Week 7: PWN I (Binary Exploitation)

Author: Ravi, Thomas, Chris

Slides Required Files


Goal:

Learn about binary exploitation fundamentals


Topics Covered:

  • Buffers
  • Buffer Overflow
  • The Stack
  • Control Flow Hijacking
  • Overwriting Return Address
  • Win Functions
  • Shellcode
  • Attack Mitigations

How to Run this meeting:

  • Announce meetings, rerun stack 1-5
  • Go through the slides
  • Walk through stack 0 and stack 1

Description:

PWN, or Binary Exploitation is a fundamental skill for learning Security. This meeting begins to explain the fundamentals behind attacking binaries.