Hands-On Exploit Development for Beginners


Posted on in Presentations

Participants will hack into a series of vulnerable servers and get onto winners boards. Instead of using tools, you will create your own attacks. The easier challenges require nothing but a web browser: command injection and SQL injection. The harder challenges require a Kali Linux virtual machine and exploit buffer overflows at the binary level.
Participants
Sam Bowne

Participant

Instructor, CCSF

Dylan Smith

Participant

Student, CCSF


Share With Your Community