House Of Spirit
Introduction Welcome to the fifth heap exploitation technique we’re going to cover: the House Of Spirit. Safe Unlink refers to exploitation techniques that bypass the security checks introduced in...
Introduction Welcome to the fifth heap exploitation technique we’re going to cover: the House Of Spirit. Safe Unlink refers to exploitation techniques that bypass the security checks introduced in...
Introduction Welcome to the fourth heap exploitation technique we’re going to cover: the Safe Unlink. Safe Unlink refers to exploitation techniques that bypass the security checks introduced in gl...
Introduction Welcome to the third heap exploitation technique we’re going to cover: the Unsafe Unlink, a classic heap exploitation method that targets the chunk consolidation process in glibc’s me...
Introduction Welcome to the second heap exploitation technique we’re going to cover: the The Fastbin Dup. The Fastbin Dup attack exploits the fastbin mechanism in ptmalloc, the heap allocator use...
Introduction Welcome to the first heap exploitation technique we’re going to cover: the House of Force. The House of Force technique exploits the top chunk in the heap. The top chunk is a special...
Introduction I finished the Linux Heap Exploitation course on Udemy and it was excellent. I highly recommend you try the course if you want hands-on, practical experience in allocator internals an...
Introduction Havoc is a modern command-and-control (C2) framework with a modular architecture. In the last post, we explored how to install and run Havoc C2. One of its most powerful features is ...
I’ve been diving deeper into Windows internals and red teaming over the past few days. While I already hold penetration testing certifications, I wanted to push beyond surface-level knowledge. That...
So, you’ve started your journey into the fascinating world of Capture The Flag (CTF) challenges and binary exploitation. You understand the concepts—buffer overflows, Return-Oriented Programming (R...
In the world of binary exploitation, one technique stands out for its cleverness and power: Return-Oriented Programming (ROP). If you’ve been learning exploit development, you’ve likely heard of it...