This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
View analytic
Sunday, February 28 • 1:00pm - 6:00pm
Exploit Development Training & Competition FILLING

Sign up or log in to save this to your schedule and see who's attending!

Limited Capacity filling up

Participants will exploit a simple vulnerable Linux application, first to redirect execution to existing code, and then to gain remote code execution.  The first project has complete step-by-step instructions. Then they will compete to gain control of a series of applications
running on a remote server.

Everyone is welcome to compete, whether they attend the hands-on training or not.

We will use these tools:

  • Simple Python scripting

  • Gnu debugger

  • objdump


Participants will need to bring a laptop with Kali Linux 2.0 (x86) running as a real or virtual machine.  Prior experience with C and assembly language is helpful but not required.

avatar for Sam Bowne

Sam Bowne

City College San Francisco, City College San Francisco
Sam Bowne has been teaching computer networking and security classes at CCSF since 2000. He has given talks at DEFCON, HOPE, BayThreat, LayerOne, and Toorcon, and taught classes and many other schools and teaching conferences. He has a B.S. in Physics from Edinboro University of Pennsylvania and a Ph.D. in Physics from University of Illinois, Urbana-Champaign. Industry certs: CISSP, CEH, CCENT, WCNA, and more.

Sunday February 28, 2016 1:00pm - 6:00pm
DNA Lounge 375 11th St, San Francisco, CA 94103

Attendees (28)