Software Exploitation BC (Part 3): Exploit Reliability and Countermeasure Bypass

Are you going?

9 spots left


Null Space Labs

2522 North Ontario Street · Burbank, ca

How to find us

Location image of event venue


This class has limited seating and requires registration via Universe. RSVPing on Meetup is not the same as buying a ticket! Universe registration includes access to all three classes in April and all class materials.


Description: This part one of a three part, hands-on introduction to software exploitation in Linux. This includes the process of reverse engineering binary software to identify and exploit software vulnerabilities. This is considered an intermediate course with strict knowledge requirements before coming to the class! Please read the details below fully and let us know if you have any questions!

Part 3 - Techniques for Exploit Reliability and Countermeasure Bypass

Part two introduced stack based overflows and demonstrated how to exploit them. Many of these solutions depended on brittle exploits or counter measures being disabled in order to execute. In Techniques for Exploit Reliability and Countermeasure Bypass we'll explore how to make our exploits more reliable and portable and bypass common countermeasures that are deployed in real world applications today.

* Understanding modern exploitation countermeasures
* Understand concepts of exploit reliability
* Understand concepts of countermeasure bypass
* Perform bypasses of basic anti-exploitation countermeasures

What to Bring:
* 64-bit Linux laptop or Linux virtual machine running (any distro OK but Kali Linux 64-bit recommended)

Pre-Requisites Knowledge:
* Experience programming with at least one language (preferably C, C++, or Assembler)
* Understanding of common numbering systems including base 2, 10, and 16
* All required software installed (list to be sent out before class)

Recommended Knowledge:
* We strongly recommend that you study a bit on the following prior to attending the class if you have never done these!
* Experience using a debugger and/or disassembler
* Experience reading and/or writing assembly for at least one architecture
* Understanding of common function calling conventions
* Understanding of memory segments and allocation


When are the Classes?
101 - April 13 - Introductory concepts/tools, Working with x86 Assembly
102 - April 20 - Intro to Memory Corruption and Stack Overflows
103 - April 27 - Techniques for Exploit Reliability and Countermeasure Bypass


Where do I park? / How do I get inside?

Parking: There is free street parking on N Ontario St. It is usually easy to find a spot after business hours or on weekends.

Getting inside: Once you park, head down the walkway, we are the long building in the back (see link for overhead directions)

Parking and entry images: