In the previous parts (1, 2) of these posts I had been discussing about the heap structure and I went through some basic concepts, in order to build a better background for this
Read MoreThis post is part of a series of articles related to x64 Linux Binary Exploitation techniques. Following up from my previous posts, we’ve started by exploring simple stack cor
Read MoreRPS — Binary Exploitation Challenge Writeup | PicoCTF 2022RPS — Simple Binary Exploitation Program in PicoCTF | Approach by Karthikeyan NagarajDescription:Here’s
Read MoreBasic File Exploit — Binary Exploitation Challenge by PicoCTF 2022 | Approach by Karthikeyan NagarajDescription:The program provided allows you to write to a file and read
Read More