The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 3: | Line 3: | ||
|Description= Segmentation fault (core dumped) | |Description= Segmentation fault (core dumped) | ||
|Type=Meet-Up | |Type=Meet-Up | ||
|Date=TBA | |||
|Start=17:00 | |||
|isRelevant=Yes | |isRelevant=Yes | ||
}} | }} | ||
Line 11: | Line 13: | ||
|location=Chaosdorf | |location=Chaosdorf | ||
|image=Pushfur.jpg | |image=Pushfur.jpg | ||
|status= | |status=alpha | ||
|people={{U|ilias}} | |people={{U|ilias}} | ||
}} | }} | ||
Line 18: | Line 20: | ||
|Description=Binary Exploitation Workshop | |Description=Binary Exploitation Workshop | ||
|Type=Workshop | |Type=Workshop | ||
|Date= | |Date= | ||
|Start= | |Start=17:00 | ||
|Host=ilias | |Host=ilias | ||
|isRelevant=Yes | |isRelevant=Yes | ||
Line 50: | Line 52: | ||
The focus will be: | The focus will be: | ||
* | * learning about vulnerable C functions | ||
* | * learning how simple exploits used to be | ||
* | * learning what the GOT is | ||
* | * learn what mitigations have been introduced in modern systems | ||
* | * using ROP (return oriented programming) to bypass many exploit mitigations | ||
I will bring some | I will bring some binarys that we can attempt exploit. | ||
The goal is for every participant to be able to write a stackpivot->malloc->memcpy->mprotect ropchain to execute shellcode. | The goal is for every participant to be able to write a stackpivot->malloc->memcpy->mprotect ropchain to execute shellcode. | ||
Line 67: | Line 69: | ||
== Participants (please | == Participants (please register!) == | ||
* {{U|barbieauglend}} | * {{U|barbieauglend}} | ||
* {{U|ytvwld}} | * {{U|ytvwld}} | ||
* {{U|hanemile}} | * {{U|hanemile}} | ||
== Resources == | == Resources == | ||
Line 90: | Line 80: | ||
https://github.com/tharina/BlackHoodie-2018-Workshop | https://github.com/tharina/BlackHoodie-2018-Workshop | ||
https://github.com/chiliz16/ROP-Workshop | https://github.com/chiliz16/ROP-Workshop | ||