Hands-On Exploit Development for Beginners

Posted on in Presentations

Participants will hack into a series of vulnerable servers and get onto winners boards. Instead of using tools, you will create your own attacks. The easier challenges require nothing but a web browser: command injection and SQL injection. The harder challenges require a Kali Linux virtual machine and exploit buffer overflows at the binary level.

Sam Bowne


Instructor, CCSF

Dylan Smith


Student, CCSF

Hackers & Threats Application Security & DevOps

penetration testing secure coding software code vulnerability analysis web services security exploit of vulnerability



Share With Your Community