Search This Blog

Tuesday, January 31, 2017

Some examples of vulnerable code and how to find them

I have previously recommended a course entitled Software Exploits by Open Security Training, and similarly, a book “called The Shellcoder’s Handbook: Discovering and Exploiting Security Holes. Using some of the examples presented in the book, I thought it would be a good idea to explore how the theory on real code vulnerabilities stands true.



Some examples of vulnerable code and how to find them

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.