Exploit Development Training & Competition

Presented at BSidesSF 2016, Feb. 28, 2016, 1 p.m. (300 minutes)

Participants will exploit a simple vulnerable Linux application, first to redirect execution to existing code, and then to gain remote code execution.  The first project has complete step-by-step instructions. Then they will compete to gain control of a series of applications running on a remote server. Everyone is welcome to compete, whether they attend the hands-on training or not. We will use these tools: Simple Python scripting Gnu debugger objdump   Participants will need to bring a laptop with Kali Linux 2.0 (x86) running as a real or virtual machine.  Prior experience with C and assembly language is helpful but not required.

Links:

Similar Presentations: