Computing and Information Technology

Practical Exploitation


Listen Later

Paul Dowland examines common exploitation techniques and provides a practical demonstration of system compromise.
The live demo demonstrates that while some attacks may be technically simple, they often go wrong (sometimes with unexpected side-effects). The attacks are demonstrated in a virtualised environment using freely available tools.
The session was part of Secure South West 6 at Plymouth University on 9 February 2016.
[(CC) BY-NC-SA 2.0 UK]
...more
View all episodesView all episodes
Download on the App Store

Computing and Information TechnologyBy Plymouth University