ctfnote.com
Search
⌃K
/home/ret2basic.eth
Auditing
✅
Ethereum and Solidity
DeFi
Secureum
Beyond Secureum
Audit Findings
Foundry and Hardhat
EVM
MEV
DeFiHackLabs
Research
Red Teaming
✅
Enumeration
✅
Exploitation
✅
Buffer Overflow
✅
Privilege Escalation
✅
Post Exploitation
✅
Pivoting
Active Directory (AD)
Command & Control (C2)
Malware Development
Cryptography
Hash Functions
MAC
AES
Diffie-Hellman
RSA
ECC
Digital Signature
JWT
PRNG
SSL/TLS
Research
Computer Science
Linux
Python
HTML, CSS, JavaScript, and React
C, C++, and C#
Data Structures and Algorithms
The Linux Programming Interface
Computer Systems
Databases
Distributed Systems
Static Analysis
Web
✅
Prerequisites
File Upload
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
CSRF and SSRF
XML External Entities (XXE)
Insecure Deserialization
HTTP Request Smuggling
OS Command Injection
✅
Directory Traversal
HTTP Parameter Pollution
Server-Side Template Injection (SSTI)
LDAP Injection
Redis
Pwn
Linux Exploitation
Protections
Shellcoding
ROP
ptmalloc
UAF
Race Conditions
Kernel
Appendix: Tools
Windows Exploitation
Fuzzing
Reverse
Bytecode
angr
Powered By GitBook

Linux Exploitation

Plan:
  • Protections
  • Shellcoding
  • ROP
    • Stack Alignment
    • ret2text
    • ret2syscall
    • ret2libc
    • ret2csu
    • BROP
    • SROP
    • Stack Pivot
  • ptmalloc
    • chunks
    • malloc() and free()
    • bins
    • tcache
  • UAF
  • Race Conditions
    • TOCTTOU
    • Dirty Cow
    • Meltdown
    • Spectre
  • Kernel
  • Appendix: Tools
    • socat
    • LibcSearcher-ng
    • OneGadget
Previous
Mitigations
Next
Protections
Last modified 1yr ago
Copy link