Module: Exploitation Scenarios
You have learned several different security concepts in this course. It’s time to put them together and solve challenges requiring non-trivial exploitation chains!
The lectures for this module are:
- Exploitation: Introduction (slides here)
- Exploitation: Hijacking to Shellcode (slides here)
- Exploitation: Side Effects (slides here)
- Exploitation: JIT Spray (slides here)
Being a “putting it together” module, all lectures of all previous modules are also critical.
Practice problems for this module are live on the dojo!