/images/avatar.png

Phoenix exploit education heap-three

Heap three Quatrième exercice heap de la suite Phoenix exploit education. Source /* * phoenix/heap-three, by https://exploit.education * * This level is linked against ftp://gee.cs.oswego.edu/pub/misc/malloc-2.7.2.c * version 2.7.2, with a SHA1 sum of 407329d164e4989b59b9a828760acb720dc5c7db * more commonly known as "dlmalloc", Doug Lea Malloc * * Can you hijack flow control, and execute winner()? Afterwards, how * about your own code? This level is solvable on Linux i386 easily enough, * as for other architectures, it may not be possible, or may require some * creativity - let me know what you come up with :) * * My friend told me that nothing rhymes with orange.