Binary exploitation is the process of subverting a compiled application such that it violates some trust boundary in a way that is advantageous to you, the attacker.
What you will learn
This tutorial introduces the concept of exploiting a binary file (executable) using a common attack called Stack Based Buffer Overflow. After completing, the participant should be able to: * To detect a simple buffer overflow. * To exploit a simple buffer overflow vulnerability.
It is recommended, but not necessary to be familiar with the following concepts: * Assembly language * C programming language * Basic linux usage and commands * GDB
- TIME60 MINUTES
- COST10 CRYSTALS