Download pdf
Download pptx
Participants will hack into a series of vulnerable servers and get onto winners boards. Instead of using tools, you will create your own attacks. The easier challenges require nothing but a web browser: command injection and SQL injection. The harder challenges require a Kali Linux virtual machine and exploit buffer overflows at the binary level.