#hard #learning
Эксплуатации кучи: погружение в техники поиска сложных уязвимостей на простых примерах.
— The toddler’s introduction to Dynamic Memory Allocation
— Часть 1. The toddler’s introduction to Heap exploitation
— Часть 2. The toddler’s introduction to Heap exploitation
— Часть 3. The toddler’s introduction to Heap exploitation — Overflows
— Часть 4. The toddler’s introduction to Heap exploitation, Use After Free & Double free
— Часть 4.1. The toddler’s introduction to Heap Exploitation, FastBin Dup to Stack
— Часть 4.2. The toddler’s introduction to Heap Exploitation, FastBin Dup Consolidate
— Часть 4.3. The toddler’s introduction to Heap Exploitation, Unsafe Unlink
— Часть 4.4. The toddler’s introduction to Heap Exploitation, House of Spirit
— Часть 4.5. The toddler’s introduction to Heap Exploitation, House of Lore
Эксплуатации кучи: погружение в техники поиска сложных уязвимостей на простых примерах.
— The toddler’s introduction to Dynamic Memory Allocation
— Часть 1. The toddler’s introduction to Heap exploitation
— Часть 2. The toddler’s introduction to Heap exploitation
— Часть 3. The toddler’s introduction to Heap exploitation — Overflows
— Часть 4. The toddler’s introduction to Heap exploitation, Use After Free & Double free
— Часть 4.1. The toddler’s introduction to Heap Exploitation, FastBin Dup to Stack
— Часть 4.2. The toddler’s introduction to Heap Exploitation, FastBin Dup Consolidate
— Часть 4.3. The toddler’s introduction to Heap Exploitation, Unsafe Unlink
— Часть 4.4. The toddler’s introduction to Heap Exploitation, House of Spirit
— Часть 4.5. The toddler’s introduction to Heap Exploitation, House of Lore
Medium
The toddler’s introduction to Dynamic Memory Allocation
Heap vulnerabilities have dominated the interest of the security research community for quite long time due to their potential of finding…
🔥3👍1