From vulnerability to exploit - this post explores the journey of developing an ARM ROP chain to exploit a buffer overflow in uc-http.
Full blog post available at https://modzero.com/en/blog/roping-our-way-to-rce/.
From vulnerability to exploit - this post explores the journey of developing an ARM ROP chain to exploit a buffer overflow in uc-http.
Full blog post available at https://modzero.com/en/blog/roping-our-way-to-rce/.