TUM Logo

Binary Exploitation

Binary Exploitation  

Praktika 6 SWS / 10 ECTS
Veranstalter: Fabian Kilger
Zeit und Ort:

Course planned:

Beginn: 2023-04-17

The lecture is given in english
The slides are available in english

 

Dates

  • Kick-Off meeting [Slides]  - Thursday, 02.02.2023 / 10.00 h / Room 01.08.033

Registration

  1. Solve the qualification challenge (honeynet.sec.in.tum.de:1337)
    (Note: The task is a chatbot designed to answer all your questions. If you have any questions regarding the challenge, ask it first!)
  2. Submit the flag at honeynet.sec.in.tum.de/bx
  3. Register via the matching system
    Update: There are 3 remaining spots. If you want to participate,  send a short mail to kilger@sec.in.tum.de after solving the qualification task and submitting the flag. Remaining slots will be given FCFS.

Contents

  1. Debugging and Analysis Tools on Linux (x86-64)
  2. Common Exploitation Techniques on Linux (x86-64)
  3. Common Exploit Mitigations on Linux (x86-64)

Previous Knowledge

Operating Systems, C/C++ Programming Languages, Computer Architectures

Literature

hacking_the_art_of_exploitation_2nd_edition.jpg

Hacking: The Art of Exploitation
Jon Erickson, Second Edition, No Starch Press, 2009

Building Secure Software Exploiting Software: How to break code
G. Hoglund und G. McGraw, Addison-Wesley, 2004.
6444095.png

CTF-Writeups

ctftime.org

hxp.io