Symbolic Execution





Description


Welcome to the fifth Security Society Workshop!

This week we will be learning about symbolic execution; What it is and how it is used today in CTF's. Sick of reversing binaries by hand? Want to automate your exploits? Then come and get angr-y with us.

http://angr.io/

Difficulty: Advanced This workshop will assume you know: * Basic Python * Familiar with one of the following: * Binary Ninja, IDA, Radare, Hopper, Objdump * Familiar with ASM (If you are reading this Jashank - YES there will be x86 ASM)