This month the Grand Rapids ISSA gets technical. Reverse engineering, shell coding and “pwning” things. These hacking skills can seem daunting, but this talk is aimed at a wide audience including beginners. This talk will cover how to leverage a known user validation bug from a segfault to a shell. We’ll then upgrade our exploit to bypass increasingly better mitigations through the years, and discuss resources to continue improving.
About our Speaker:
Jaime is an electrical engineer turned software developer turned security researcher. Her experience spans embedded systems to web and mobile apps to automotive. She caught the infosec bug through playing CTFs, and now works at GRIMM hacking cars. When she’s not adding LEDs to things or volunteering with her local software community, she can be found taking her dog for overdue walks.
About our Sponsor:
This event is sponsored by Area 1 Security.
Area 1 offers the cybersecurity industry’s only preemptive, comprehensive and performance-based phishing defense that proactively hunts for phishing campaigns and blocks them before they hit employee’s inboxes. Recognized by Gartner as the only solution for preventing business email compromise (BEC) (the #1 cause of security breaches worldwide), Area 1 is trusted by more than 150 leading enterprises across the financial services, healthcare, aviation, manufacturing, consumer goods, critical infrastructure and other industries.
Where is this event? At Davenport University, the Lettinga Main Campus. Located at 6191 Kraft Ave SE, Grand Rapids, MI 49512. We will be in the Sneden Center Meeting Hall 3.
Social networking from 2:30 – 3:00 PM
Presentation from 3:00 – 4:30 PM
Open discussion and questions from 4:30 – 5:00 PM
Join us and invite your friends!