{"id":12241,"date":"2023-05-18T05:25:21","date_gmt":"2023-05-18T05:25:21","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/"},"modified":"2023-05-18T05:33:45","modified_gmt":"2023-05-18T05:33:45","slug":"finding-vuln-in-code-hitb2023hkt","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/","title":{"rendered":"Finding Vulnerabilities in C\/C++ Code for Developers or Hunters"},"content":{"rendered":"<div class=\"page\" title=\"Page 3\">\n<h4><strong><span style=\"color: #993300\">ATTEND IN-PERSON<\/span><\/strong><strong><span style=\"color: #993300\">: <\/span><\/strong><strong>Onsite in Phuket<\/strong><\/h4>\n<h4><strong><span style=\"color: #993300\">ATTEND ONLINE<\/span><\/strong><strong><span style=\"color: #993300\">: <\/span><\/strong><strong>Virtual via Zoom and Discord<\/strong><\/h4>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<div class=\"page\" title=\"Page 3\">\n<h4><strong>DATE: 21-24 August 2023<\/strong><\/h4>\n<\/div>\n<h4><strong>TIME: 09:00 to 17:00 ICT\/GMT+7<\/strong><\/h4>\n<\/div>\n<\/div>\n<\/div>\n<table style=\"height: 146px\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>21 Aug<\/td>\n<td>Monday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>22 Aug<\/td>\n<td>Tuesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>23 Aug<\/td>\n<td>Wednesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>24 Aug<\/td>\n<td>Thursday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<h5>If you&#8217;d like to mix and match this material with other topics Xeno teaches, you can instead sign up for the <a href=\"https:\/\/sectrain.hitb.org\/courses\/xenos-all-you-can-learn-buffet-hitb2023hkt\/\">Xeno&#8217;s All You Can Learn Buffet<\/a> class instead.<\/h5>\n<h5>This class is run a little different from most classes. We provide you purpose-built recorded lectures instead of trapping you in realtime with live-lectures. But fear not, the instructor is always right there eagerly waiting to mingle with the students and answer any questions you have. (The instructor really likes being asked questions. It shows you&#8217;re paying attention ;)). One of many benefits is that you can watch lectures at 2x speed and zoom ahead of the other students and get to the hands on labs quicker. Or if there&#8217;s bits of material you already know, you can just skip them and move on to the bits you don&#8217;t know! Another big benefit is that you get to take the full lectures and labs with you! That means if you forget stuff and then need it in 6 months, you can quickly re-bootstrap yourself! Or you can watch the class twice, to really grow those neural connections and cement it in your brain! And unlike live lectures, our lectures are always getting more factually accurate, by having any accidental errors edited out.<\/h5>\n<p>Because we give you all the lecture and lab materials and videos after class, what you&#8217;re really paying for is support from the instructor! So you&#8217;ll be entitled to keep asking up to 20 questions after class, with 1-2 hour turnaround answers (after accounting for time-zone differences.) This lets you keep productively working through the material if you run out of time at the conference. If you&#8217;d like to learn more about the benefits of this style of class delivery, please <a href=\"https:\/\/ost2.fyi\/Thoughts-on-OST2-B.html\">read this blog post<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h5 class=\"p1\"><b>Key Learning Objectives<\/b><\/h5>\n<ul>\n<li class=\"p1\">Learn to recognize the common programming errors that lead to (linear) stack\/heap buffer overflows, (non-linear) out-of-bound writes, integer overflows\/underflows, signedness issues (e.g. bypassing sanity checks due to signed comparisons, or integer truncation\/extension errors), uninitialized data accesses, race conditions (e.g. double fetch and Time of Check, Time of Use (TOCTOU)), Use-After-Free (UAF), type confusion, and information disclosure.<\/li>\n<li class=\"p1\">Learn what options developers have in terms of prevention, detection, and mitigation for each vulnerability type.<\/li>\n<li class=\"p1\">A detailed walkthrough for the exploitation of at least one vulnerability per section. This is so that students can see that vulnerabilities that might otherwise seem unexploitable, are in reality exploitable.<\/li>\n<li class=\"p1\">A *non-goal* is to teach the student how to exploit the vulnerabilities themselves. That will be covered in a future class. (Therefore this class&#8217;s applicability stops at &#8220;secure development&#8221; or &#8220;vulnerability auditor&#8221;, and doesn&#8217;t extend to &#8220;exploitation engineer&#8221;.)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5 class=\"p1\"><b>Course Agenda<\/b><\/h5>\n<p class=\"p1\"><strong>Introduction<\/strong><\/p>\n<ul>\n<li class=\"p1\">Attacker motivations &amp; capabilities<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><strong>Stack Buffer Overflows<\/strong><\/p>\n<ul>\n<li class=\"p1\"><span class=\"Apple-converted-space\">\u00a0<\/span>Introduction<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h6 class=\"p1\"><em><strong>(Key: <span class=\"s1\">?<\/span> = 0day in the wild, <span class=\"s1\">?<\/span> = includes exploit explanation)<\/strong><\/em><\/h6>\n<ul>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Choose-your-own-adventure. Select the examples you&#8217;re most interested in from:<span class=\"Apple-converted-space\">\u00a0<\/span><\/strong><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-21574 <span class=\"s1\">?