More and more devices and systems can now be reached through the Internet and other networks, exposing them to direct attacks. This creates challenges for many companies to appropriately secure their systems and protect themselves against possible hacker attacks.The main focus of this seminar is the field of binary exploitation: for example, how programming errors in C code can be exploited to inject and execute external code.
Target group: group Developers, testers, operators and users
Duration: 3 days in class
Requirements: Linux basics: Routine operations with the Bourne-Again Shell (BASH) and the GNU Debugger (GDB)
Programming knowledge: Fluent reading and understanding of code in C, programming experience in C or Python
Assembler: Reading and understanding of x86_64 assembler, programming in assembler is not required