University of Cincinnati Logo
 

20-CS-6056 - Security Vulnerability Assessment
Electrical Engineering & Computer Science

Notes Contributed by Students
   
    Doug Flick (2 Mar 2018)
        Solution to lab 3 using automatic use of gdb-peda
          Resources:
            Shellcoders Handbook
            Hacking: the Art of Exploitation
          War Games:
            Exploit Exercises
            Leviathan
            IO Wargame
          Youtube:
            Binary Hacking Course
 
    Student number 2
        - link to student contribution (date)
ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson