Course Catalog

An Oral History of Binary Exploitation

How to Pwn: Then and Now

If you have a basic conceptual understanding of binary exploitation (specifically, stack-based buffer overflows) but aren’t quite 100% sure what concepts like ‘ASLR’, ‘RELRO’, ‘PIE’ or ‘ROP’ mean, this is the course for you. The goal of this guide is to give an overview of modern binary exploitation mitigations, why they were introduced and how they have been defeated. All in a practical and hands-on way.

Prerequisites

  • Basic Linux command line usage
  • Rudimentary understanding of buffer overflows
  • Basic programming skills (Python)

Enroll/Unenroll in course

Go to Course
Back to Catalog