Our Blog

Linux Heap Exploitation Intro Series: Set you free() – part 2

Reading time: ~16 min
Intro Hello there! On this part we are focusing on abusing chunk creation and heap massaging in hope of overwriting...

Linux Heap Exploitation Intro Series: Set you free() – part 1

Reading time: ~15 min
Intro (part 1) Hello and welcome to the final post of our Intro to exploitation series! We have learned the basics...

Linux Heap Exploitation Intro Series: Riding free on the heap – Double free attacks!

Reading time: ~15 min
Intro Hello again and welcome to the third of our series. On today’s blog post we are going to see...

Linux Heap Exploitation Intro Series: The magicians cape – 1 Byte Overflow

Reading time: ~21 min
Intro Hello again! It’s been a while since the last blog post. This is due to not having as much...

Linux Heap Exploitation Intro Series: Used and Abused – Use After Free

Reading time: ~9 min
Intro After analysing the implementation of ptmalloc2 which, is a must read if you don’t know anything about the linux userland...

Linux Heap Exploitation Intro Series – (BONUS) printf might be leaking!

Reading time: ~11 min
Intro Hi there (again)! This series are going to an end as the next and feasible step is the widely...

Painless intro to the Linux userland heap

Reading time: ~25 min
-1 – Pre-Intro When looking at heap exploit tutorials most of the time I found myself lacking knowledge on the...