pwn.college
DojosLeaderboardCommunity
LoginRegister
Back to software-exploitation

Dynamic Allocator Exploitation

software-exploitation
0/17 challenges completed

The glibc heap consists of many components distinct parts that balance performance and security. Beyond tcache exists a memory management system consisting of many interrelated bins and components. This module explores these components and interactions between them. By applying advanced heap exploits that "shape" the internal state of the heap, exploitation primitives can be created. Heap exploits are complex and ephemeral, frequently changing with libc versions. For this reason, success in the module relies on parsing heap exploit proof of concepts to craft an exploit.

Dynamic Allocator II - Beyond tcache
Video
Slides
Dynamic Allocator II - The Bins
Video
Slides
Dynamic Allocator II - Exploitation
Video
Slides
shellphish/how2heap & Tips

Challenges

1
level1.0
2
level1.1
3
level2.0
4
level2.1
5
level3.0
6
level3.1
7
level4.0
8
level4.1
9
level5.0
10
level5.1
11
level6.0
12
level6.1
13
level7.0
14
level7.1
15
level8.0
16
level8.1
17
level9