Decoded: The Cybersecurity Podcast

Stack Spoofing: Evasion and Exploitation Techniques by Edward Henriquez


Listen Later

This podcast excerpt explains stack spoofing, a technique where attackers manipulate the call stack to evade security measures and execute malicious code undetected. It details how this manipulation works, covering methods like return address spoofing, fake stack frames, and stack pivoting. The discussion highlights how attackers leverage these techniques for malware evasion, exploit development, and anti-forensics. Finally, it outlines defensive strategies, including stack integrity protections, detection techniques, and memory forensics tools, to counter stack spoofing attacks.

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

4 ratings


More shows like Decoded: The Cybersecurity Podcast

View all
Crime Junkie by Audiochuck

Crime Junkie

369,043 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

138 Listeners

CISSP Cyber Training Podcast - CISSP Training Program by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

CISSP Cyber Training Podcast - CISSP Training Program

32 Listeners