This event is part of our ongoing series about IT Security. In this session, Carl Svensson, a security professional working in the Google Offensive Security team, will give us an introduction to Binary Exploitation. What is Binary Exploitation? Binary exploitation is the process of undermining a compiled application such that it violates some trust boundary in a way that is advantageous to the attacker. [1] Join us to level up your hacking skills and score at your next Capture The Flag competition! [1]: https://trailofbits.github.io/ctf/exploits/binary1.html
GDSC Lead
GDSC Lead
Core Team Member
Core Team Member
Core Team Member
Core Team Member
Core Team Member
Core Team Member
Core Team Member
TUM
Core Team Member
Core Team Member
Core Team Member