Binary exploitation is the process of taking advantage of a bug or vulnerability in a binary application to gain control of the application or execute arbitrary code. This can be used to bypass security measures, gain access to sensitive information, or take control of a system.
There are various types of attacks: buffer overflows,
format string vulnerabilities, heap
vulnerabilities, and so on. Each of these attacks takes advantage of a
different type of bug or vulnerability in the code.
We can classify binary exploitation attacks in three main categories:
Stack, Heap and Kernel exploits.
Ther order of the list is in increasign complexity.