Mega Sekurak Hacking Party w Krakowie! 26-27.10.2026 r.
Bezpłatny kurs z exploitacji binarek [ + LAB-y]
Rozbudowany kurs z niskopoziomowych aspektów ITsec.
Myśl przewodnia która przyświecała tworzeniu kursu: ’Can we teach a bunch of programmers how to pwn?’
Podsumowanie kursu w tabeli poniżej, a w linku: dostępne slajdy, LAB-y + źródła (!)
| Lecture | Title | Topics |
|---|---|---|
| 01 | Syllabus and Review | Linux, C, x86 |
| 02 | Introduction to Reverse Engineering | Tools and the VM |
| 03 | Extended Reverse Engineering | GDB & IDA |
| 04 | Intro to Memory Corruption | ELF, the stack, calling conventions, buffer overflows |
| 05 | Shellcoding / Code Injection | Writing shellcode, developing scenario relevant payloads |
| 06 | Format String Vulnerabilities | Format strings, DTOR/GOT overwrites |
| 07 | DEP and ROP | Data Execution Prevention, writing ROP chains, ret2libc |
| 08 | Secure Systems and Game Console Exploitation | OpenBSD, SELinux, GRSEC, Game Console Exploitation |
| 09 | Address Space Layout Randomization (ASLR) | Overview, info leaks, partial overwrites, ASLR closure |
| 10 | Heap Exploitation | Heap structure and concepts, corruption, use after free |
| 11 | Misc Concepts and Stack Cookies | Signed/unsignedness issues, uninitialized data, etc, bypassing stack cookies |
| 12 | C++ Differences and Concepts | C++ basics, structures, vTables, exceptions |
| 13 | Linux Kernel Exploitation | Kernel basics, kernel exploitation, mitigations (mmap_min_addr, kallsyms, SMEP/SMAP), bypassing mitigations |
| 14 | Exploitation on 64bit, ARM, Windows | Exploitation differences on other architectures & platforms |
| 15 | Automation & The Future of Exploitation | Fuzzing, taint analysis, dynamic instrumentation, SMT/SAT solvers |
–ms

Wszystko pięknie, ale strona z kursem i pdfami nie działa, nie ma slajdów, na githubie są tylko laby…
Macie może te pdfy ściągnięte, możecie podpiąć pod artykuł?
U mnie wszystko ładnie działa :)