ghidra

1
reputation
1
4

Binary Exploitation: Apply a range of skills to exploit security vulnerabilities in programs, such as buffer overflows, format string bugs, and heap vulnerabilities. Cryptography: Crack cryptographic systems ranging from classical ciphers to complex protocols with math and logic. Miscellaneous: Use anything from scripting language knowledge to forensic analysis to solve problems that don't fit into a rigorous category. Reverse Engineering: Examine compiled programs given to you and figure out their inner workings. These executables span everything between simple programs and purposely obfuscated code. Web Exploitation: Find various vulnerabilities in web pages, and use them to get access to areas you shouldn't. This topic covers a wide range of vulnerabilities, including SQL injections and cross-site scripting.