Buffer overflows, a condition where attacker-controlled input overwrites program data, are consistently being used in large-scale attacks, including Stuxnet in 2011 and WannaCry in 2017. In this interactive presentation we will demonstrate how to test for and craft buffer overflows, even without an application's source code. Then we will alternately introduce more exploit mitigations, including ASLR, NX, and Stack Canaries, and demonstrate how to bypass each one of them -- all with live demos! Materials at github.com/parkergarrison/overflow
Parker enjoys the challenge of subverting the intended functionality of systems and is an active participant in CTF Competitions. At the most recent RSA Conference he attended in 2017, he took 1st place in both the SANS NetWars Tournament and SANS One-Hour CTF competitions. He is also a GIAC certified Exploit Researcher and Advanced Penetration Tester (GXPN).Parker currently works as an consulting contractor, performing network penetration testing and social engineering. He is an experienced communicator with the Toastmasters Advanced Communicator Gold (ACG) certification, and has developed and led training programs for teams in cyber defense and CTF competitions.