Network Analysis & Probing Variants
Constructed a multi-threaded network probe similar to Nmap implementing stealthy scanning techniques as well as a network dump analyzer mimicking the usage of WireShark, both written in C.
Memory Corruption Exploits & Prevention Techniques
Independent Study completed with Dr. Steven Myers to identify flaws that create vulnerabilities and code that leverages them; includes code review, exploit design, and implementations within a secure environment.
Primarily focused efforts on stack overflows, heap overflows, return-to-libc exploits, format string vulnerabilities, as well as address space layout randomization (ASLR) and other major prevention variants (PAX, NX).