The glibc heap consists of many components distinct parts that balance performance and security.
Beyond tcache
exists a memory management system consisting of many interrelated bins and components.
This module explores these components and interactions between them.
By applying advanced heap exploits that "shape" the internal state of the heap, exploitation primitives can be created.
Heap exploits are complex and ephemeral, frequently changing with libc versions.
For this reason, success in the module relies on parsing heap exploit proof of concepts to craft an exploit.
Lectures and Reading
Challenges
30-Day Scoreboard:
This scoreboard reflects solves for challenges in this module after the module launched in this dojo.
Rank | Hacker | Badges | Score |