Software Exploitation BC (Part 2): Intro to Memory Corruption & Stack Overflows

Are you going?

5 spots left


Null Space Labs

2522 North Ontario Street · Burbank, ca

How to find us

Location image of event venue


This class has limited seating and requires registration via Universe. RSVPing on Meetup is not the same as buying a ticket! Universe registration includes access to all three classes in April and all class materials.


Description: This part one of a three part, hands-on introduction to software exploitation in Linux. This includes the process of reverse engineering binary software to identify and exploit software vulnerabilities. This is considered an intermediate course with strict knowledge requirements before coming to the class! Please read the details below fully and let us know if you have any questions!

Part 2 - Introduction to Memory Corruption and Stack Overflows

In Introduction to Memory Corruption and Stack Overflows students will explore memory corruption vulnerabilities and why they exist. Using the knowledge gained from the first part students will get hands on experience identifying flaws within applications and learn how to exploit them to change the behavior of the application and get code execution. This part will focus exclusively on stack based overflows and demonstrate a number of common behaviors that can lead to their existence in real software

* Gain a high-level understanding of memory corruption exploits
* Gain a high-level understanding of a process memory space & stack
* Identify flaws in target binaries using analysis tools and techniques

What to Bring:
* 64-bit Linux laptop or Linux virtual machine running (any distro OK but Kali Linux 64-bit recommended)

Pre-Requisites Knowledge:
* Experience programming with at least one language (preferably C, C++, or Assembler)
* Understanding of common numbering systems including base 2, 10, and 16
* All required software installed (list to be sent out before class)

Recommended Knowledge:
* We strongly recommend that you study a bit on the following prior to attending the class if you have never done these!
* Experience using a debugger and/or disassembler
* Experience reading and/or writing assembly for at least one architecture
* Understanding of common function calling conventions
* Understanding of memory segments and allocation


When are the Classes?
101 - April 13 - Introductory concepts/tools, Working with x86 Assembly
102 - April 20 - Intro to Memory Corruption and Stack Overflows
103 - April 27 - Techniques for Exploit Reliability and Countermeasure Bypass


Where do I park? / How do I get inside?

Parking: There is free street parking on N Ontario St. It is usually easy to find a spot after business hours or on weekends.

Getting inside: Once you park, head down the walkway, we are the long building in the back (see link for overhead directions)

Parking and entry images: