Browsing Category

Hacking

Format String Vulnerabilities

Description This course teaches exploit development concepts for Linux (x86_64) and it is specifically focused on format string vulnerabilities. This course begins by introducing students to the format string concepts on Linux x86_64
Read More...

Ethical Hacking: Enumeration

Description Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targets and in optimizing their penetration testing. In this course, instructor Malcolm Shore teaches the basic methods of
Read More...