Linux Binary Exploitation
Stack Buffer Overflows
Stack Buffer Overflows: Linux - Chapter 1
Introduction to the general principle of Stack Buffer Overflows
Stack Buffer Overflows: Linux 2 - Using GDB
How to use GDB when performing a stack overwrite
Stack Buffer Overflows: Linux 3 - Bypassing DEP with ROP
Short introduction to the concept of ROP-chains
richsanchez' Exploit Mitigation Technologies Series
This series is absolutely fantastic as it covers the basics of how the simple exploit mitigation's came about, and some methods that have been developed to bypass them. I'd highly recommend this series.
Exploit Mitigation Techniques - Data Execution Prevention (DEP)
Exploit Mitigation Techniques - Stack Canaries
Exploit Mitigation Techniques - Address Space Layout Randomization (ASLR)
Further Reading
return to csu
Nothing major in this publication but goes through finding interesting gadgets within a binary that wouldn't normally be picked up by classic tools.
Heap Exploitation
Unlink Exploit
The Art of Exploiting Heap overflow Part 6
There's no need to over-complicate the unlink exploit. It's quite simple but unfortunately so many guides insist on showing you the entire structure of the heap. Don't get me wrong, you're going to need to understand it, but at the end of the day you're trying to understand a fundamental exploit, and a lot of that gets in the way. This blog post is concise, and gets the point across quickly.