Preamble: Why I'm teaching x86 in Secure Software Design
PWN rigs, a few options for reversing stuff
Never used: C basics, compiling, loops, etc.
Adjusted notes class 2: C as ASM++, intro to reversing
Intro to x86, Framework of all exploits, First crackmes
Part 2: Calling Conventions and Parameters
pwntools QUICK REFERENCE GUIDE
Our first baby buffer overflow
Shellcode and leak processing for chall_03
32-bit Arguments, applied calling conventions
looting wal-mart / escape into glibc
PLT/GOT for linking and random address hacks
Class 12: Format String Vulnerability
syscall, int 0x80, sigreturn (SROP)
Heap 1: Intro to heap, MOM'S SPAGHETTI, HEAP REFERENCE GUIDES
Heap 2: Heap Vibe Check, let's explore a Use-After-Free and corrupting a linked-list