The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 50: | Line 50: | ||
The focus will be: | The focus will be: | ||
* | * learning about vulnerable C functions | ||
* | * learning how simple exploits used to be | ||
* | * learning what the GOT is | ||
* | * learn what mitigations have been introduced in modern systems | ||
* | * using ROP (return oriented programming) to bypass many exploit mitigations | ||
I will bring some | I will bring some binarys that we can attempt exploit. | ||
The goal is for every participant to be able to write a stackpivot->malloc->memcpy->mprotect ropchain to execute shellcode. | The goal is for every participant to be able to write a stackpivot->malloc->memcpy->mprotect ropchain to execute shellcode. | ||
Line 67: | Line 67: | ||
== Participants (please add your name!) == | == Possible Participants (please add your name!) == | ||
* {{U|barbieauglend}} | * {{U|barbieauglend}} | ||
* {{U|ytvwld}} | * {{U|ytvwld}} | ||
Line 75: | Line 75: | ||
* Plant | * Plant | ||
* gabriel | * gabriel | ||
== Resolving technical issues == | == Resolving technical issues == |