____ _____ _____ _____ ____ _ ___ _ _ ___ _ _ ____
/ ___|_ _| ___| |_ _| _ \ / \ |_ _| \ | |_ _| \ | |/ ___|
| | | | | |_ _____| | | |_) | / _ \ | || \| || || \| | | _
| |___ | | | _|_____| | | _ < / ___ \ | || |\ || || |\ | |_| |
\____| |_| |_| |_| |_| \_\/_/ \_\___|_| \_|___|_| \_|\____|
An attempt at creating a coherent collection of training materials.
Sections are meant to be a dive into small but important concepts.
Section | Contents |
---|---|
PWN | Binary Exploitation |
RE | Reverse Engineering |
WEB | Web Exploitation |
Binary Exploitation (Pwning) 0. TODO: Binary Debugging
- Stack Overflows
-
- Segfault Example via an Overflow
-
- Visualized Overflow
-
- Example CTF Problem(s)
-
- TODO: printf
- Controlling Execution
-
- TODO: Overflowing beyond the stack
-
- TODO: Overwriting return pointers
-
- TODO: Stack Canaries
-
Reverse Engineering
- TODO: Forward Engineering and Binaries
- TODO: The RE Basics
- TODO: 0) filetypes
- TODO: 1) files in files
- TODO: Android
TODO...