This event is part of our ongoing series about IT Security. In this session, Carl Svensson, a security professional working in the Google Offensive Security team, will give us an introduction to Binary Exploitation.
What is Binary Exploitation?
Binary exploitation is the process of undermining a compiled application such that it violates some trust boundary in a way that is advantageous to the attacker. [1]
Join us to level up your hacking skills and score at your next Capture The Flag competition!
[1]: https://trailofbits.github.io/ctf/exploits/binary1.html
Carl Svensson is a security professional working for the Google Offensive Security team performing red team exercises to improve security at Google. He has a keen interest in reverse engineering, low-level exploitation, and cryptography. His spare time is spent playing CTFs or just relaxing with some long-distance running or playing video games.
DSC Co-Lead
DSC Co-Lead
DSC Co-Lead
DSC Co-Lead
Core Team Member
Core Team Member