TUM Logo

Binary Exploitation

Binary Exploitation  

Praktika 6sws / 10ects (Kursbeschreibung)
Veranstalter: Julian Kirsch and Clemens Jonischkeit
Zeit und Ort:

Wednesday, 14:00 – 15:30, 01.05.013

Beginn: 2019-04-24

The lecture is given in english
The slides are available in english
The exam will be in english

 

Additional Information: Here

Dates

  • 2019-01-29, 14:30 Uhr: Kick-Off meeting in Room 01.08.033 [slides]

Registration

Registration in the Matching System until 2019-02-14 00:00 is required to participate. Please solve a qualification task if you want to participate in the course. Further details can be found here after the kickoff meeting.

Contents

  1. Debugging and Analysis Tools on Linux (x86-64)
  2. Common Exploitation Techniques on Linux (x86-64)
  3. Common Exploit Mitigations on Linux (x86-64)

Previous Knowledge

Operating Systems, C/C++ Programming Languages, Computer Architectures

Literature

hacking_the_art_of_exploitation_2nd_edition.jpg

Hacking: The Art of Exploitation
Jon Erickson, Second Edition, No Starch Press, 2009

Building Secure Software Exploiting Software: How to break code
G. Hoglund und G. McGraw, Addison-Wesley, 2004.
6444095.png

CTF-Writeups

ctftime.org

hxp.io