An Introduction to Exploitation

  • Date 05 Jun 2018

An Introduction to Exploitation

05 Jun 2018, 10:30 - 11:15

Geek Street
Language:
English

Exploits have been the core of how cyber criminals and nation state actors distribute malicious code for many years, from popping shells remotely to exploiting browsers, have you ever wondered how they work? In this session James Lyne will give a beginner friendly, but technical introduction to exploitation with live demonstrations so you can see exactly how they do it.

Learning Outcomes:

  1. Understand how exploits work
  2. Gain familiarity with reverse engineering tools
  3. Understand basic exploitation and the concepts behind more advanced modern exploits
  4. Understand the effectiveness of exploit mitigations in defeating such attacks
  5. Gain an insight in to a technical discipline you may wish to further pursue after the session

Contributors

  • James Lyne

    Speaker

    Global Research Advisor

    Sophos

    James Lyne is global research advisor at the security firm Sophos. James, a self-professed ‘massive geek’ has technical expertise spanning a variety...

1. Mitigate the effects of new vulnerabilities and exploits 2. Balance, manage and prioritise risk

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.