Recon Brussels 2018 - Starcraft: Emulating a Buffer Overflow for Fun and Profit
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore a fascinating conference talk from Recon Brussels 2018 that delves into the world of StarCraft modding and buffer overflow exploitation. Discover how South Korean hackers leveraged a buffer overflow bug in StarCraft 1.16.1 and older versions to create popular mods, and learn about the technical challenges faced in addressing this issue without breaking existing mods. Gain insights into various reverse engineering techniques, including problem-solving approaches, development of tracers and instrumentation tools, and emulator design. Presented by Elias, a seasoned Win32 reverse engineer and senior Anticheat engineer at Blizzard Entertainment, this talk offers valuable knowledge for those interested in game security, reverse engineering, and the intricacies of balancing bug fixes with preserving popular game modifications.
Syllabus
Recon Brussels 2018 - Starcraft: Emulating a buffer overflow for fun and profit
Taught by
Recon Conference
Related Courses
Dal Reverse engineering alla stampa 3DUniversity of Naples Federico II via Federica Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam Generative Design for Industrial Applications
Autodesk via Coursera Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam