Lecture: Applied Binary Exploitation
Course:
- Responsible: Prof. Dr. Elmar Padilla
- Start: 14.04.2023
- Dates: Fri 12:00 - 14:00, weekly, MA 176 - HSIV, hybrid event
- Course number: 612103322
Exercises:
- Responsible: Martin Clauß
- Dates: Fri 14 - 16, weekly, MA 176 - HSIV, hybrid event
- Course number: 612203322
Other:
- Term: Master Computer Science
- Requirements:
- Faculty: MA-INF 3322
- Effort: 2L + 2E / 6CP
Announcements
Please refer to https://abe.seclab-bonn.de/ for up-to-date information about the lecture as well as materials.
We already have an exercise sheet 0 that you can take a look at!
In case you need to refresh your binary analysis knowledge, you can check out the ABA script. The parts about Linux are relevant for ABE as well.
Description
Our computers run a lot of closed source binary programs meaning that the source code of those programs is not available. Naturally, those programs contain bugs, mistakes that the programmer made during the development. Those bugs could (under certain circumstances) be exploited by attackers and thus may lead to arbitrary code execution. In this lecture we aim to teach you how to find well known exploitable bugs and how to exploit them. After a brief recap of basic binary program analysis such as static and dynamic analysis, we will talk about vulnerability discovery in general, meaning that you will learn how to find exploitable bugs by yourself. Next we move on to basic stack-based buffer overflows and add mitigation techniques (stack cookies, NX, ASLR, RELRO, ...) as we progress and exploit them as well. After we finished the topic of stack-based buffer overflows we move on to more advanced topics such as heap exploitation, use-after-free exploits and others. The lecture ends with an analysis of a sophisticated real-world exploit.
Between the first and the second exam phase there will be a guest lecture from a renowned expert. Past guest lecturers were:
2021: Claudio Guarnieri (@botherder): A talk about journalists, human rights defenders and dissidents that face increasingly sophisticated digital threats and what to do about it.
2020: Maddie Stone (@maddiestone): Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild
2019: Gynvael Coldwind (@gynvael): Notes on Computer Hardware and Security
2018: Thomas Dullien (@halvarflake): Fundamentals of Security Exploits
Organizational notes
You may take this course even if you have passed BA-INF 148 Program Analysis and Binary Exploitation (PABE) during your bachelor's.
You cannot take this course if you have already passed MA-INF 3322 Program Analysis and Binary Exploitation (PABE).
Note: This time the lecture will be hybrid. The lectures will be recorded. Exercise meetings will not be recorded.
Online participation will be possible via BBB.
The lecture will take place in Hörsaal 4 / HS IV in the Geozentrum. The lecture hall is located on the second floor of the Geozentrum building at Meckenheimer Allee 176, directly above Hörsaal 2. Sadly, the available floor plans do not include the second floor.
Floor plans and location (scroll down to "Geozentrum"): https://www.geographie.uni-bonn.de/en/department-1/sites/sites
Dates and Events
Lecture and exercise dates
Nr | Date | Lectures | Exercises |
---|---|---|---|
0 | 2023-04-14 | lecture | Sheet 0 released |
1 | 2023-04-21 | lecture | Sheet 0 Tutorial, Sheet 1 released |
2 | 2023-04-28 | lecture | |
3 | 2023-05-05 | lecture | Sheet 1 Tutorial, Sheet 2 released |
4 | 2023-05-12 | lecture | |
5 | 2023-05-19 | lecture | Sheet 2 Tutorial, Sheet 3 released |
6 | 2023-05-26 | lecture | |
2023-06-02 | no lecture | ||
7 | 2023-06-09 | lecture | Sheet 3 Tutorial, Sheet 4 released |
8 | 2023-06-16 | lecture | |
9 | 2023-06-23 | lecture | Sheet 4 Tutorial, Sheet 5 released |
10 | 2023-06-30 | lecture | |
11 | 2023-07-07 | lecture | Sheet 5 Tutorial |
12 | 2023-07-14 | lecture |
First exam period: to be announced
Second exam period: to be announced
Invited talk: Between the two exam periods.