Ready to learn about ‘buffer overflows’ and methods of exploiting binary software packages? Our next meeting will kick off a short series in the world of software exploitation and the tools and techniques used for analysis and execution.
In Part 1 of the series, Shane Kennedy will introduce the craft of exploit development by analyzing the operation of Linux binary executable files. Using tools common to most Linux distributions, Shane will show the basic parts of compiled code and how execution can be analyzed to look for exploitable features. We’ll continue to expand these concepts in future meetings to get a better understanding of how common software exploits are developed. This is initially planned as a four-part series – so don’t miss out!
Date: August 9th, 2018 @ 5:30pm
Topic: Software Exploitation (Part 1)
This presentation is the first in a series of talks that explores the technical details of common software exploits. In part 1, we start by reviewing the transformation of basic code samples into executable binary form on a Linux platform and examine resulting files one byte at a time. We run our samples through the GNU debugger to observe normal execution conditions before finally manipulating input to exploit a buffer overflow condition that allows us to escalate privilege for full control of the target system.
Shane Kennedy is an Army Civilian working as an IT Specialist (INFOSEC) in the New River Valley. Previously a systems engineer for Montgomery County, Virginia, he worked on 911 emergency dispatch and mobile law enforcement platforms as well as the County’s line-of-business systems and networks. He’s also worked as an independent subject matter expert for SANS, supporting on-line students, reviewing lab exercises, and writing quiz questions for many courses. Shane holds the GCWN, GCUX, GCIH, GCIA, and GPEN security certifications from GIAC and is currently preparing for the GSE exam. Unplugged, Shane enjoys building scale models, playing Dungeons and Dragons, and spending time with his family.