June 17
12:00 — 16:00
Crash course for exploit development
A course for those who have long though about but have not gotten round to exploiting
binary vulnerabilities.
Course objective: Explain the concept of binary errors (overflows) and their operation. Demonstrate, how memory manipulation leads to code execution. Show the main approaches to exploiting. Explain the concept of mitigations and their evolution. After completing the course, students should be able to write an exploit for a vulnerability in a real application.
Required knowledge: the workings of x86 assembler, ability to utilise a disassembler, debugger, as well as an understanding of executable file formats.
Course objective: Explain the concept of binary errors (overflows) and their operation. Demonstrate, how memory manipulation leads to code execution. Show the main approaches to exploiting. Explain the concept of mitigations and their evolution. After completing the course, students should be able to write an exploit for a vulnerability in a real application.
Required knowledge: the workings of x86 assembler, ability to utilise a disassembler, debugger, as well as an understanding of executable file formats.