TUM Logo

Binary Exploitation

Binary Exploitation  

Praktika 6 SWS / 10 ECTS
Veranstalter: Fabian Kilger and Ludwig Peuckert
Zeit und Ort:

Preliminary Meeting: Thursday, 03 February 2022 / 11.00 h - Onlinekonferenz

Link: https://bbb.in.tum.de/fab-4ht-k32


Praktikum: Tuesday, 14.00 - 16.00 h - Room: 01.05.013

Start: Tuesday, 26.04.2022

Beginn: 2022-04-26

The lecture is given in english
The slides are available in english




  1. Solve the qualification challenge (honeynet.sec.in.tum.de:1337)
    Hint: (if your exploit works only locally) read() may not work as expected if large packets (i.e. larger than 576 Bytes) are received due to fragmentation. Try to avoid sending packets larger than 576 Bytes.
  2. Submit the flag at honeynet.sec.in.tum.de/bx
  3. Register via the matching system
    Update: Remaining spots can be filled after solving the qualification challenge. We currently have (5) spots free!
    After solving the qualification challenge and submitting the flag, please send us a mail!
    This page will be updated with the remaining spots!
    Update2: Registration is still possible after completing the challenge, but only before the first class!


  1. Debugging and Analysis Tools on Linux (x86-64)
  2. Common Exploitation Techniques on Linux (x86-64)
  3. Common Exploit Mitigations on Linux (x86-64)

Previous Knowledge

Operating Systems, C/C++ Programming Languages, Computer Architectures



Hacking: The Art of Exploitation
Jon Erickson, Second Edition, No Starch Press, 2009

Building Secure Software Exploiting Software: How to break code
G. Hoglund und G. McGraw, Addison-Wesley, 2004.