Heap Exploitation Part 1: Understanding the Glibc Heap Implementation
https://azeria-labs.com/heap-exploitation-part-1-understanding-the-glibc-heap-implementation/ [azeria-labs.com]
2019-03-19 01:12
or this reason, before I write about exploiting heap-based vulnerabilities, I will use the first two parts of this series to talk about how the heap works. This first post will be an introduction into some high-level concepts, and a discussion about how new heap chunks are created. In the next post I will do a deeper dive into the technical implementation of how chunks are freed and recycled.
source: green