Presenter: Scott Hand
Date: 15 Sept 2012
Description: This presentation goes over basic exploitation techniques. Topics include:
- Introduction to x86 paradigms used exploited by these techniques
- Stack overflows including the classic stack smashing attack
- Format string exploits
- Heap overflows and metadata corruption attacks
The presentation makes use of the Protostar VM at Exploit Exercises.