BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.dragonsec.si//PLTQ8Z
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-dctf26-PLTQ8Z@cfp.dragonsec.si
DTSTART;TZID=CET:20260321T143000
DTEND;TZID=CET:20260321T145500
DESCRIPTION:Mid-2000s videogames are a great target for finding RCE exploit
 s. They were written in a different era\, when things like ASLR and DEP we
 re still seen as useless luxuries that just tank performance. Besides\, wh
 o is gonna go through the effort to set up a fuzzer for these ancient game
 s?\n\nIn this talk we'll pick a classic 2000's game\, go over the process 
 of fuzzing the game's server with a very fancy snapshot fuzzer\, and fuzzi
 ng the client with the dumbest possible bit-flipper I could write in an ho
 ur. Both of these approaches lead to bugs that we'll exploit for remote co
 de execution.
DTSTAMP:20260501T105725Z
LOCATION:PA
SUMMARY:Zero to RCE in a Weekend: Fuzzing Old Games for Memory Corruption -
  Rick de Jager
URL:https://cfp.dragonsec.si/dctf26/talk/PLTQ8Z/
END:VEVENT
END:VCALENDAR