<\/span> &#8220;BIOS Disconnect&#8221;<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2022-0435<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2018-9312<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2018-9318<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-10005<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-20294<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-43579<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* 2021-CVE-None-BaseBand#1<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2022-0435<\/p>\n<p class=\"p1\"><span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\"><strong>Prevention<\/strong><\/li>\n<\/ul>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; Writing good sanity checks, by example<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; Safer C runtime API options<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; FORTIFY_SOURCE<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; Piecemeal type-safe language usage<\/p>\n<p class=\"p1\"><span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\"><strong>Detection<\/strong><\/li>\n<\/ul>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; FORTIFY_SOURCE<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; Manual code auditing guidance<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; Commercial static analysis tools<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; Fuzzing<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; Address Sanitizer<\/p>\n<p class=\"p1\"><span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\"><strong>Mitigation<\/strong><\/li>\n<\/ul>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; Stack Canaries<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; Address Space Layout Randomization (ASLR)<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; Non-Executable Memory<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; Control Flow Integrity (CFI)<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">&#8211; Tagged Memory<\/p>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><strong>Heap Buffer Overflows<\/strong><\/p>\n<ul>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0I<\/span>ntroduction<\/strong><\/li>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Choose-your-own-adventure. Select the examples you&#8217;re most interested in from:<span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/strong><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-0917<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2019-7287<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-11901 (Part of &#8220;Ripple20&#8221;)<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-25111 (Part of &#8220;Amnesia:33&#8221;)<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-27009 (Part of &#8220;NAME:WRECK&#8221;)<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-21555<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-42739<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Prevention, Detection, Mitigation (a mix of approaches that apply equivalently to past sections, as well as any new topic-specific mechanisms.)<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><strong>Non-linear Out-of-bounds Writes (OOB-W)<\/strong><\/p>\n<ul>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Introduction<\/strong><\/li>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Choose-your-own-adventure. Select the examples you&#8217;re most interested in from: <span class=\"Apple-converted-space\">\u00a0<\/span><\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2019-10540<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-0938<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-1020<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-13995<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-27930<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-26675 &#8220;T-BONE&#8221;<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-28216<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2022-25636<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li class=\"p1\"><strong>Prevention, Detection, Mitigation (a mix of approaches that apply equivalently to past sections, as well as any new topic-specific mechanisms.)<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><strong>Integer Overflows\/Underflows<\/strong><\/p>\n<ul>\n<li class=\"p1\"><span class=\"Apple-converted-space\">\u00a0<\/span><strong>Introduction<\/strong><\/li>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Choose-your-own-adventure. Select the examples you&#8217;re most interested in from: <span class=\"Apple-converted-space\">\u00a0<\/span><\/strong><\/li>\n<\/ul>\n<p class=\"p1\" style=\"padding-left: 80px\"><span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-0796<span class=\"s1\">?<\/span> &#8220;SMBGhost&#8221;<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2019-5105<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2019-3568<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2019-14192<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-11901 (Part of &#8220;Ripple20&#8221;)<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-16225<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-17443 (Part of &#8220;Amnesia:33&#8221;)<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-30860<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-22636<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Prevention, Detection, Mitigation (a mix of approaches that apply equivalently to past sections, as well as any new topic-specific mechanisms.)