Skip to content


Published on

Walk through a sample vulnerable program and understand its security weaknesses as you disable various protection mechanisms. Create an automated exploit from a known vulnerable program. By looking at this fun program (War Games) from an attacker’s perspective, it prepares the developer to embrace the attacker mindset.