Summary Introduction Capture the Flag Find a CTF Find a Job Vulnerability Discovery Auditing Source Auditing Binaries Auditing Webapps Exploit Creation Binary Exploits 1 Binary Exploits 2 Webapp Exploits Forensics Toolkit Creation Toolkit Prep Operational Tradecraft Case Studies Contributing