pwn.college
DojosLeaderboardCommunity
LoginRegister
Back to software-exploitation

Exploitation Primitives

software-exploitation
0/20 challenges completed

Prior modules introduced specific vulnerabilities or exploitation techniques that can be used to gain the ability to read, write, or influence control flow. These types of exploits can be categorized into exploitation primitives:

  • Arbitrary Read
  • Arbitrary Write
  • Arbitrary Call

This module explores how to create and leverage reusable exploitation primitives.

These primitives will need to be repeatedly used to "pivot" around memory. This "pivoting" can turn a pointer leak into almost any memory address a skilled hacker desires.

Advanced Exploitation: Introduction
Video
Slides
Advanced Exploitation: Heap Address Disclosure via Race Conditions
Video
Slides
Advanced Exploitation: In-Memory Forensics
Video
Slides
Advanced Exploitation: Exploit Primitives
Video
Slides
Advanced Exploitation: End-to-End Pwnage
Video
Slides
Further Reading

Challenges

1
level1.0
2
level1.1
3
level2.0
4
level2.1
5
level3.0
6
level3.1
7
level4.0
8
level4.1
9
level5.0
10
level5.1
11
level6.0
12
level6.1
13
level7.0
14
level7.1
15
level8.0
16
level8.1
17
level9.0
18
level9.1
19
level10.0
20
level10.1