out-of-order execution vulnerabilities. Youll explore mitigations and protections to prevent stack smashing use-after-free and integer vulnerabilities. Next youll examine contemporary exploits such as Spectre and Meltdown and mitigations provided by Write XOR Execute (W^X). Finally youll investigate protections to prevent privileged escalation and exploiting processes and tasks.