Intro to glibc heap exploitation (HitconCTF, glibc 2.31)
Credits Tom Mansion (@quarkslab)
https://blog.quarkslab.com/heap-exploitation-glibc-internals-and-nifty-tricks.html
Credits Tom Mansion (@quarkslab)
https://blog.quarkslab.com/heap-exploitation-glibc-internals-and-nifty-tricks.html
Quarkslab
Heap exploitation, glibc internals and nifty tricks. - Quarkslab's blog
This is a writeup of a heap pwn challenge at HitconCTF Qualifiers 2024, which explains some glibc malloc internals and some heap exploitation tricks that can be used for getting a shell!
GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
GitHub
GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
Reverse engineering focusing on x64 Windows. Contribute to 0xZ0F/Z0FCourse_ReverseEngineering development by creating an account on GitHub.
π3
This media is not supported in your browser
VIEW IN TELEGRAM
π€©5β€βπ₯3π3
CVE-2024-43582: RCE in RDP Servers, 8.1 ratin
A use after free vulnerability in some RDP servers could allow an attacker to carry out remote code execution.
Exploit
A use after free vulnerability in some RDP servers could allow an attacker to carry out remote code execution.
Exploit
π1