| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
In this course we will be teaching basic exploit
development on a linux os. If you haven't used gdb or done much reverse
engineering, this class will be a good introduction. We will be looking at some
old school attacks, showing you why they are a problem, and writing some basic
exploits from scratch. This is not an advanced class so rop pirates and heap
ninjas shouldn't attend unless you want a review of the basics. This course will
consist of both lecture and hands on exercises, so please bring your laptop with
your favorite VM player. John grew up in Nitro, West Virginia, but is currently living in the
Northern Virginia/DC area. Security has been his passion and his hobby for
the past 14 years. He recently walked away from his job in IT management to
pursue his career as a security researcher. This year he and a small team
known as the XRG will be running the CTF here at hack3rcon. Lately, he has
been spending his time reading, traveling, writing security tools, and
studying reverse engineering and exploit development.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast