TUM Logo

Binary Exploitation

Binary Exploitation  

Praktika 6 SWS / 10 ECTS
Veranstalter: Fabian Kilger
Zeit und Ort:

Preliminary Meeting: Thursday, 06.02.2025 / 11.00 h / Room 01.08.033

Beginn:

The lecture is given in english
The slides are available in english

 

Dates

  • Kick-Off meeting [Slides]: Thursday, 06.02.2025 / 11.00 h / Room 01.08.033

Registration

  1. Solve the qualification challenge individually (courses.sec.in.tum.de:54397)
  2. Submit the flag at courses.sec.in.tum.de/bx
  3. Register via the matching system

Update: There are still remaining spots open, they can be claimed FCFS after solving the qualification challenge

The course has officially started and registration is no longer possible.

Contents

  1. Debugging and Analysis Tools on Linux (x86-64)
  2. Common Exploitation Techniques on Linux (x86-64)
  3. Common Exploit Mitigations on Linux (x86-64)

Previous Knowledge

Operating Systems, C/C++ Programming Languages, Computer Architectures

Literature

hacking_the_art_of_exploitation_2nd_edition.jpg

Hacking: The Art of Exploitation
Jon Erickson, Second Edition, No Starch Press, 2009

Building Secure Software Exploiting Software: How to break code
G. Hoglund und G. McGraw, Addison-Wesley, 2004.
6444095.png

CTF-Writeups

ctftime.org