TUM's Binary Exploitation

  • Description: This practical course teaches various techniques for exploiting buffer overflow vulnerabilities. Starting with the basics of buffer overflows the students will learn ways of executing shellcode. Based on this knowledge we will explore protection mechanisms agains shellcode execution and we will work on advanced methods for bypassing them.

  • Public/private: public

  • Price: free

  • Based on which tool: linux

  • How to obtain access: TUM lecturer