Skip to content

Latest commit

 

History

History
1 lines (1 loc) · 605 Bytes

File metadata and controls

1 lines (1 loc) · 605 Bytes

In BSidesDelhi 2018 - data_bank challenge, there is a use after free (UAF) vulnerability which leads to tcache poisoning. Using this, we leak a libc address to de-randomize ASLR, and then put our fake chunk address into the tcache bin using tcache poisoning attack. As a result, we can force malloc to return our fake chunk before __malloc_hook, so we can overwrite __malloc_hook with one gadget. This is an interesting heap exploitation challenge to learn bypassing protections like NX, PIE, Canary, Full RELRO, and ASLR in x86_64 binaries in presence of tcache.