SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAlthough much has been written about software vulnerabilities, little has been made publicly available on how to go about discovering new ones. How does one go about discovering a brand new vulnerability and exploiting it? This paper will provide some insight, by examining a fictitious incident centered on one such vulnerability in a root SUID program. It is the hope of the author to remove any false sense of security about software that does not have publicly disclosed vulnerabilities.