From 522b00612aa3d7fb514297a9fbe6526a27c7dc53 Mon Sep 17 00:00:00 2001 From: roadmap bot <135830415+roadmap-bot@users.noreply.github.com> Date: Fri, 30 Jun 2023 11:02:56 +0100 Subject: [PATCH] chore: add resource under cyber-security:security-skills-and-knowledge:other-attacks:buffer-overflow --- .../other-attacks/100-buffer-overflow.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md index 24ed4c95e..b3484e076 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md +++ b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md @@ -29,3 +29,5 @@ To prevent and mitigate buffer overflow vulnerabilities, the following strategie - Regularly scan code for vulnerabilities and conduct security audits. By being aware of buffer overflow vulnerabilities and implementing these preventive strategies, you can protect your software from potential attacks and keep your systems secure. + +- [Buffer Overflows (Hacksplaining)](https://www.hacksplaining.com/exercises/buffer-overflows) \ No newline at end of file