2025-12-13 –, Workshop Room 2
An exploitation workshop with beginners in mind. Using free tools such as windows 10 vm's, windbg and ida pro we will go through the process of dissecting a vulnerable server, finding a memory corruption vulnerability and crafting an exploit to create a DOS and RCE.
This course is broken down into the following stages:
Enumerating an Application
Interacting with Vuln Windows server
Hooking the recv API
Synchronizing WinDbg and IDA Pro
Tracing the Input
Checksum
Reverse Engineering the Protocol
Exploiting Memcpy
Getting EIP Control
Students will be walked through a reverse engineering of a simple server binary and produce an exploit. It will introduce students to Windbg, Ida pro, basic python scripting and basic windows internals.
Leigh Trinity is a trans woman, Red Team hacker and instructor based in Newfoundland, Canada, blending over fifteen years of military service—including as an armoured reconnaissance crew member in Yugoslavia and a Leopard battle tank commander in Afghanistan—with deep expertise in exploit development, reverse engineering, and programming in Assembly, Bash, Python and C#. As an instructor at Hackers Arise and member of the Board of Directors at Malware Village, she trains others in advanced cybersecurity, while also embracing a rugged, adventurous lifestyle—known for 21 km hikes with her Cane Corso and boating whenever possible.
