Hat Secure Training By Danang Heriyadi. [SHARE] Courses Linux Exploit Research 2012 - Purpose of the Course - Introducing Vulnerability Software - Register Processor - Intruksi Assembly - Buffer Overflows - Shellcode - Exploit - Stack & Heap - Basic Buffer Overflow - Basic Stack Overflows with Linux - Smashing stack for fun and profit - Basic shellcode development - DTORS Exploitation - Heap corruption and exploitation Register : http://hatsecure.com/exploit