Introduction to Exploit Development: Simple Win 32 Buffer Overflow to Remote Code Execution



Jason Davison



There isn't anything quite like writing your first working exploit. The focus of this talk is to equip everyone with a basic knowledge and understanding of the process involved around exploit development. We are going to take a look at exploiting a simple Win 32 buffer overflow and the steps / process involved with exploit development. We will be covering fuzzing, the basics of debugging, bad characters, and the difference between bind and reverse shells.



Seeking out easy profits, cybercriminals are aggressively targeting businesses with phishing attacks that deliver ransomware.



Josh Shilko



The allure of immediate profits from ransom payments is fueling a massive surge in ransomware attacks on businesses. Every industry has been impacted, from critical infrastructure to financial services to healthcare. Ransomware is most often deployed via phishing. Cybercriminals exploit the one vulnerability that cannot be patched - employees - to slip past cyber defenses and install their ransomware. Then, faced with the choice of paying up or losing essential data, many victim organizations opt to pay the ransom to save (hopefully) their own data. But this only serves to fuel more attacks.