Module: Exploitation Scenarios
You have learned several different security concepts in this course. It’s time to put them together and solve challenges requiring non-trivial exploitation chains!
The lectures for this module are:
- Exploitation Scenarios: Introduction (slides here)
- Exploitation Scenarios: Hijacking to Shellcode (slides here)
- Exploitation Scenarios: Side Effects (slides here)
- Exploitation Scenarios: JIT Spray (slides here)
Being a “putting it together” module, all lectures of all previous modules are also critical.
The goal of the challenge sets in this module is to get the flag. There are a number of difficulty levels, and each challenge combines concepts from multiple modules. Each challenge will tell you the concepts that it combines, which should help get you on the right path. If you exploit it, you can get it to read the flag and print it out to you.
If you are ready to tackle the challenges, go to https://cse466.pwn.college!