Week 7: PWN I (Binary Exploitation)

Author: Ravi, Thomas, Chris

Slides Required Files


Learn about binary exploitation fundamentals

Topics Covered:

  • Buffers
  • Buffer Overflow
  • The Stack
  • Control Flow Hijacking
  • Overwriting Return Address
  • Win Functions
  • Shellcode
  • Attack Mitigations

How to Run this meeting:

  • Announce meetings, rerun stack 1-5
  • Go through the slides
  • Walk through stack 0 and stack 1


PWN, or Binary Exploitation is a fundamental skill for learning Security. This meeting begins to explain the fundamentals behind attacking binaries.