Intercepting traffic and Man in the middle via ARP spoofingTalks about how ARP poisoning can be used to intercept the trafficcybersecurity infosec linux python scapy
SUID Exploitation - How Privileged Programs Can Be WeaponizedTalks about how SUID bit set programs can be exploited.cybersecurity infosec linux