Slides
ABE Lecture Recordings
Lecture recordings will be available on the BBB page.
ABE Lecture Slides
The credentials to access the slides have been announced in the first lecture.
- 00 Intro | 00 ABE-Tools
- 01 Vulnerability Research
- 02 Stack-based Buffer Overflows: Calling Conventions, ret2libc
- 03 Stack-based Buffer Overflows: Shellcode
- 04 Code Reuse Attacks: ROP
- 05 Code Reuse Attacks: Advanced Techniques
- 06 Format String Exploitation (Updated on May 22) | 06 Heap Intro
- 07 Heap glibc: Use-After-Free
Guest Talks
- 2020: Maddie Stone (@maddiestone): Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild
- 2019: Gynvael Coldwind (@gynvael): Notes on Computer Hardware and Security
- 2018: Thomas Dullien (@halvarflake): Fundamentals of Security Exploits
Misc Resources
- 2023: Linux Exploitation: Recordings, Notes 1, Notes 2, and Notes 3
- 2020: A Review of Memory Errors Exploitation in x86-64