Skip to content

5o1z/Heap-Exploitation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Write-ups INDEX

libc 2.35
libc 2.34
  • MetaCTF 2021 - Hookless

    Double Free via House of Botcake. Overwrite IO_2_1_stdout with environ address to leak stack address -> write a ROP directly on stack to achieve code execution

libc 2.31
  • NahamCon CTF 2025 - Found Memory

    The binary have Use-After-Free, so that we can use that to control the bin's fd pointer, and use that to change chunk size field to 0x420 for libc leak (need to create 2 fake chunks to bypass unsortedbin mitigation). And then overwrite __free_hook to get a shell. We can leak heap base so that we don't need to brute force

  • NahamCon CTF 2024 - Lost Memory

    First allocate some random size chunk for a stack leak, then use tcache poisoning to put a ROP chain in saved RIP (the ROP chain will add atoi GOT address to system and return to main), our next step is just pass a binsh string to it

  • idek CTF 2021 - stacknotes

    malloca alloc chunk on stack depending on size,we forge a fake chunk on stack, do a house of spirit attack on it then alloc a chunk on stack with our ROP that overwrite return address

  • justCTF 2022 - notes

    Fastbin dup to overwrite __free_hook with system

  • justCTF 2023 - Nucleus

    Use-After-Free; Heap Overflow in Decompress function Overwrite bin's fd → Tcache poisoning

  • WannaGame CTF 2021 - note

    Extend chunk attack & Tcache poisoning to drop a shell

libc 2.27
  • BYU CTF 2025 - TCL

    We working with multithread (each thread has its own tcache) and the program free unused chunk each 5s. We can trigger malloc_consolidate to make a fastbin chunk to unsortedbin cause duplicate. The demo is test.c

  • Hack The Box Business 2025 - Cyber Bankrupt

    Attack tcache entry for arbitrary write and leak libc. Note that in local it has a 0x410 free chunk in tcache bin, this can make us calculate the offset, so when you're connected to the target just subtract 0x410 chunk for all chunks you use

libc 2.23

About

A place for me to archive my solution for heap challenge that I do for practice

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages