Author: Ravi, Thomas, Chris
Slides
Required Files
Goal:
Learn about binary exploitation fundamentals
Topics Covered:
- Buffers
- Buffer Overflow
- The Stack
- Control Flow Hijacking
- Overwriting Return Address
- Win Functions
- Shellcode
- Attack Mitigations
How to Run this meeting:
- Announce meetings, rerun stack 1-5
- Go through the slides
- Walk through stack 0 and stack 1
Description:
PWN, or Binary Exploitation is a fundamental skill for learning Security. This meeting begins to explain the fundamentals behind attacking binaries.