TUM Logo

Advanced Binary Exploitation

Advanced Binary Exploitation  

Praktika 6 SWS / 10 ECTS
Veranstalter: Fabian Kilger, Manuel Andreas, and Fabian Franzen
Zeit und Ort:

Course planned:

Beginn:


 

Please note: This is an advanced course. Knowledge of contents taught in Binary Exploitation 1 is a formal requirement.

 

Dates

  • 2023-07-11, 11.00h [Slides]: Kick-Off meeting in Room 01.08.033

Registration

Registration in the matching system until 2023-07-20 00:00 is required to participate. There is no qualification task for this course. Only students who graduated from Binary Exploitation 1 are eligible for participation. If you want to participate, additionally to the registration in the matching system, send an e-mail to kilger@sec.in.tum.de containing your name, your matriculation number, the name of the course, and the semester in which you passed Binary Exploitation 1.

If you have good experience in Binary Exploitation from a course at a different university, please send an e-mail with proof and details about the course's contents/syllabus.

Update: 5 slots are still open.

Contents

  1. Exploiting (and securing) programs running on operating systems other than Linux
  2. Exploiting (and securing) programs running on hardware different from x86-64
  3. Exploiting (and securing) targets such as OS Kernels, Hypervisors and Browsers

Previous Knowledge

Binary Exploitation 1, Exploiting 64 bit Linux ELFs, glibc heap internals, Bypassing common protection mechanisms, Operating Systems, C/C++ Programming Languages, Computer Architectures

Literature

hacking_the_art_of_exploitation_2nd_edition.jpg

Hacking: The Art of Exploitation
Jon Erickson, Second Edition, No Starch Press, 2009

Building Secure Software Exploiting Software: How to break code
G. Hoglund und G. McGraw, Addison-Wesley, 2004.
6444095.png

CTF-Writeups

ctftime.org