The art of exploitation requires research, planning, and careful execution. In this session, Jim Holcomb (OSCP, ESCPT) will cover the hacker's methodology including how hackers and penetration testers identify vulnerabilities, conduct research, craft exploits, and get access to vulnerable systems.
Attendees will learn:
A mixture of automated and manual tools to successfully exploit a famous vulnerability and gain complete control of our target.
- The Hacker's Methodology
- Core components involved in exploiting a vulnerability
- Tradecraft regarding overcoming obstructions
- How to successfully exploit a vulnerability
Please send any question you have to email@example.com or call (312) 957-5682