August 2018 – Software Exploitation (Part 1)

Biohazard symbol overlayed on some assembly code

Ready to learn about ‘buffer overflows’ and methods of exploiting binary software packages? Our next meeting will kick off a short series in the world of software exploitation and the tools and techniques used for analysis and execution. Continue reading