Skip to content

Let's Talk About Exploit Development & Ransomware

Photo of Suzie Rybicki
Hosted By
Suzie R.
Let's Talk About Exploit Development & Ransomware

Details

Introduction to Exploit Development: Simple Win 32 Buffer Overflow to Remote Code Execution

Jason Davison

There isn't anything quite like writing your first working exploit. The focus of this talk is to equip everyone with a basic knowledge and understanding of the process involved around exploit development. We are going to take a look at exploiting a simple Win 32 buffer overflow and the steps / process involved with exploit development. We will be covering fuzzing, the basics of debugging, bad characters, and the difference between bind and reverse shells.

Seeking out easy profits, cybercriminals are aggressively targeting businesses with phishing attacks that deliver ransomware.

Josh Shilko

The allure of immediate profits from ransom payments is fueling a massive surge in ransomware attacks on businesses. Every industry has been impacted, from critical infrastructure to financial services to healthcare. Ransomware is most often deployed via phishing. Cybercriminals exploit the one vulnerability that cannot be patched - employees - to slip past cyber defenses and install their ransomware. Then, faced with the choice of paying up or losing essential data, many victim organizations opt to pay the ransom to save (hopefully) their own data. But this only serves to fuel more attacks.

Photo of Charleston Cybersecurity Meetup group
Charleston Cybersecurity Meetup
See more events
SCRA Building - Charleston
645 Meeting Street · Charleston, SC