Binary Exploitation

Introduction

Key Concepts

  • Stack based
    • Overwrite return address on stack to redirect code execution (Only for x86 binaries)
  • Heap based
    • Use after free
  • Format string vulnerability
    • Putting user input into functions that can take in format specifiers can potentially be exploited

.


Written By

GitHub Contributor Team