This event is part of our ongoing series about IT Security. In this session, Carl Svensson, a security professional working in the Google Offensive Security team, will give us an introduction to Binary Exploitation.
What is Binary Exploitation?
Binary exploitation is the process of undermining a compiled application such that it violates some trust boundary in a way that is advantageous to the attacker. [1]
Join us to level up your hacking skills and score at your next Capture The Flag competition!
[1]: https://trailofbits.github.io/ctf/exploits/binary1.html
Carl Svensson is a security professional working for the Google Offensive Security team performing red team exercises to improve security at Google. He has a keen interest in reverse engineering, low-level exploitation, and cryptography. His spare time is spent playing CTFs or just relaxing with some long-distance running or playing video games.
GDSC Munich Lead
GDSC Munich Lead
GDSC Munich Core Team
GDSC Munich Core Team
GDSC Munich Advisor
GDSC Munich Advisor
GDSC Munich Core Team
GDSC Munich Core Team
Technical University of Munich
GDSC Munich Core Member
GDSC Munich Core Member
TUM
GDSC Munich Core Team
GDSC Munich Core Team