Binary exploitation (PWN) tutorials to help you understand the foundations of stack-based exploitation techniques.
I will be posting the videos I record as well as online resources for you to further understand the underlying concepts and techniques.
Contents:
- Basic Concepts:
- Endianness
- Global Offset Table (GOT) and Procedure Linkage Table (PLT)
- How to debug the exploit
- Exploitation Techniques:
- Buffer Overflow
- Execution Flow Hijacking (ret2win)
- Shellcode Execution (ret2shellcode)
- Integer Overflow / Underflow
- Format String
- PIE and Canary Bypass
- GOT overwrite
- Return Oriented Programming (ROP)
- Return to Libc (ret2libc)
- Making stack executable with malicious mprotect call