Systems Exploitation
Software is commonly vulnerable to flaws and bugs that affect the program logic, intention, and executions. These vulnerabilities are further allowing an attacker to execute arbitrary malicious code on a target system. This class will cover both the identification of software vulnerabilities and the most common techniques used to exploit them. In addition, current existing techniques that attempt to remediate the threat of software vulnerability exploitation will be discussed.