TUM Logo

Binary Exploitation

Binary Exploitation  

Praktika 6 SWS / 10 ECTS
Veranstalter: Fabian Kilger and Ludwig Peuckert
Zeit und Ort:

Preliminary Meeting: Thursday, 03 February 2022 / 11.00 h - Onlinekonferenz

Link: https://bbb.in.tum.de/fab-4ht-k32

 

Praktikum: Tuesday, 14.00 - 16.00 h - Room: 01.05.013

Start: Tuesday, 26.04.2022

 
 
 
 
Beginn: 2022-04-26

The lecture is given in english
The slides are available in english

 

Dates

Registration

  1. Solve the qualification challenge (honeynet.sec.in.tum.de:1337)
    Hint: (if your exploit works only locally) read() may not work as expected if large packets (i.e. larger than 576 Bytes) are received due to fragmentation. Try to avoid sending packets larger than 576 Bytes.
  2. Submit the flag at honeynet.sec.in.tum.de/bx
  3. Register via the matching system
    Update: Remaining spots can be filled after solving the qualification challenge. We currently have (5) spots free!
    After solving the qualification challenge and submitting the flag, please send us a mail!
    This page will be updated with the remaining spots!
    Update2: Registration is still possible after completing the challenge, but only before the first class!

Contents

  1. Debugging and Analysis Tools on Linux (x86-64)
  2. Common Exploitation Techniques on Linux (x86-64)
  3. Common Exploit Mitigations on Linux (x86-64)

Previous Knowledge

Operating Systems, C/C++ Programming Languages, Computer Architectures

Literature

hacking_the_art_of_exploitation_2nd_edition.jpg

Hacking: The Art of Exploitation
Jon Erickson, Second Edition, No Starch Press, 2009

Building Secure Software Exploiting Software: How to break code
G. Hoglund und G. McGraw, Addison-Wesley, 2004.
6444095.png

CTF-Writeups

ctftime.org

hxp.io