Palo Alto Networks

Exploitation Demystified

Exploitation Demystified, Part 3: Heap-Based Exploits

In my previous blog post in the Exploitation Demystified series, we learned how memory corruption exploits are implemented using stack-based overflow vulnerabilities. Let’s talk now about a main alternative path: heap-based vulnerabilities.

An operating system (OS) allocates memory to a computer program, with respect to the size of the data this program consumes, which is either known bef...

Apr 13, 2016

Subscribe to the Blog!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.