heap-exploitation
  • Preface
  • Author
  • Introduction
  • Heap Memory
  • Diving into glibc heap
    • malloc_chunk
    • malloc_state
    • Bins and Chunks
    • Internal Functions
    • Core Functions
    • Security Checks
  • Heap Exploitation
    • First Fit
    • Double Free
    • Forging chunks
    • Unlink Exploit
    • Shrinking Free Chunks
    • House of Spirit
    • House of Lore
    • House of Force
    • House of Einherjar
  • Secure Coding Guidelines
Powered by GitBook
On this page

Was this helpful?

Author

PreviousPrefaceNextIntroduction

Last updated 4 years ago

Was this helpful?

I am , also known as 'vampire'. I am a software security enthusiast, always reading up or trying to find vulnerabilities in everyday software. I'll be graduating from (IIT Roorkee) in Computer Science this year. I was part of , where I developed . I'll be joining as a Master's student this fall. Software development is my hobby and I've also completed the program twice. Find me on and .

This book started out as an article for my . Eventually, a lot of matter filled in and it transformed into a short book. These are a collection of my notes, gathered by looking up various online resources regarding heap and heap exploitation.

Feel free to shoot me an email at .

Dhaval Kapil
Indian Institute of Technology Roorkee
SDSLabs
Backdoor
Georgia Tech
Google Summer of Code
Github
Twitter
blog
me@dhavalkapil.com