Introduction to Binary Exploitation - Practical Buffer Overflow Challenges for Beginners

Introduction to Binary Exploitation - Practical Buffer Overflow Challenges for Beginners

CryptoCat via YouTube Direct link

0: Intro/Basics/Setup - Buffer Overflows - Intro to Binary Exploitation (Pwn)

1 of 11

1 of 11

0: Intro/Basics/Setup - Buffer Overflows - Intro to Binary Exploitation (Pwn)

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Introduction to Binary Exploitation - Practical Buffer Overflow Challenges for Beginners

Automatically move to the next video in the Classroom when playback concludes

  1. 1 0: Intro/Basics/Setup - Buffer Overflows - Intro to Binary Exploitation (Pwn)
  2. 2 1: Overwriting Variables on the Stack (pt 1) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
  3. 3 2: Overwriting Variables on the Stack (pt 2) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
  4. 4 3: Return to Win (Ret2Win) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
  5. 5 4: Ret2Win with Function Parameters (x86/x64) - Buffer Overflow - Intro to Binary Exploitation (Pwn)
  6. 6 5: Injecting Shellcode (Shellcraft/MSFVenom) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
  7. 7 6: Return to Lib-C (ret2system/one_gadget) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
  8. 8 7: Format String Vulnerabilities (printf) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
  9. 9 8: Leak PIE (bypass) and Lib-C (ret2system) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
  10. 10 9: Overwriting Global Offset Table (GOT) Entries with printf() - Intro to Binary Exploitation (Pwn)
  11. 11 10: Bypassing Stack Canaries (leak + write) - Buffer Overflows - Intro to Binary Exploitation (Pwn)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.