Recon Brussels 2018 - Starcraft: Emulating a Buffer Overflow for Fun and Profit
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore a fascinating conference talk from Recon Brussels 2018 that delves into the world of StarCraft modding and buffer overflow exploitation. Discover how South Korean hackers leveraged a buffer overflow bug in StarCraft 1.16.1 and older versions to create popular mods, and learn about the technical challenges faced in addressing this issue without breaking existing mods. Gain insights into various reverse engineering techniques, including problem-solving approaches, development of tracers and instrumentation tools, and emulator design. Presented by Elias, a seasoned Win32 reverse engineer and senior Anticheat engineer at Blizzard Entertainment, this talk offers valuable knowledge for those interested in game security, reverse engineering, and the intricacies of balancing bug fixes with preserving popular game modifications.
Syllabus
Recon Brussels 2018 - Starcraft: Emulating a buffer overflow for fun and profit
Taught by
Recon Conference
Related Courses
Software Design Threats and MitigationsUniversity of Colorado System via Coursera Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX Unlocking Information Security
Tel Aviv University via edX Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy