How to Pwn: Then and Now
If you have a basic conceptual understanding of binary exploitation (specifically, stack-based buffer overflows) but aren't quite 100% sure what concepts like 'ASLR', 'RELRO', 'PIE' or 'ROP' mean, this is the course for you. The goal of this guide is to give an overview of modern binary exploitation mitigations, why they were introduced and how they have been defeated. All in a practical and hands-on way.
Prerequisites
- Basic Linux command line usage
- Rudimentary understanding of buffer overflows
- Basic programming skills (Python)
Example Curriculum
Introduction
Available in
days
days
after you enroll
No Mitigations
Available in
days
days
after you enroll
NX and DEP
Available in
days
days
after you enroll
Stack Canaries or Stack Cookies
Available in
days
days
after you enroll
ASLR - Address Space Layout Randomization
Available in
days
days
after you enroll
PIE
Available in
days
days
after you enroll
Exhibition of Mastery
Available in
days
days
after you enroll