<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><strong>Other Integer Issues<\/strong><\/p>\n<ul>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Introduction<\/strong><\/li>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Choose-your-own-adventure. Select the examples you&#8217;re most interested in from:<span class=\"Apple-converted-space\">\u00a0<\/span><\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2019-15948<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2019-14196<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2019-20561<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-15999<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-17087<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-33909 &#8220;Sequoia&#8221;<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Prevention, Detection, Mitigation (a mix of approaches that apply equivalently to past sections, as well as any new topic-specific mechanisms.)<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5 class=\"p1\"><strong>Conclusion for Part 1<\/strong><\/h5>\n<p class=\"p1\"><strong>Uninitialized Data Access<\/strong><\/p>\n<ul>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Introduction<\/strong><\/li>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Choose-your-own-adventure. Select the examples you&#8217;re most interested in from:<span class=\"Apple-converted-space\">\u00a0<\/span><\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\" style=\"padding-left: 40px\">* CVE-2019-1458<span class=\"s1\">??<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 40px\">* CVE-2022-26721<\/p>\n<p class=\"p1\" style=\"padding-left: 40px\">* CVE-2022-1809<\/p>\n<p class=\"p1\" style=\"padding-left: 40px\">* CVE-2021-3608<\/p>\n<p class=\"p1\" style=\"padding-left: 40px\">* CVE-2022-29968<\/p>\n<p class=\"p1\" style=\"padding-left: 40px\">* CVE-2021-27080<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li class=\"p1\"><strong>Prevention, Detection, Mitigation (a mix of approaches that apply equivalently to past sections, as well as any new topic-specific mechanisms.)<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><strong>Race Conditions<\/strong><\/p>\n<ul>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Introduction<\/strong><\/li>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Choose-your-own-adventure. Select the examples you&#8217;re most interested in from:<span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/strong><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2019-11098<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-4207<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-34514<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* 2022-CVE-None-MSMu<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-7460<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* 2019-CVE-None-QualcommWiFiSB<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Prevention, Detection, Mitigation (a mix of approaches that apply equivalently to past sections, as well as any new topic-specific mechanisms.)<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><strong>Use-After-Free (UAF)<\/strong><\/p>\n<ul>\n<li class=\"p1\"><span class=\"Apple-converted-space\">\u00a0<\/span><strong>Introduction<\/strong><\/li>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Choose-your-own-adventure. Select the examples you&#8217;re most interested in from: <span class=\"Apple-converted-space\">\u00a0<\/span><\/strong><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-29661<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-28460<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-2674<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-2758<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-36955<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2020-9715<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Prevention, Detection, Mitigation (a mix of approaches that apply equivalently to past sections, as well as any new topic-specific mechanisms.)<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><strong>Type Confusion<\/strong><\/p>\n<ul>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Introduction<\/strong><\/li>\n<li class=\"p1\"><strong><span class=\"Apple-converted-space\">\u00a0<\/span>Choose-your-own-adventure. Select the examples you&#8217;re most interested in from:<\/strong><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 40px\">* CVE-2021-1732<span class=\"s1\">??<\/span> &amp; CVE-2022-21882<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 40px\">* CVE-2020-3853<\/p>\n<p class=\"p1\" style=\"padding-left: 40px\">* CVE-2021-30857<\/p>\n<p class=\"p1\" style=\"padding-left: 40px\">* CVE-2020-27932<span class=\"s1\">?<\/span> &amp; CVE-2021-30869<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 40px\">* CVE-2021-41073<\/p>\n<p class=\"p1\" style=\"padding-left: 40px\">* CVE-2022-1786<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li class=\"p1\"><strong>Prevention, Detection, Mitigation (a mix of approaches that apply equivalently to past sections, as well as any new topic-specific mechanisms.)