• Track C: Friday 1300-1700

Introduction to Linux Memory Corruption is an introductory workshop aimed at teaching students the basics of reverse engineering and exploiting stack based overflows on modern systems (AMD64). This workshop is aimed at students with no prior reverse engineering or exploitation experience and takes them through writing their first memory corrupting exploit.

Requirements

  • Experience writing and reading code (C/C++/assembler preferred)
  • Linux computer or Linux virtual machine
  • Understanding of common numbering systems including base 2, 10, and 16
  • All required software installed (list to be sent out before class)

Recommended

  • Experience using a debugger and/or disassembler
  • Experience reading and/or writing assembly for at least one architecture
  • Understanding of common calling conventions
  • Understanding of memory segments and allocation

Please come to the workshop with the following already set up and ready to go. There will not be time during the workshop to complete these setup tasks.

  • x86_64 Linux VM or system (preferably kali) NOTE: THIS MUST BE A 64BIT DISTRO AND COMPUTER
  • Linux man pages (man 2 and 3)
  • Make sure the following software is installed: nasm, gdb, objdump, readelf
  • Install gef with gdb and verify that it works https://gef.readthedocs.io/en/master/
  • IDA Pro 7.0 freeware or licensed copy https://www.hex-rays.com/products/ida/support/download_freeware.shtml NOTE: THIS MUST BE THE 7.0 FREEWARE OR A LICENSED COPY OF PRO. THE DEMO VERSION OR LICENSED STANDARD WILL NOT WORK
Reg Closed


Joe is a member of the Red Team at Verizon Media where he plots world domination and builds offensive tooling. He has a passion for reverse engineering, exploitation, teaching, and... Read More

twitter @jrozner


© 2020 ShellCon