Gaining Root Access: Exploiting Linux Using a New Heap Overflow Vulnerability

Webinar Registration

Organizations operating using a heterogeneous environment realize the value of using Linux systems to provide specific services critical to the business. These systems are just as much under attack as their Windows counterparts, making it equally as important to understand how they are being compromised, as well as ensuring they receive security updates.

In the last year, we’ve seen attacks on Linux systems grow in number, with the latest in 2021, dubbed ‘Baron Samedit’, allows attackers to leverage several vulnerable versions of the admin command Sudo to elevate themselves from a normal user to one with root access to the Linux system.

In this real-training-for-free session, Microsoft MVP and cybersecurity expert Nick Cavalancia takes my seat in this webcast, and will cover:

  • Just how problematic are attacks on Linux
  • Some of the tactics and techniques used by attackers when Linux is the target
  • Mapping these attacks to the MITRE Framework

Nick will be joined by Kev Breen, Director Cyber Threat Research at Immersive Labs who will discuss the new Baron Samedit heap overflow vulnerability in Linux discovered by Qualsys in January of this year. Kev will take a look at this attack from two perspectives:

  • Running the exploit, including uploading, compiling, and executing the exploit to gain access
  • Planning a defense that includes shipping audit logs, identifying the compromise, and responding to the attack

Kev will also provide a simulated attack that will test your decision-making skills to quickly and accurately respond using an attack scenario that mimics this kind of attack.

This real training for free event will be jam packed with technical detail and real-world application. Register today!

First Name:  
Last Name:  
Work Email:  
Phone:
Job Title:
Organization:
Country:  
State:
Industry:
 

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us and the sponsor.

 

 

Additional Resources