Fc770eeed2e36a3ddfe4f5aff9879ed3

Abstract

Following binary exploitation techniques will be discussed during the session:

  1. Buffer Overflow.

  2. Exploiting format string vulnerability.

  3. Heap Overflow.

  4. ret2libc.

  5. Introduction to ROP.

Speaker

upendra singh

Timing

Starts at Saturday January 13 2018, 09:30 AM. The sessions runs for about 9 hours.

Resources