Binary exploitation

Binary exploitation

As programmers we know overflowing integers and writing outside buffers is bad and can cause a system crash. Worse than a crash this can sometimes be exploited by a hacker to breach the system. Why is this and how exactly can something, possibly as small as one byte, cause such big problems?

This session aims to give an introduction to binary exploitation, i.e. the science (and art) of utilising bugs in low-level systems to cause unintended behaviour and possibly a full compromise of the system.

Starting with basic exploitation techniques from the nineties working our way all the way to modern exploitation techniques, the goal is to give the participants an understanding of some of these techniques and hopefully a little bit of inspiration to start trying them out yourself.


Carl "Zeta Two" Svensson is a security professional and hobbyist currently working as the head of security at Swedish healthcare startup, Kry. He is a frequent CTF player for the Swedish top team HackingForSoju, organizer of Midnight Sun CTF and an active member of the Swedish and international security community with a great fondness for a broad range of topics, reverse engineering being one of his favorites. Feel free to reach out to Carl on and visit his [website](


17.30-18.00 Pre-event mingle and snacks
18.00-19.00 Presentation
19.00-20.00 Post-event mingle

Code of Conduct

Please read our Code of Conduct before attending the event.

When and where

When: Nov 21st, 2019, 17.30 (door closes at 18.00)

Where: Regeringsg. 30, Stockholm. Follow the 0xFF-signs, 4th floor, “Convendum”. OpenStreetMap


The event is free of charge but the number of seats are limited.

The registration is now closed