EXPLOITATION 2: BASICS EXPLOITATION TECHNIQUES

EXPLOITATION 2: BASICS EXPLOITATION TECHNIQUES

By De Danske Cybermesterskaber
Online event

Overview

The session covers basic attack techniques, including buffer overflows, code injection, and how to bypass defenses like ASLR etc.

In this session you will learn the basic techniques that can help you build the attacks. You will learn about buffer overflows and how they can be used to inject code. You will learn about typical countermeasures such as ASLR and stack canaries, and techniques that make your attacks more resilient to these countermeasures.


What does it require to participate in the session?

This session requires a that the students are able to understand the basics of programming and how data is represented in a computer, including binary, integers, strings. The “Exploitation 2” requires that you attend “Exploitation 1”.


Preparation before the session?

We require an installation of Kali Linux, and that the student installs the necessary utilities as described in the workshop page: https://github.com/hoheinzollern/workshop-cybersikkehed


Practical info:

📆 Time: February 27th - 17.00-20.00

📍Place: Online (you'll receive a link by mail)

🧑🏻‍💻 Language: The session will be a combination of English and Danish due to the teachers.

🧑🏻‍💻 Teacher: Alessandro Bruni, ITU

Category: Science & Tech, Science

Good to know

Highlights

  • 3 hours
  • Online

Location

Online event

Organised by

De Danske Cybermesterskaber

Followers

--

Events

--

Hosting

--

Free
Feb 27 · 08:00 PST