In this course we will be teaching basic exploit
development on a linux os. If you haven't used gdb or done much reverse
engineering, this class will be a good introduction. We will be looking at some
old school attacks, showing you why they are a problem, and writing some basic
exploits from scratch. This is not an advanced class so rop pirates and heap
ninjas shouldn't attend unless you want a review of the basics. This course will
consist of both lecture and hands on exercises, so please bring your laptop with
your favorite VM player.
John deGruyter
John grew up in Nitro, West Virginia, but is currently living in the Northern Virginia/DC area. Security has been his passion and his hobby for the past 14 years. He recently walked away from his job in IT management to pursue his career as a security researcher. This year he and a small team known as the XRG will be running the CTF here at hack3rcon. Lately, he has been spending his time reading, traveling, writing security tools, and studying reverse engineering and exploit development.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek