Our Scenarios
pwn

Binary Exploitation 101

Info

Binary exploitation is the process of subverting a compiled application such that it violates some trust boundary in a way that is advantageous to you, the attacker.

What you will learn

This tutorial introduces the concept of exploiting a binary file (executable) using a common attack called Stack Based Buffer Overflow. After completing, the participant should be able to: * To detect a simple buffer overflow. * To exploit a simple buffer overflow vulnerability.

Scenario pre-requisites

It is recommended, but not necessary to be familiar with the following concepts: * Assembly language * C programming language * Basic linux usage and commands * GDB

Technical Details

N/A

  • MODESINGLEPLAYER
  • TYPECCL
  • DIFFICULTYINTERMEDIATE
  • TIME60 MINUTES
  • COST10 CRYSTALS
SHARE