Exploitation 2: Basic Exploitation Techniques

Actions Panel

Exploitation 2: Basic Exploitation Techniques

In this session you will learn the basic techniques that can help you build the attacks.

When and where

Date and time

Location

Online

About this event

  • 4 hours
  • Mobile eTicket

What is the event about?

In this session you will learn the basic techniques that can help you build the attacks. You will learn about buffer overflows and how they can be used to inject code. You will learn about typical countermeasures such as ASLR and stack canaries, and techniques that make your attacks more resilient to these countermeasures. The session will be a combination of English and Danish due to the teachers.

Underviser: Alessandro Bruni

(This session will be in english)

What does it require to participate?

This session requires a that the students are able to understand the basics of programming and how data is represented in a computer, including binary, integers, strings. The “Exploitation 2” requires that you attend “Exploitation 1”.

Do I need to install something on beforehand?

We require an installation of Kali Linux, and that the student installs the necessary utilities as described in the workshop page: https://github.com/hoheinzollern/workshop-cybersikkehed