How to Pwn: Then and Now
If you have a basic conceptual understanding of binary exploitation (specifically, stack-based buffer overflows) but aren't quite 100% sure what concepts like 'ASLR', 'RELRO', 'PIE' or 'ROP' mean, this is the course for you. The goal of this guide is to give an overview of modern binary exploitation mitigations, why they were introduced and how they have been defeated. All in a practical and hands-on way.
Prerequisites
- Basic Linux command line usage
- Rudimentary understanding of buffer overflows
- Basic programming skills (Python)
Example Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll