Exploitation Demystified, Part 3: Heap-Based Exploits
In my previous blog post in the Exploitation Demystified series, we learned how memory corruption exploits are implemented using stack-based overflow vulnerabilities. Let’s talk now about a main alternative path: heap-based vulnerabilities.
An operating system (OS) allocates memory to a computer program, with respect to the size of the data this program consumes, which is either known bef...