Memory corruption Course
46 minutes
Course description
Managing memory usage has long been a requirement for application development. Unfortunately, most developers don't do it very well. This can lead to leaks, overflows and crashes in your app. Hackers can exploit these vulnerabilities with denial-of-service and remote code execution attacks. In this course, you will learn how Android mobile app memory is structured and used. You will learn about the most common overflow types and the errors that cause them, and how to avoid them. You will explore what pointers are, the various types of pointers and when and how Android uses pointers. You will also exploit a notorious buffer overflow vulnerability in Stagefright, Android's media player.Syllabus
Activity: Managing overflows
Video - 00:11:00
In this activity, we deliberately cause an overflow.
Understanding overflows, Part 2
Video - 00:10:00
In this lesson, we learn about managing recursive apps.
Understanding overflows
Video - 00:14:00
In this lesson, we learn about the different types of overflows that can happen in an app.
Android memory overview
Video - 00:12:00
In this lesson, we discuss Android memory, memory risks and Kotlin memory management.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Associated NICE Work Roles
All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.
- Cyber Operator
- Law Enforcement / Counterintelligence Forensics Analyst
- Cyber Defense Forensics Analyst
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps