Skip to content

Details

We will walk through the identification and step-by-step exploitation of format string vulnerabilities on Linux. These bugs provide write-what-where primitives that permit bypassing many modern exploitation prevention mechanisms. This bug type is often found in CTF challenges in the exploitation category and in the real world, too.

Attendees are encouraged to bring a Linux virtual machine with the pwntools package installed from here: https://github.com/Gallopsled/pwntools#readme

You should also install a toolchain (GCC) and debugger (GDB). Adding the pwndbg plugin for GDB is also helpful: https://github.com/pwndbg/pwndbg#readme

Related topics

Events in Denver, CO
Electronics
Computer Security
Hacking
Capture the Flag
Defcon

You may also like