Presented at
BSidesSF 2016,
Feb. 28, 2016, 1 p.m.
(300 minutes).
Participants will exploit a simple vulnerable Linux application, first to redirect execution to existing code, and then to gain remote code execution. The first project has complete step-by-step instructions. Then they will compete to gain control of a series of applications
running on a remote server.
Everyone is welcome to compete, whether they attend the hands-on training or not.
We will use these tools:
Simple Python scripting
Gnu debugger
objdump
Participants will need to bring a laptop with Kali Linux 2.0 (x86) running as a real or virtual machine. Prior experience with C and assembly language is helpful but not required.
Links:
Similar Presentations: