[Pwnable]

1.[Pwnable] 1. 리눅스 메모리 구조(Linux Memory Layout)

post-thumbnail

2.[Pwnable] 2. 컴퓨터 구조(Computer Architecture)

post-thumbnail

3.[Pwnable] 3. x86 Assembly

post-thumbnail

4.[Pwnable] 4. Exploit Tech: Shellcode

post-thumbnail

5.[Pwnable] 5. Background: Calling Convention

post-thumbnail

6.[Pwnable] 6. Memory Corruption: Stack Buffer Overflow

post-thumbnail

7.[Pwnable] 7. Mitigation: Stack Canary

post-thumbnail

8.[Pwnable] 8. Mitigation: NX & ASLR

post-thumbnail

9.[Pwnable] 9. Background: Library - Static Link vs. Dynamic Link

post-thumbnail

10.[Pwnable] 10. Background: RELRO

post-thumbnail

11.[Pwnable] 11. Background: PIE

post-thumbnail

12.[Pwnable] 12. Exploit Tech: Hook Overwrite

post-thumbnail

13.[Pwnable] 13. Memory Corruption: Out of Bounds

post-thumbnail

14.[Pwnable] 14. Exploit Tech: Format String Bug

post-thumbnail

15.[Pwnable] 15. Memory Corruption: Use After Free

post-thumbnail

16.[Pwnable] 16. Exploit Tech: Use After Free

post-thumbnail

17.[Pwnable] 17. Background : ptmalloc2

post-thumbnail

18.[Pwnable] 18. Memory Corruption: Double Free Bug

post-thumbnail

19.[Pwnable] 19. Logical Bug: Type Error

post-thumbnail

20.[Pwnable] 20. Logical Bug: Command Injection

post-thumbnail

21.[Pwnable] 21. Logical Bug: Path Traversal

post-thumbnail