This course offered a deep technical dive into secure programming practices in C, with a strong focus on understanding how vulnerabilities arise at the assembly and memory level. Through hands-on demos and exploit development, I gained practical experience in writing secure C code and identifying common programming flaws that lead to critical security issues.
printf
) to leak and manipulate memory.gdb
and objdump
to reverse, debug, and analyze behavior.gdb
, pwndbg
, and custom shellcode.This course greatly enhanced my low-level security skills, making me more proficient in reverse engineering, exploit development, and secure C programming. It also reinforced a deep understanding of how software vulnerabilities are introduced—and how they can be prevented—right at the source.