YoVDO

Recon Brussels 2018 - Starcraft: Emulating a Buffer Overflow for Fun and Profit

Offered By: Recon Conference via YouTube

Tags

Buffer Overflow Courses Cybersecurity Courses Reverse Engineering Courses Software Security Courses

Course Description

Overview

Explore a fascinating conference talk from Recon Brussels 2018 that delves into the world of StarCraft modding and buffer overflow exploitation. Discover how South Korean hackers leveraged a buffer overflow bug in StarCraft 1.16.1 and older versions to create popular mods, and learn about the technical challenges faced in addressing this issue without breaking existing mods. Gain insights into various reverse engineering techniques, including problem-solving approaches, development of tracers and instrumentation tools, and emulator design. Presented by Elias, a seasoned Win32 reverse engineer and senior Anticheat engineer at Blizzard Entertainment, this talk offers valuable knowledge for those interested in game security, reverse engineering, and the intricacies of balancing bug fixes with preserving popular game modifications.

Syllabus

Recon Brussels 2018 - Starcraft: Emulating a buffer overflow for fun and profit


Taught by

Recon Conference

Related Courses

Software Design Threats and Mitigations
University of Colorado System via Coursera
Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX
Unlocking Information Security
Tel Aviv University via edX
Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy