|Introduction to Software Exploitation, May 21-22 (20190521)|
Location: Delft. In this course we look at typical mitigation techniques and/or bypassing techniques which make software exploitation hard. We cover the basics of memory corruption issues, specifics of embedded device and kernel...
|Get this course (€2,200.00)|
|Memory Corruption Essentials (online) (MCEONLINE)|
This course provides a thorough guide to memory corruption issues. We cover arbitrary writes, the most severe type of memory corruption vulnerabilities, the classic buffer overflows and the subtle off-by-one vulnerability. We discuss the...
|Get this course (€450.00)|