all InfoSec news
The toddler’s introduction to Heap exploitation, Use After Free & Double free (Part 4)
Jan. 16, 2023, 5 a.m. | +Ch0pin️
InfoSec Write-ups - Medium infosecwriteups.com
This post is part of a series of articles related to x64 Linux Binary Exploitation techniques. Following up from my previous posts, we’ve started by exploring simple stack corruption bugs and their mitigation techniques and gradually moved to more complex topics. In this article and in the context of the Heap Memory exploitation, we are going to discuss about using memory that has been previously freed, a concept which is widely known as Use-After-Free (UAF)
For those who just “joined”, …
binary exploitation exploitation free heap-exploitation linux memory allocation use-after-free
More from infosecwriteups.com / InfoSec Write-ups - Medium
Honeypots 101: A Beginner’s Guide to Honeypots
2 days, 9 hours ago |
infosecwriteups.com
No Dev Team? No Problem: Writing Malware and Anti-Malware With GenAI
2 days, 21 hours ago |
infosecwriteups.com
Devvortex Hackthebox Walkthrough
3 days, 10 hours ago |
infosecwriteups.com
Port Scanning for Bug Bounties
3 days, 10 hours ago |
infosecwriteups.com
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
Cyber Security Culture – Communication and Content Specialist
@ H&M Group | Stockholm, Sweden
Container Hardening, Sr. (Remote | Top Secret)
@ Rackner | San Antonio, TX
GRC and Information Security Analyst
@ Intertek | United States
Information Security Officer
@ Sopra Steria | Bristol, United Kingdom
Casual Area Security Officer South Down Area
@ TSS | County Down, United Kingdom