2023-04-22 –, Talks
This presentation has as objective to explain how 0day are found through Fuzzing technique.
I'll be explaining how you can create a fuzzer, what are types of fuzzers and types of targets.
And how you can find a Buffer Overflow vulnerability, and how to write step-by-step your own exploit.
2 PoC demos included, of course!
Brazilian, certified C|EH, having begun his studies about Information Security 13 years ago, and passed 11 years has realized projects of Application/Infrastructure Penetration Test, Security Analysis, Code Review and Hardening for industries such as: Telecommunications, Aviation, Financial Institutions, Information Technology and Mining.
In his free time like of research and practice news techniques of Attack and something of Reverse Engineering.
Speaker at many conferences as: Hack In The Box, Ekoparty, Arab Security Conference, Red Team Village, Stackconf, MorterueloCON, BSides Calgary, BSides Newcastle, BSides Athens, etc...
Author:
From SEH Overwrite to get a shell – Pentest Magazine
Covert Channel Technique Explained - Pentest Magazine
From Fuzzing to Get a Shell – Pentest Magazine
Stack Overflow - Hakin9 Magazine