My course work about basic binary exploitation.
- Memory layout of the process
- ELF and its key things
- Vulnerabilities types
- Buffer overflow
- Stack overflow
- Format string vulnerability
- [Heap overflow]
- [Security techniques]
- [Non-Executable Stack(NX)]
- [Address Space Layout Randomization(ASLR)]
- [Stack canary]
- [Position Independent Executable(PIE)]
- [Relocation Read-Only]