Introduction to Linux Memory Corruption is an introductory workshop aimed at
teaching students the basics of reverse engineering and exploiting stack based
overflows on modern systems (AMD64). This workshop is aimed at students with no
prior reverse engineering or exploitation experience and takes them through
writing their first memory corrupting exploit.
- Experience writing and reading code (C/C++/assembler preferred)
- Linux computer or Linux virtual machine
- Understanding of common numbering systems including base 2, 10, and 16
- All required software installed (list to be sent out before class)
- Experience using a debugger and/or disassembler
- Experience reading and/or writing assembly for at least one architecture
- Understanding of common calling conventions
- Understanding of memory segments and allocation
Please come to the workshop with the following already set up and ready to go.
There will not be time during the workshop to complete these setup tasks.
- x86_64 Linux VM or system (preferably kali) NOTE: THIS MUST BE A 64BIT DISTRO
- Linux man pages (man 2 and 3)
- Make sure the following software is installed: nasm, gdb, objdump, readelf
- Install gef with gdb and verify that it works
- IDA Pro 7.0 freeware or licensed copy
THIS MUST BE THE 7.0 FREEWARE OR A LICENSED COPY OF PRO. THE DEMO VERSION OR
LICENSED STANDARD WILL NOT WORK