I want to write a Proof-of-Concept to exploiting any heap-based vulnerability(e.g. heap overflow, use-after-free) where my ROP(return-to-programming, a kind of code-reuse attacks) payload is deployed on the heap. While such exploits is widespread on windows, counterparts on linux are rare. Could anyone give me any useful advice?
Asked
Active
Viewed 578 times
2
-
1Umm, you should always be able to edit your own posts. Are you sure you logged in with the same account you used to post the question? – Mike Ounsworth Aug 20 '15 at 03:21
-
This is a really undefined question. Googling "rop exploit tutorial" returns a lot of great results. – schroeder Aug 20 '15 at 03:57