How to exploit stack-based buffer overflow
“Buffer overflow: the mother of all vulnerabilities”
Taught by: Peter Zsiros
Length: 6 hours
How about writing your first exploit?
In this course you will learn about the most basic exploit family, the stack based exploit. It is the oldest but still valid technique to hack an application and start to learn writing more advanced exploits. We will write an exploit step-by-step for a sample application. Through this procedure you will understand the inner workings of stack based exploits and by the end of the course you will be able to write new ones on your own.
The training covers the development of a basic 32 bit stack based exploit (no DEP bypass, no ASLR, no stack cookie) that will ground the basis for more advanced exploit writing techniques.
Join our course and start writing exploits with us.
Live instructor-led course
It will be a live course so you will work together simultaneously with the trainer and the other students and will have the possibility to ask your questions. More about live classes
Programmers, security specialists
We will run maximum 2 virtual machines simultaneously, recommended minimum 8GB memory (2GB for each, and 4 remains to host), about 40GB disk space for virtual machines.
You will be able to write basic level stack-based exploits
Session 1 - Stack-based exploit against a sample application
Finding the vulnerability in source code, writing the exploit.
Session 2 - Stack-based exploit against a real application
Finding the vulnerability with fuzzer, writing the exploit.