Sploitfun Linux x86 Exploit Development Series Tutorials

Source: Internet
Author: User

Original: Linux (x86) Exploit development Series

    • Online reading
    • PDF format
    • epub format
    • Mobi format
    • Github
Translator
Chapters Translator
A typical stack-based buffer overflow Hackyzh
Integer overflow Hackyzh
Off-by-one Vulnerability (stack based) Hackyzh
Use RETURN-TO-LIBC to bypass NX bit Hackyzh
Use chained return-to-libc to bypass NX bit Hackyzh
Bypassing the first part of aslr– Hackyzh
Bypassing the second part of aslr– Dragon
Bypassing the third part of aslr– Dragon
Understanding GLIBC malloc Cat Kelon @csdn
Heap overflow with unlink Dragon
Heap overflow with Malloc Maleficarum Dragon
Off-by-one Vulnerability (heap-based) Dragon
Use after release Dragon

Sploitfun Linux x86 Exploit Development Series Tutorials

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.