Binary Exploitation using Protostar null Bangalore Humla 13 January 2018 Binary Exploitation
Abstract
Following binary exploitation techniques will be discussed during the session:
Buffer Overflow.
Exploiting format string vulnerability.
Heap Overflow.
ret2libc.
Introduction to ROP.
Speaker
Timing
Starts at Saturday January 13 2018, 09:30 AM. The sessions runs for about 9 hours.