Hands-On Exploit Development for Beginners


Posted on in Presentations

Participants will hack into a series of vulnerable servers and get onto winners boards. Instead of using tools, you will create your own attacks. The easier challenges require nothing but a web browser: command injection and SQL injection. The harder challenges require a Kali Linux virtual machine and exploit buffer overflows at the binary level.

Participants
Sam Bowne

Participant

Instructor, CCSF

Dylan Smith

Participant

Student, CCSF

Hackers & Threats Application Security & DevOps

penetration testing secure coding software code vulnerability analysis web services security exploit of vulnerability


Topic

Subtopic


Share With Your Community