The primary goal of this course is to provide you with practical exposure to the world of bug hunting. After taking this course, you will have a better understanding of the approaches (reverse engineering, exploit development) that bug hunters use to find security vulnerabilities. You will learn how to exploit Buffer Overflows on Windows systems. This is an initial course and begins from the very basics of exploitation and is beginner-friendly.
BEST COURSES
[2021] Data Science: A-Z Bootcamp + Real Cases (Version 8.1)
A-Z Data Science Training: Advanced Statistics & Machine Learning with R, Excel + Tableau, Power BI from Best Seller
What you'll learn
GET aware about...