The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 3: | Line 3: | ||
|Description= Segmentation fault (core dumped) | |Description= Segmentation fault (core dumped) | ||
|Type=Meet-Up | |Type=Meet-Up | ||
|Date=2019-08-05 | |||
|Start=13:00 | |||
|isRelevant=Yes | |isRelevant=Yes | ||
}} | }} | ||
Line 11: | Line 13: | ||
|location=Chaosdorf | |location=Chaosdorf | ||
|image=Pushfur.jpg | |image=Pushfur.jpg | ||
|status= | |status=alpha | ||
|people={{U|ilias}} | |people={{U|ilias}} | ||
}} | }} | ||
Line 50: | Line 52: | ||
The focus will be: | The focus will be: | ||
* | * learning about vulnerable C functions | ||
* | * learning how simple exploits used to be | ||
* | * learning what the GOT is | ||
* | * learn what mitigations have been introduced in modern systems | ||
* | * using ROP (return oriented programming) to bypass many exploit mitigations | ||
I will bring some | I will bring some binarys that we can attempt exploit. | ||
The goal is for every participant to be able to write a stackpivot->malloc->memcpy->mprotect ropchain to execute shellcode. | The goal is for every participant to be able to write a stackpivot->malloc->memcpy->mprotect ropchain to execute shellcode. | ||
Line 67: | Line 69: | ||
== Participants (please add your name!) == | == Possible Participants (please add your name!) == | ||
* {{U|barbieauglend}} | * {{U|barbieauglend}} | ||
* {{U|ytvwld}} | * {{U|ytvwld}} | ||
Line 75: | Line 77: | ||
* Plant | * Plant | ||
* gabriel | * gabriel | ||
== Resources == | == Resources == | ||
Line 90: | Line 84: | ||
https://github.com/tharina/BlackHoodie-2018-Workshop | https://github.com/tharina/BlackHoodie-2018-Workshop | ||
https://github.com/chiliz16/ROP-Workshop | https://github.com/chiliz16/ROP-Workshop | ||