Binary Jiujitsu: Blue Belt Hacking
Day 1:
Binary exploitation can feel overwhelming for beginners. With so many tools, techniques, and architectures to learn, it’s easy to get lost without a structured path. Binary Jiu-Jitsu is designed to guide students through the fundamentals of binary exploitation using a skill-based, hands-on approach inspired by martial arts training. In this workshop, we’ll cover the essential building blocks for exploiting simple 64-bit Linux ELF binaries. Attendees will learn the fundamentals of computer architecture, reverse engineering, debugging with GDB, finding stack-based buffer overflows, and developing custom exploits using python. Throughout the session, participants earn ‚Äústripes‚Äù by completing progressively harder hands-on challenges in a live gamified CTF environment. By the end, students will have the knowledge‚ and practical skills ‚ to identify vulnerabilities, write working exploits, and pop their first shell.
Day 2:
Binary Jiu-jitsu: Blue Belt course is a continuation of the series of training focused on binary exploitation tools and techniques. Building on the fundamental skills from the White Belt course, the Blue Belt course enables students to utilize new tools and techniques that allow for defeating additional binary protection mechanisms. In this workshop, we will cover ROP and how we can bypass NX, understand heap structures, and discuss topics such as PIE and dynamic versus static linking and what it means for binary exploitation. We will cover additional tool features for commonly used static and dynamic analysis tools, and we will learn to craft ROP chains, exploit format strings, basic heap exploitation techniques, and integer overflows. Each module test completion will earn the practitioner a stripe for their Binary Jiu-jitsu belt through hands on testing with live, remote challenges. Completion of this course and the end of training CTF will result in practitioners earning their Purple Belt in Binary Jiu-jitsu.

