Heads up! You are currently viewing the legacy ASULUG website. Take me to the new site


Published on October 7th, 2013 | by Patrick Gaines


You are (not) Secure 1.5: Common Exploit Methods

Continuing yesterday’s recap of our seminar series here are the common exploit methods, we go over sql injections cross site scripting, and buffer overflows!



Tags: , , , , , , , , , ,

About the Author

I am a Computer Science student at Arizona State University specializing in Software Engineering, especially with Web and Mobile Applications and Service-Oriented Architecture/Computing.

Back to Top ↑