all InfoSec news
The toddler’s introduction to Heap exploitation (Part 1)
Jan. 16, 2023, 4:58 a.m. | +Ch0pin️
InfoSec Write-ups - Medium infosecwriteups.com
In my introductory post I had been talking about dynamic memory allocation and I referenced various solutions that are used to tackle this problem. In this post I am going to focus on the GNU C library’s memory allocation which is based on ptmalloc2 (pthreads malloc) and it is derived from dlmalloc (Doug Lea’s malloc).
The Heap organisation chart
The heap, assigned to each program, is organised according to three major components:
- The arena, which represents a memory area assigned …
More from infosecwriteups.com / InfoSec Write-ups - Medium
JNDI Injection — The Complete Story
2 days, 14 hours ago |
infosecwriteups.com
HacktheBox Starting Point: Explosion Walkthrough
4 days, 4 hours ago |
infosecwriteups.com
My LLM Bug Bounty Journey on Hugging Face Hub via Protect AI
4 days, 15 hours ago |
infosecwriteups.com
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Information System Security Engineer 2
@ Wyetech | Annapolis Junction, Maryland
Staff Vulnerability/Configuration Management Security Engineer
@ ServiceNow | Hyderabad, India
Security Engineer
@ AXS | London, England, UK