In the art of binary exploitation, there is one ominous “hacker” term you will hear quite often: shellcode. What is shellcode? How can it be used, and how do exploit developers create it? These questions and others will be addressed by John Hammond, a cybersecurity practitioner and online training personality. Join us to watch and learn the use of shellcode against vulnerable programs in both Linux and Windows, explore how to simply generate shellcode in Python, and even how to evade bad character restrictions with sub-encoding techniques and how to apply them as a pentester, researcher, bug bounty hunter or CTF player in this FREE EH-Net Live! webinar on Wed Jan 29, 2020 at 1:00 PM EST. Join us live to receive certificates for easy submission of CPEs!
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed