This lab on Buffer Overflow assesses the learner’s understanding of how an existing Buffer Overflow vulnerability in a cryptocurrency cyber range can be discovered and exploited.
Learning Objectives
On successful completion of this course, learners should have the knowledge and skills required to:
- Understand how adversaries can exploit such vulnerabilities to cause the arbitrary execution of malicious code with the privileges of the application