IT Security II: Applied Exploits
Organizer: | iT++ Enterprise Information Services |
Duration: | 2 days |
Participants: | 7 Personen, IT professionals - freelancers and consultants |
These training sessions were carried out as IT seminars for IT professionals who have extensive software development experience as well as C and Assember familiarity. Based on practical, hands-on examples, various techniques were developed and demonstrated. Participants were sensitized to problems that can occur when developing secure program codes.
Content:
- Categorization of Exploits based on their way of functioning
- Analysis von Exploits
- Proof of concept for:
- Buffer-Overflow
- Heap-based Overflows
- Format Strings
- Return into libc
- Defense strategies and their environment
- Tools und literature
- Overview of information sources