IT Security II: Applied Exploits

Organizer: iT++ Enterprise Information Services
Duration: 2 days
Participants: 7 Personen, IT professionals - freelancers and consultants

These training sessions were carried out as IT seminars for IT professionals who have extensive software development experience as well as C and Assember familiarity. Based on practical, hands-on examples, various techniques were developed and demonstrated. Participants were sensitized to problems that can occur when developing secure program codes.

Content:

  • Categorization of Exploits based on their way of functioning
  • Analysis von Exploits
  • Proof of concept for:
    • Buffer-Overflow
    • Heap-based Overflows
    • Format Strings
    • Return into libc
  • Defense strategies and their environment
  • Tools und literature
  • Overview of information sources

laptopImg

laptopImg