lecture: Lazy Red

Exploiting lazy attackers

Event_large

Attackers and attacker tools can also be prone to the attacks and vulnerabilities. Some of them can be used to easily detect the attack or the attacker.

Some common attacks, tools and shells will be discussed which are often used on network and application layer.

Info

Day: 2019-09-14
Start time: 16:00
Duration: 00:30
Room: Tesla

Links:

Concurrent events