A Hacker's Guide to Exploitation: Virtual Workshop
The art of exploitation requires research, planning, and careful execution. In this session, Jim Holcomb will cover the hacker's methodology including how hackers and penetration testers identify vulnerabilities, conduct research, craft exploits, and get access to vulnerable systems.
Attendees will learn:
A mixture of automated and manual tools to successfully exploit a famous vulnerability and gain complete control of our target.
- The Hacker's Methodology
- Core components involved in exploiting a vulnerability
- Tradecraft regarding overcoming obstructions
- How to successfully exploit a vulnerability
About Jim Holcomb:
Jim Holcomb has over ten years of experience in technology, web development and security across enterprise grade applications. As a security driven developer, Jim focused on integrating security into the software development life cycle of Evolve Security and Select Client Software Development Projects, focused on identifying potential threats at the application level prior to deployment, and providing post deployment support.
As a member of Evolve Security’s Security Team, Jim has been utilizing his extensive background in Web Technologies and programming to mitigate application vulnerabilities for clients as well as continuing to develop Evolve Security’s internal suite of security tools.
Jim has led and delivered Penetration Assessments, Wireless Access Testing, and Application Security Assessments for organizations of varying sizes and industries, including Fortune 500 companies.
Jim holds a B.A. in Economics from Hamilton College.
· Offensive Security Certified Professional (OSCP)
· Evolve Security Certified Professional Penetration Tester (ESCPT)