A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


Intro to Linux exploit development - Hack3rcon 3 (Hacking Illustrated Series InfoSec Tutorial Videos)

Intro to Linux exploit development
Hack3rcon 3

In this course we will be teaching basic exploit development on a linux os. If you haven't used gdb or done much reverse engineering, this class will be a good introduction. We will be looking at some old school attacks, showing you why they are a problem, and writing some basic exploits from scratch. This is not an advanced class so rop pirates and heap ninjas shouldn't attend unless you want a review of the basics. This course will consist of both lecture and hands on exercises, so please bring your laptop with your favorite VM player.

John deGruyter


John grew up in Nitro, West Virginia, but is currently living in the Northern Virginia/DC area. Security has been his passion and his hobby for the past 14 years. He recently walked away from his job in IT management to pursue his career as a security researcher. This year he and a small team known as the XRG will be running the CTF here at hack3rcon. Lately, he has been spending his time reading, traveling, writing security tools, and studying reverse engineering and exploit development.

Back to Hack3rcon 3 video list

Printable version of this article

15 most recent posts on Irongeek.com:

If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast