Exploit Development & Binary Exploitation

Overview

Exploiting vulnerabilities is a key aspect of penetration testing and offensive security. This project introduces students to binary exploitation techniques, including buffer overflows, return-oriented programming (ROP), and shellcode execution. Students will learn how attackers manipulate memory to gain control over applications and how to mitigate these attacks.

What You Will Learn

Hands-On Learning

Students will gain experience using:

๐Ÿ”— Continue to the hands-on lab for full instructions!