Explore a fascinating conference talk from Recon Brussels 2018 that delves into the world of StarCraft modding and buffer overflow exploitation. Discover how South Korean hackers leveraged a buffer overflow bug in StarCraft 1.16.1 and older versions to create popular mods, and learn about the technical challenges faced in addressing this issue without breaking existing mods. Gain insights into various reverse engineering techniques, including problem-solving approaches, development of tracers and instrumentation tools, and emulator design. Presented by Elias, a seasoned Win32 reverse engineer and senior Anticheat engineer at Blizzard Entertainment, this talk offers valuable knowledge for those interested in game security, reverse engineering, and the intricacies of balancing bug fixes with preserving popular game modifications.
Overview
Syllabus
Recon Brussels 2018 - Starcraft: Emulating a buffer overflow for fun and profit
Taught by
Recon Conference