Challenges

Ex1: Authentication

Ex3: Fuzzing and Binary Exploitation

Ex4: Code Reuse & Crypto Attacks

Ex5: Car hacking & IoT

Bus-off attack

Megamos V2.0 Hacking