Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Introduction to Binary Exploitation - Practical Buffer Overflow Challenges for Beginners

CryptoCat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn binary exploitation fundamentals through hands-on buffer overflow challenges designed for beginners in this comprehensive video tutorial series. Master essential cybersecurity tools including Ghidra, IDA, Radare2, GDB with PwnDbg/GEF/PEDA extensions, PwnTools, Checksec, ropper, and MSFVenom through practical demonstrations. Develop exploits to overwrite stack variables, redirect program execution to chosen functions using ret2win techniques, supply function parameters, inject shellcode, and perform return-to-libc attacks including ret2system exploits. Explore format string vulnerabilities to overwrite Global Offset Table (GOT) entries, leak Position Independent Executable (PIE) and libc addresses, and bypass stack canaries. Practice manual exploit development alongside automated approaches using PwnTools for both 32-bit (x86) and 64-bit architectures while utilizing PwnDbg for debugging. Progress through eleven structured modules covering introduction and setup, stack variable overwriting techniques, return-to-win exploits with function parameters, shellcode injection using Shellcraft and MSFVenom, return-to-libc attacks with one_gadget, format string vulnerability exploitation through printf, PIE and libc leaking for bypass techniques, GOT entry overwriting, and stack canary bypass methods. Access accompanying binary files, source code, and exploitation scripts through the provided GitHub repository to practice alongside the demonstrations.

Syllabus

0: Intro/Basics/Setup - Buffer Overflows - Intro to Binary Exploitation (Pwn)
1: Overwriting Variables on the Stack (pt 1) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
2: Overwriting Variables on the Stack (pt 2) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
3: Return to Win (Ret2Win) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
4: Ret2Win with Function Parameters (x86/x64) - Buffer Overflow - Intro to Binary Exploitation (Pwn)
5: Injecting Shellcode (Shellcraft/MSFVenom) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
6: Return to Lib-C (ret2system/one_gadget) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
7: Format String Vulnerabilities (printf) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
8: Leak PIE (bypass) and Lib-C (ret2system) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
9: Overwriting Global Offset Table (GOT) Entries with printf() - Intro to Binary Exploitation (Pwn)
10: Bypassing Stack Canaries (leak + write) - Buffer Overflows - Intro to Binary Exploitation (Pwn)

Taught by

CryptoCat

Reviews

Start your review of Introduction to Binary Exploitation - Practical Buffer Overflow Challenges for Beginners

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.