Introduction to Software Exploitation, May 21-22 (20190521)
Introduction to Software Exploitation, May 21-22 (20190521)
Location: Delft. In this course we look at typical mitigation techniques and/or bypassing techniques which make software exploitation hard. We cover the basics of memory corruption issues, specifics of embedded device and kernel...
Get this course (€2,200.00)
Memory Corruption Essentials (online) (MCEONLINE)
Memory Corruption Essentials (online) (MCEONLINE)
This course provides a thorough guide to memory corruption issues. We cover arbitrary writes, the most severe type of memory corruption vulnerabilities, the classic buffer overflows and the subtle off-by-one vulnerability. We discuss the...
Get this course (€450.00)