Neko

Linux Exploit Development


Last updated: May 4th, 2023

Theory

Stack Smashing Basics

Abusing EIP Control

Code Reuse

Shellcode

Code Execution

Debugging

Exploit Prevention Measures

NX

ASLR

Canaries

RELRO

RPATH, PIE, ASCII Armor

ROP

Theory

Example

Format String

Theory

Exploitation