x86 Exploitation 101: “House of Force” – Jedi overflow
It’s time for us to enter into the third house THE HOUSE OF FORCE Ingredients: The exploiter must be able to overwrite the top chunk (i.e. the overflow must happen in a chunk that allows to overwrite the wilderness There is a malloc() call with an exploiter-controllable size There is another malloc() call where data […]