Brief introduction into Padding Oracle attack vector Brief introduction into SQL injection attack scenarios Input validation slides of web application workshop SEH based buffer overflow vulnerability exploitation Basic buffer overflow part1 Dive into exploit development