Home 0P3N Blog Hacking Video Tutorial: Exploiting the Heap
Ready to Start Your Career?
Create Free Account
By: xyra
April 8, 2016

Hacking Video Tutorial: Exploiting the Heap

By: xyra
April 8, 2016
By: xyra
April 8, 2016
Hacking Video Tutorial: Exploiting the Heap - CybraryWhen it comes to buffer overflow, most people talk about an overrun in the stack segment. But what about the heap? You rarely find documentation how a heap overflow is triggered and how you can exploit it.Buffer Overflow is the consequence of a vulnerability in computer software. It's used by attackers to overwrite memory bounds, to crash the code and even to inject malicious code - the so called "payload."In this video tutorial, I'll explain the data structure of the heap and the stack segment. I'll also exploit my own demo code and explain what happens in the memory...
Every program's memory allocation is compiled of meta data and the memory returned, also known as a "chunk." All the meta data and memory returned are saved on the heap, a dynamic data structure (right after the previous memory allocation; assuming none have been released).If you also want to know more about buffer overflow in the stack segment, make sure you watch my video tutorial about buffer overflow in the stack segment, where, I reverse engineer my demo code with Immunity Debugger to explain how the memory is processed in the stack.code-707069_1920
Request Demo

Build your Cybersecurity or IT Career

Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry