CISC


CISC

scroll down

Binary Exploitation

Binary Exploitation deals with finding and exploiting loopholes in compiled software that you have access to. Although binary exploitation is a very broad term given to different exploit mechanisms, The workshop shall mostly be dealing with overflow errors, how an overflow and improper handling of library routines in languages like C and C++ can land you in deep trouble, and methods to mitigate them.

Network Exploitation

Since computers are connected via network, it logically must be possible to attack one computer from another via loopholes in the underlying network. Learn about the common network vulnerabilities that allow actions like sniffing. Ultimately, the various methods of protection available shall be discussed.

Web Exploitation

Today, almost all of the day-to-day activities have become online, and they all come with a web interface. This suggests how crucial it is to secure a web application. Starting from basics of web exploitation, like SQL injections, expect to see a lot more of other web attacks that happen in the digital space, and how to mitigate against them

Malware & Forensics

Knowing all the ways to attack an application is seldom enough to recover after one. One needs to know a lot more about what caused the attack, how was it executed and what all data has been lost or stolen, and many more things of unexpected nature. Thus, a bare minimum understanding of malware is needed, to understand if it is a malware that you are a victim of, and what kind of malware it is, so you can patch it up. You might additionally want to see traces of activity that was left behind after the attack, and that is where computer forensics come to picture. Expect to see basic ways to recognize malware, and also basic information on forensics so you know where to look for what.

www.000webhost.com