Jan. 16, 2023, 5 a.m. | +Ch0pin️

InfoSec Write-ups - Medium infosecwriteups.com

This post is part of a series of articles related to x64 Linux Binary Exploitation techniques. Following up from my previous posts, we’ve started by exploring simple stack corruption bugs and their mitigation techniques and gradually moved to more complex topics. In this article and in the context of the Heap Memory exploitation, we are going to discuss about using memory that has been previously freed, a concept which is widely known as Use-After-Free (UAF)

For those who just “joined”, …

binary exploitation exploitation free heap-exploitation linux memory allocation use-after-free

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cyber Security Culture – Communication and Content Specialist

@ H&M Group | Stockholm, Sweden

Container Hardening, Sr. (Remote | Top Secret)

@ Rackner | San Antonio, TX

GRC and Information Security Analyst

@ Intertek | United States

Information Security Officer

@ Sopra Steria | Bristol, United Kingdom

Casual Area Security Officer South Down Area

@ TSS | County Down, United Kingdom