AI Engineer - Learn how to integrate AI into software applications
Save 43% on 1 Year of Coursera Plus
Overview
Syllabus
0: Intro/Basics/Setup - Buffer Overflows - Intro to Binary Exploitation (Pwn)
1: Overwriting Variables on the Stack (pt 1) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
2: Overwriting Variables on the Stack (pt 2) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
3: Return to Win (Ret2Win) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
4: Ret2Win with Function Parameters (x86/x64) - Buffer Overflow - Intro to Binary Exploitation (Pwn)
5: Injecting Shellcode (Shellcraft/MSFVenom) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
6: Return to Lib-C (ret2system/one_gadget) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
7: Format String Vulnerabilities (printf) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
8: Leak PIE (bypass) and Lib-C (ret2system) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
9: Overwriting Global Offset Table (GOT) Entries with printf() - Intro to Binary Exploitation (Pwn)
10: Bypassing Stack Canaries (leak + write) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
Taught by
CryptoCat