null Global Committee elections are coming up! See the election repository for more information.

Fc770eeed2e36a3ddfe4f5aff9879ed3

Abstract

Following binary exploitation techniques will be discussed during the session:

  1. Buffer Overflow.

  2. Exploiting format string vulnerability.

  3. Heap Overflow.

  4. ret2libc.

  5. Introduction to ROP.

Speaker

upendra singh

Timing

Starts at Saturday January 13 2018, 09:30 AM. The sessions runs for about 9 hours.

Resources