Dive deep into stack buffer overflows and format string vulnerabilities in this comprehensive 3-hour conference talk from SecureWV/Hack3rCon 2018. Explore reverse engineering techniques, essential tools, and debuggers like Immunity and IDA Pro. Learn about registers, calling conventions, stacks, and fast calls. Gain hands-on experience with practical examples and debugger code. Perfect for security professionals and enthusiasts looking to enhance their understanding of these critical vulnerabilities and defensive strategies.
Overview
Syllabus
Intro
Overview
Outline
Reverse Engineering
Getting Started
Tools
Debuggers
Immunity
Ida Pro
Registers
Calling conventions
Stacks
Fast Call
What do I need
Local Variables
Handson
Example
Debugger
Code