File Structures - Another Binary Exploitation Technique
Hack In The Box Security Conference via YouTube
Overview
This course teaches participants how to exploit the FILE structure in the GNU C Library (Glibc) as a binary exploitation technique. The learning outcomes include understanding how to bypass modern operating system protections like DEP, ASLR, and RELRO, breaking data protections, launching remote code execution, and utilizing different FILE structures for attacks. The course covers topics such as File Stream Oriented Programming and explores advanced exploit techniques. The teaching method involves a combination of theoretical explanations, demonstrations, and practical examples. This course is intended for individuals interested in cybersecurity, binary exploitation, and Linux system security.
Syllabus
Introduction
Agenda
File Structure
Exploit Path
Advanced Exploit
Verification
Demo
Conclusion
Taught by
Hack In The Box Security Conference