Hands-on Windows Exploit Development null Ahmedabad Humla 27 April 2019 Hands-on Windows Exploit Development
Abstract
In the Windows Exploit Development Humla Training session, you will learn how to write your own code for memory corruption exploits.
The module covers the following primary topics: -
Basics of Assembly Language
Control Flow and working of Stack
Vanilla Buffer overflow
Case study - 1
Case Study - 2
Identifying Bad Characters
JMP / CALL Technique
POP POP RET Technique
Overwriting SEH & nSEH
Speaker
A Nerd, Geek and a noob completing his journey from noob to leet. Finding the solution to every problem from daily life to pentesting world.
Timing
Starts at Saturday April 27 2019, 11:00 AM. The sessions runs for about 7 hours.