Search

Search

A Hacker’s world: How to exploit code

Main Speaker:

Tracks:

Course ID:

44112

Time:

Daily seminar
9:00-16:30


If you control the code - you control the world. Code is, at the end of the day, "just" lines of text, bytes, chars etc, but can also be digitally converted to almost any form - e.g. sound waves. In this unique workshop we'll explore how code can be exploited in creative ways by hackers, including:
  • Intro to cyber crime and cyber security
  • Anatomy of an attack
  • Examples of payloads, "cradles" etc
  • Running anything in memory without touching disk
  • How do we build trust into code?
  • What can we do to make sure our application's code is as secure as possible
  • Exfiltrating data with code in air-gapped networks

For further information, fill in your details and we will contact you shortly


Contact us

For further information, fill in your details and we will contact you shortly