Introduction to cryptography, simple ciphers based on substitution.
Transposition ciphers, block-based cryptography, symmetric ciphers, AES.
Random numbers, stream ciphers, RC4.
Modular arithmetic, prime numbers, RSA, asymmetric ciphers.
Asymmetric ciphers, cryptographic hash functions, passwords, digital signatures and other applications.
Software exploitation concepts, out-of-bound errors.
The stack in IA32, simple control-flow attacks, source.
Stack Layout in IA32
Code injection theory, stack canaries, source.
Shellcode, code injection in the stack, source.