💻
A Noob's Guide To ARM Exploitation
  • About the book
  • Lab setup
  • Introduction to ARM
  • Introduction to stack buffer overflows
  • Introduction to ROP Chains
  • Invoking mprotect() using ROP Chains on ARM
  • Integer Overflows on ARM
  • Introduction to Heap Exploitation
  • Arming the Use-After-Free()
  • Double free() attacks on ARM.
  • Introduction to ARM64
  • Stack-based buffer overflows on ARM64
  • ROP chains on ARM64
  • References
Powered by GitBook
On this page

References

PreviousROP chains on ARM64

Last updated 2 years ago

https://azeria-labs.com/heap-exploitation-part-2-glibc-heap-free-bins/
https://sploitfun.wordpress.com/2015/06/23/integer-overflow/
https://heap-exploitation.dhavalkapil.com/attacks/double_free
https://www.geeksforgeeks.org/dynamic-memory-allocation-in-c-using-malloc-calloc-free-and-realloc/
https://azeria-labs.com/heap-exploitation-part-1-understanding-the-glibc-heap-implementation/
https://guyinatuxedo.github.io/27-edit_free_chunk/double_free_explanation/index.html
https://guyinatuxedo.github.io/27-edit_free_chunk/heap_consolidation_explanation/index.html
https://blog.attify.com/demystifying-ret2zp/
https://sploitfun.wordpress.com/2015/06/16/use-after-free/
https://github.com/Billy-Ellis/Exploit-Challenges