heap-exploitation
  • Preface
  • Author
  • Introduction
  • Heap Memory
  • Diving into glibc heap
    • malloc_chunk
    • malloc_state
    • Bins and Chunks
    • Internal Functions
    • Core Functions
    • Security Checks
  • Heap Exploitation
    • First Fit
    • Double Free
    • Forging chunks
    • Unlink Exploit
    • Shrinking Free Chunks
    • House of Spirit
    • House of Lore
    • House of Force
    • House of Einherjar
  • Secure Coding Guidelines
Powered by GitBook
On this page
  • Prerequisites
  • Setup

Was this helpful?

Introduction

PreviousAuthorNextHeap Memory

Last updated 4 years ago

Was this helpful?

This book is for understanding the structure of heap memory as well as the different kinds of exploitation techniques related to it. The material provided covers in detail the implementation of glibc's heap and related memory management functions. Next, different types of attacks are discussed.

Prerequisites

It is assumed that the reader is unfamiliar about the internals of standard library procedures such as 'malloc' and 'free'. However, basic knowledge about 'C' and overflowing the buffer is required. These can be covered in blog post.

Setup

All the programs provided in the following sections work well with POSIX compatible machines. Only the implementation of glibc's heap is discussed.

this