Binary Exploitation
House of - Heap Exploitation
Every Named Heap Exploitation Technique, Explained and Exploited
$10Enroll
Try to understand how to exploit binary vulnerabilities ! - You need solid basics in C and x86/x86_64 INTEL assembly. - You must understand memory management (stack, heap, registers, calling conventions). - You should know how to quickly use a dynamic debugger. - You should understand how to work with a decompiler like IDA Pro.
4 courses available
Every Named Heap Exploitation Technique, Explained and Exploited
Understanding glibc Internals, Use-After-Free, Tcache Poisoning, Double Free, and Heap Overflow Techniques on x86-64 Linux
Understanding, Finding, and Exploiting Stack Buffer Overflows on x86-64 Linux
CPU Architecture, Registers, Virtual Memory, Process Layout, The Stack, The Heap, Calling Conventions, and Memory Protections