Overview
Students will identify the use of a Buffer Overflow exploit through the use of Wireshark and by analyzing items found in the captured traffic. The students will also find the exploit code and isolate the different aspects of a Buffer Overflow exploit.
Learning Partner
CYBRScore
Cybersecurity Technical Hands-on Labs