Hey everyone!
I want to thank everyone who came to the meeting on Tuesday. I hope everyone enjoyed the introduction to memory corruption (specifically buffer overflow vulnerabilities), and next meeting we will cover how a buffer overflow vulnerability can be leveraged to by an attacker to execute code of his/her choice (our example being to create a shell on the system). As a reminder, our next meeting will be on Tuesday April 3rd, 2012.
Until then, you can find the slides from the last meeting here. I look forward to seeing everyone at the next meeting!
-Jordan
No comments:
Post a Comment