EXPLOITATION 1: REVERSE ENGINEERING

EXPLOITATION 1: REVERSE ENGINEERING

By De Danske Cybermesterskaber
Online event

Overview

The session explains how exploits work and how program memory and code representations aid attacks.

Exploitation is the art of making programs behave in unexpected and unintended ways, turning them to the attacker’s advantage.

In this session we explore how programs are represented in the computer’s memory so that we can inject computer instructions into the memory.

We also look at other simple representations of computer programs – like program graphs, assembly and intermediate representations – that can help us understand and reason about them in order to mount the attacks.


What does it require to participate in the session?

This session requires a that the students are able to understand the basics of programming and how data is represented in a computer, including binary, integers, strings.


Preparation before the session?

We require an installation of Kali Linux, and that the student installs the necessary utilities as described in the workshop page: https://github.com/hoheinzollern/workshop-cybersikkehed


Practical info:

📆 Time: february 26 - 17.00-20.00

📍Place: Online (you'll receive a link by mail)

🧑🏻‍💻 Language: The session will be a combination of English and Danish due to the teachers.

🧑🏻‍💻 Teacher: Alessandro Bruni, ITU

Category: Science & Tech, Science

Good to know

Highlights

  • 3 hours
  • Online

Location

Online event

Organised by

De Danske Cybermesterskaber

Followers

--

Events

--

Hosting

--

Free
Feb 26 · 08:00 PST