help@cyb4rgeek.xyz

+1 (512) 588 6950

reverse-engineering

Home/Category: reverse-engineering
The toddler’s introduction to Dynamic Memory Allocation
The toddler’s introduction to Dynamic Memory Allocation bez0x January 16, 2023

The toddler’s introduction to Dynamic Memory Allocation

Heap vulnerabilities have dominated the interest of the security research community for quite long time due to their potential of finding innovative exploitation ways. Starting

Read More
The toddler’s introduction to Heap exploitation (Part 1)
The toddler’s introduction to Heap exploitation (Part 1) bez0x January 16, 2023

The toddler’s introduction to Heap exploitation (Part 1)

In my introductory post I had been talking about dynamic memory allocation and I referenced various solutions that are used to tackle this problem. In this post I am going to fo

Read More
The toddler’s introduction to Heap exploitation (Part 2)
The toddler’s introduction to Heap exploitation (Part 2) bez0x January 16, 2023

The toddler’s introduction to Heap exploitation (Part 2)

In my last post I had been talking about the heap structure in the context of the ptmalloc allocator. I went through some basic concepts, like the arena, the sub-heaps and the c

Read More
Safe Opener — Reverse Engineering | PicoCTF
Safe Opener — Reverse Engineering | PicoCTF bez0x December 27, 2022

Safe Opener — Reverse Engineering | PicoCTF

Program code of SafeOpener: java import java.io.*; import java.util.*; public class SafeOpener { public static void main(String args[]) throws IOException { BufferedReade

Read More
Getting Started with Reverse Engineering
Getting Started with Reverse Engineering bez0x December 19, 2022

Getting Started with Reverse Engineering

Reverse engineering is the process of understanding the particular aspects of the program, which are listed below to identify the components of the system and the interrelations

Read More