Difference between revisions of "CTF-practice-evening:2014-02-24"
Line 21: | Line 21: | ||
= Binary Exploitation = | = Binary Exploitation = | ||
− | * We're gonna look at Chapter 3 (Exploitation) of this book: | + | * We're gonna look at Chapter 3 (Exploitation - start at Page 119) of this book: |
** [http://rogunix.com/docs/Reversing&Exploiting/Hacking%20-%20The%20Art%20of%20Exploitation_2nd%20Ed.pdf Hacking: the Art of Exploitation] | ** [http://rogunix.com/docs/Reversing&Exploiting/Hacking%20-%20The%20Art%20of%20Exploitation_2nd%20Ed.pdf Hacking: the Art of Exploitation] | ||
** You can get the Live CD [http://www.nostarch.com/hackingCD.htm here] | ** You can get the Live CD [http://www.nostarch.com/hackingCD.htm here] |
Revision as of 19:23, 24 February 2014
CTF-practice-evening:2014-02-24 | |
---|---|
Date | 2014/02/24 |
Time | |
Location | ACTA |
Type | Workshop |
Contact | Melanie |
Contents
Capture The Flag evening - Part 8
- 24 February, 2014 - 7 PM
- Please bring along a laptop with you!!!
General CTF Info
- See the page for the Ctf-evenings
- Link to the Tech Inc Challenge Website Scoreboard
Codegate Retrospective
- Add comments here
Binary Exploitation
- We're gonna look at Chapter 3 (Exploitation - start at Page 119) of this book:
- Hacking: the Art of Exploitation
- You can get the Live CD here