Binary exploitation is the process of subverting a compiled application such that it violates some trust boundary in a way that is advantageous to you, the attacker.
What you will learn
This tutorial introduces the concept of exploiting a binary file (executable) using a common attack called Off-By-One (Stack Based). After completing, it the participant should have learned: * How to detect a simple off-by-one vulnerability. * How to exploit a simple off-by-one vulnerability.
It is recommended to be familiar with the following concepts: * Assembly language * C programming language * Basic linux usage and commands * GDB
- TIME60 MINUTES
- COST10 CRYSTALS