Preamble: Why I'm teaching x86 in Secure Software Design
PWN rigs, a few options for reversing stuff
Never used: C basics, compiling, loops, etc.
Adjusted notes class 2: C as ASM++, intro to reversing
Intro to x86, Framework of all exploits, First crackmes
Extra Notes: Calling Conventions and Parameters
pwntools and our first buffer overflows
Get a couple years of scholarships in exchange for taking a job with the gov't
32-bit ROP chains with arguments
PLT/GOT for linking and random address hacks
Format String Vulnerability for Leaks and Write-What-Where
Live Demo of the STEALERS problem