ctf101 systems security repository. Day two of the workshop.
By the end of the workshop, participants should be aware of the skills and some of the tools required to develop exploits for systems based applications.
- Approach
- Overview of Systems Exploitation
- Offensive Python 101
- Input/Output
- Types of Compromise
- Illustration of Compromise in Target Python Applications
- C and x86-64 Assembly
- Memory Layout
- Stack Frames
- Debuggers
- Memory Corruption Vulnerabilities
- Mitigations and Bypasses
- Conclusions and Additional Challenges
- Shellcode Writing
- Heap vulnerabilities
- Return Oriented Programming
Please refer to the lesson plan for complete content.