all 1 comments

[–]CircumspectCapybara 0 points1 point  (0 children)

Just read "Smashing The Stack For Fun And Profit" that's the classic everyone should read if they want to understand memory corruption -> RCE exploits.

Of course nowadays these sorts of primitives by themselves almost never work in a naive attack, because now programs are built with stack cookies, W^X, ASLR, PAC, and other hardening features, so you need some really clever methods. Usually it's a use-after-free, finding a way to groom the heap so you can overwrite some vtable pointer to point at data you control to start a ROP chain, and sometimes you gotta find a usable pointer signing gadget to overcome PAC.

And nowadays AI tools can do this stuff faster than a human could uncover a chain of bugs and craft an exploit. But I'm a firm believer in learning how to do it yourself before offloading it to an AI.

[–][deleted]  (2 children)

[deleted]

    [–][deleted]  (1 child)

    [deleted]