Preamble: Why I'm teaching x86 in Secure Software Design
PWN rigs, a few options for reversing stuff
Never used: C basics, compiling, loops, etc.
Adjusted notes class 2: C as ASM++, intro to reversing
Class 3: CONTINUED Intro to x86, Framework of all exploits, First crackmes
Class 4 (also class 5): Crackmes!
Class 6: Reversing Basic Code Patterns (if, for, mod, etc)
Extra Notes: Calling Conventions and Parameters
Class 9: pwntools and baby buffer overflow
Class 10: Shellcode and leak processing for chall_03
Class 12: 32-bit Arguments, applied calling conventions
Class 14: PLT/GOT for linking and random address hacks
Class 15: Same notes, we'll practice actually using the knowledge
Class 13: looting wal-mart / escape into glibc
Class 15: Format String Vulnerability
Class 16: PWN AMA, live Q&A office hours catch-up
Class 17: One problem per PWN task and more
Class 18: How to think in pre-heap PWN
Class 19: syscall, int 0x80, sigreturn (SROP)
Class 20: Intro to heap, MOM'S SPAGHETTI, HEAP REFERENCE GUIDES
Class 21: Generating leaks, heap playground, starter script
Class 22: Generating leaks in-depth
Class 23: WWW via tcache-poisoning
Class 24: we still need a little more tcache practice.
Class 25-26: Mom's Spaghetti - UAF for leaks, WWW, and free_hook
LAB DAY: Mom's Spaghetti from the keyboard
Class ???: Deep dive into all bins
House of Botcake (turning a double free into a UAF for tcache-poisoning)
Get a couple years of scholarships in exchange for taking a job with the gov't