Update: Unfortunately we are cancelling the September meeting due to weather. We will reschedule this presentation for our next regular meeting on 11 October.
September is National Preparedness Month – so prepare yourself by joining us at the next RISE meeting to better understand the threats facing your IT systems. We will continue to explore tools and techniques that attackers use to exploit software for code execution and shell access.
At our August meeting Shane Kennedy introduced us to basic concepts of binary execution and methods that attackers can use to smash the stack and insert code for shell access. Now he’ll be expanding on those concepts to show additional tools and techniques that are used to bypass normal execution and gain unauthorized access privileges. Don’t despair if you missed part 1 as there will be plenty of visuals and demonstrations to get you right up to speed.
Date: September 13th, 2018 @ 5:30pm
Topic: Software Exploitation (Part 2)
Park in the side lot or Riverside Center parking garage and use the main building entrance (faces parking). Take the stairs or elevator to the 1st floor. Continue forward and follow the signs to Conference Room 1A. Staff at the main entrance information desk can assist with directions to the conference room if needed.
Shane Kennedy is an Army Civilian working as an IT Specialist (INFOSEC) in the New River Valley. Previously a systems engineer for Montgomery County, Virginia, he worked on 911 emergency dispatch and mobile law enforcement platforms as well as the County’s line-of-business systems and networks. He’s also worked as an independent subject matter expert for SANS, supporting on-line students, reviewing lab exercises, and writing quiz questions for many courses. Shane holds the GCWN, GCUX, GCIH, GCIA, and GPEN security certifications from GIAC and is currently preparing for the GSE exam. Unplugged, Shane enjoys building scale models, playing Dungeons and Dragons, and spending time with his family.