Attack proxies / MitM Used to read and modity traffic between client server
10
Reverse engineering tools Used to transform binaries and other low level formats to more readable for
11
Exploit tools Used to asses the severity of the vulnerability and use it to pivot further into the system / network
12
Further material
Description:
Explore the world of ethical hacking from a developer's perspective in this 35-minute conference talk by Jarmo Lahtiranta from Insta Group. Gain insights into various hacking techniques, including SQL injections, and learn about essential tools such as vulnerability scanners, fuzzers, and attack proxies. Discover the importance of reverse engineering tools for transforming binaries into readable formats and understand how exploit tools are used to assess vulnerabilities and pivot within systems. Delve into the fundamentals of hacking, its implications for developers, and acquire valuable knowledge to enhance your cybersecurity skills.