<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><strong>Information Disclosure<\/strong><\/p>\n<ul>\n<li class=\"p1\"><strong>Introduction<\/strong><\/li>\n<li class=\"p1\"><strong>Choose-your-own-adventure. Select the examples you&#8217;re most interested in from:<\/strong><span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-1969<span class=\"s1\">?<\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-3947<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2022-21877<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-1758<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2019-12265<\/p>\n<p class=\"p1\" style=\"padding-left: 80px\">* CVE-2021-3592<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li class=\"p1\"><strong>Prevention, Detection, Mitigation (a mix of approaches that apply equivalently to past sections, as well as any new topic-specific mechanisms.)<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><strong>Conclusion for Part 2<\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ATTEND IN-PERSON: Onsite in Phuket ATTEND ONLINE: Virtual via Zoom and Discord DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours If you&#8217;d [&hellip;]<\/p>\n","protected":false},"featured_media":12240,"template":"","meta":{"_acf_changed":false},"product_cat":[59,79,77],"product_tag":[],"class_list":{"0":"post-12241","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-4-day-training","7":"product_cat-guided-own-pace","8":"product_cat-hitb2023hkt","10":"first","11":"instock","12":"featured","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Finding Vulnerabilities in C\/C++ Code for Developers or Hunters - HITB (in)Cyber 2024 - Abu Dhabi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Finding Vulnerabilities in C\/C++ Code for Developers or Hunters - HITB (in)Cyber 2024 - Abu Dhabi\" \/>\n<meta property=\"og:description\" content=\"ATTEND IN-PERSON: Onsite in Phuket ATTEND ONLINE: Virtual via Zoom and Discord DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours If you&#8217;d [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/\" \/>\n<meta property=\"og:site_name\" content=\"HITB (in)Cyber 2024 - Abu Dhabi\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-18T05:33:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/Finding-Vulnerabilities-Xeno-1024x576.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/\",\"name\":\"Finding Vulnerabilities in C\/C++ Code for Developers or Hunters - HITB (in)Cyber 2024 - Abu Dhabi\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/Finding-Vulnerabilities-Xeno.gif\",\"datePublished\":\"2023-05-18T05:25:21+00:00\",\"dateModified\":\"2023-05-18T05:33:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/Finding-Vulnerabilities-Xeno.gif\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/Finding-Vulnerabilities-Xeno.gif\",\"width\":1080,\"height\":608},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Finding Vulnerabilities in C\/C++ Code for Developers or Hunters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/\",\"name\":\"HITB (in)Cyber 2024 - Abu Dhabi\",\"description\":\"May 14 - 16, Etihad Arena \",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Finding Vulnerabilities in C\/C++ Code for Developers or Hunters - HITB (in)Cyber 2024 - Abu Dhabi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/","og_locale":"en_US","og_type":"article","og_title":"Finding Vulnerabilities in C\/C++ Code for Developers or Hunters - HITB (in)Cyber 2024 - Abu Dhabi","og_description":"ATTEND IN-PERSON: Onsite in Phuket ATTEND ONLINE: Virtual via Zoom and Discord DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours If you&#8217;d [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/","og_site_name":"HITB (in)Cyber 2024 - Abu Dhabi","article_modified_time":"2023-05-18T05:33:45+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/Finding-Vulnerabilities-Xeno-1024x576.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/","url":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/","name":"Finding Vulnerabilities in C\/C++ Code for Developers or Hunters - HITB (in)Cyber 2024 - Abu Dhabi","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/Finding-Vulnerabilities-Xeno.gif","datePublished":"2023-05-18T05:25:21+00:00","dateModified":"2023-05-18T05:33:45+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/Finding-Vulnerabilities-Xeno.gif","contentUrl":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/Finding-Vulnerabilities-Xeno.gif","width":1080,"height":608},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/finding-vuln-in-code-hitb2023hkt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbincyber2024\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbincyber2024\/shop\/"},{"@type":"ListItem","position":3,"name":"Finding Vulnerabilities in C\/C++ Code for Developers or Hunters"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/#website","url":"https:\/\/conference.hitb.org\/hitbincyber2024\/","name":"HITB (in)Cyber 2024 - Abu Dhabi","description":"May 14 - 16, Etihad Arena ","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbincyber2024\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product\/12241"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/media\/12240"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/media?parent=12241"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product_cat?post=12241"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product_tag?post=12241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}