
Malware Village is dedicated to providing a safe and engaging environment for participants to learn and share knowledge about malware analysis. Our mission is to equip attendees with the skills, techniques, and historical context needed to understand, research, and combat malware. Participants will gain hands-on experience with real-world analysis techniques, guided by seasoned infosec professionals. Beyond technical training, Malware Village fosters a strong community where researchers, enthusiasts, and professionals can connect. We welcome everyone—whether you’re an artist creating malware-inspired art, a hardware researcher discovering unexpected connections to malware analysis, or a seasoned analyst reminiscing about early malware history. Even children can explore malware through Malmons (Malware Monsters), making cybersecurity education more accessible. At its core, Malware Village is about uniting people—newcomers and experts alike—with a shared mission: understanding, analyzing, and defending against malware to protect society.
Workshop 3-4hrs: Binary exploitation basics
Lessons 1-2: covering stack basics.
Finding elements of the stack including EBP,ESP, RETURN, ARG1,ARG2. Elements we need to understand in a stack overflow exploitation. We also cover how elements are copied onto the stack and how to find them.
Lesson 3: Building off previous two classes we now play a game to overwrite a variable on the stack. This prepares us for stack based overflows.
Lesson 4: Vanilla buffer overflow!
Lesson 5: Vanilla buffer overflow with a small buffer to demonstrate there are other places to store payloads.
Lesson 6: Bypassing Data execution prevention (DEP/NX) using Return oriented programming
Lesson 7: Explanation and demo of bypassing Stack cookies
Lesson 8: bypassing DEP and ASLR together
Lesson 9: Return oriented programming