Binary exploitation

What is binary exploitation?

Binary exploitation is the process of taking advantage of a bug or vulnerability in a binary application to gain control of the application or execute arbitrary code. This can be used to bypass security measures, gain access to sensitive information, or take control of a system.

There are various types of attacks: buffer overflows, format string vulnerabilities, heap vulnerabilities, and so on. Each of these attacks takes advantage of a different type of bug or vulnerability in the code.

Kinds of attacks:

We can classify binary exploitation attacks in three main categories: Stack, Heap and Kernel exploits. Ther order of the list is in increasign complexity.

Useful tools

Stack Exploitation