Exploitation 1: Reverse Engineering

Actions Panel

Exploitation 1: Reverse Engineering

Exploitation is the art of making programs behave in unexpected and unintended ways, turning them to the attacker’s advantage.

When and where

Date and time

Location

Online

About this event

  • 3 hours
  • Mobile eTicket

What is the event about?

Exploitation is the art of making programs behave in unexpected and unintended ways, turning them to the attacker’s advantage. In this session we explore how programs are represented in the computer’s memory so that we can inject computer instructions into the memory. We also look at other simple representations of computer programs – like program graphs, assembly and intermediate representations – that can help us understand and reason about them in order to mount the attacks. The session will be a combination of English and Danish due to the teachers.

Underviser: Alessandro Bruni

(This session will be in english)

What does it require to participate?

This session requires a that the students are able to understand the basics of programming and how data is represented in a computer, including binary, integers, strings.

Do I need to install something on beforehand?

We require an installation of Kali Linux, and that the student installs the necessary utilities as described in the workshop page: https://github.com/hoheinzollern/workshop-cybersikkehed