Tag: Heap
-
OpenSSL Heap Memory Corruption Vulnerability Fixed
Ever since Heartbleed made life miserable for anyone using OpenSSL, I get a sick feeling in my tummy whenever I hear about an OpenSSL …
-
Novel Points: Exploit the Heap Overflow Bug *CTF 2019 oob-v8
1. Contents Many Heap Overflow Bugs can be Exploited in a Similar Way PoC of the V8 Heap Overflow Vulnerability – *CTF 2019 oob-v8 …
-
RIG EK Remains Top of Heap, Turns to Cryptomining
Even after a precipitous drop in activity last quarter, security researchers say that the RIG Exploit Kit (RIG EK) still leads the pack …
-
Debugging Complex Malware that Executes Code on the Heap
Introduction In this blog, I will share a simple debugging tactic for creating “save points” during iterative remote debugging of …
-
heap-exploitation – This book on heap exploitation is a guide to understanding the internals of glibc’s heap and various attacks possible
heap-exploitation – This book on heap exploitation is a guide to understanding the internals of glibc’s heap and various attacks possible on the heap structure 6 This short book is written for people who want to understand the internals of ‘heap memory’, particularly the implementation of glibc’s ‘malloc’ and ‘free’ procedures, and also for security…
-
What does Imogen Heap have in common with mail? The blockchain
One of Bitcoin’s attractions was always anonymity, but if you used it to buy something, your parcel was always trackable. Now, some researchers have used the blockchain concept underpinning it to make deliveries anonymous, too. Read full news article on Naked Security
●●●