{"version":1,"pages":[{"id":"dmcxxgwVyo1Ha7GD730X","title":"Introduction","pathname":"/","siteSpaceId":"sitesp_rtdXf","description":""},{"id":"zdI1k9qs6JJWFveqXgon","title":"Introduction","pathname":"/cryptography/reconnaissance","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"}]},{"id":"oa9jSxQ4sD2Ju3liBpZN","title":"General knowledge","pathname":"/cryptography/general-knowledge","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"}]},{"id":"OzCIgNi2BUzCmKlPd0Rs","title":"Encoding","pathname":"/cryptography/general-knowledge/encoding","siteSpaceId":"sitesp_rtdXf","description":"Data standard","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"}]},{"id":"Pz7u0NJzMVvH2wRzX51V","title":"Character encoding","pathname":"/cryptography/general-knowledge/encoding/character-encoding","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Encoding"}]},{"id":"hzUQohFHUdeC0dD8SO9W","title":"ASCII","pathname":"/cryptography/general-knowledge/encoding/character-encoding/ascii","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Encoding"},{"label":"Character encoding"}]},{"id":"2VWKLDkLaQmK8im1NCt7","title":"Unicode","pathname":"/cryptography/general-knowledge/encoding/character-encoding/unicode","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Encoding"},{"label":"Character encoding"}]},{"id":"eTCAkoXB1vPoMmRwdTb6","title":"UTF-8","pathname":"/cryptography/general-knowledge/encoding/character-encoding/utf-8","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Encoding"},{"label":"Character encoding"}]},{"id":"NNNh9zWbkg5kl6LRGF0X","title":"Data encoding","pathname":"/cryptography/general-knowledge/encoding/data-encoding","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Encoding"}]},{"id":"AZoZuOypyJ5aoI4VgNtH","title":"Base16","pathname":"/cryptography/general-knowledge/encoding/data-encoding/base16","siteSpaceId":"sitesp_rtdXf","description":"Hexadecimal encoding","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Encoding"},{"label":"Data encoding"}]},{"id":"xKW7C66WAJgCXzBWax5I","title":"Base32","pathname":"/cryptography/general-knowledge/encoding/data-encoding/base32","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Encoding"},{"label":"Data encoding"}]},{"id":"5dtJJ9xgQOBLQN0F8MyF","title":"Base64","pathname":"/cryptography/general-knowledge/encoding/data-encoding/base64","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Encoding"},{"label":"Data encoding"}]},{"id":"P6sgK1RLBaHnbNqV96HF","title":"Maths","pathname":"/cryptography/general-knowledge/maths","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"}]},{"id":"yWlOWwC7EzCFu6rqeQ6I","title":"Modular arithmetic","pathname":"/cryptography/general-knowledge/maths/modular-arithmetic","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Maths"}]},{"id":"KJh9immk1niPBeEMNZqY","title":"Greatest Common Divisor","pathname":"/cryptography/general-knowledge/maths/modular-arithmetic/greatest-common-divisor","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Maths"},{"label":"Modular arithmetic"}]},{"id":"fkhOOjrsC4pDPGhATM89","title":"Fermat's little theorem","pathname":"/cryptography/general-knowledge/maths/modular-arithmetic/fermats-little-theorem","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Maths"},{"label":"Modular arithmetic"}]},{"id":"obdkSu9YDbs7W4CM79mD","title":"Quadratic residues","pathname":"/cryptography/general-knowledge/maths/modular-arithmetic/quadratic-residues","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Maths"},{"label":"Modular arithmetic"}]},{"id":"wT2LKGxFVDLboAPaA1tT","title":"Tonelli-Shanks","pathname":"/cryptography/general-knowledge/maths/modular-arithmetic/tonelli-shanks","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Maths"},{"label":"Modular arithmetic"}]},{"id":"qFX8H8UWqxsWzdtzrwfB","title":"Chinese Remainder Theorem","pathname":"/cryptography/general-knowledge/maths/modular-arithmetic/chinese-remainder-theorem","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Maths"},{"label":"Modular arithmetic"}]},{"id":"hZaQ6ixCTPSp3JBkY7v7","title":"Modular binomial","pathname":"/cryptography/general-knowledge/maths/modular-arithmetic/modular-binomial","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Maths"},{"label":"Modular arithmetic"}]},{"id":"HJKVNqxYxg1mJ09F1pJj","title":"Padding","pathname":"/cryptography/general-knowledge/padding","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"}]},{"id":"j7gQq0KgvW6dRfQZ6kl2","title":"PKCS#7","pathname":"/cryptography/general-knowledge/padding/pkcs-7","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"General knowledge"},{"label":"Padding"}]},{"id":"FsDxfr3BH8C7A9azWZPu","title":"Misc","pathname":"/cryptography/misc","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"}]},{"id":"7drtisienjIyO8aemlQq","title":"XOR","pathname":"/cryptography/misc/xor","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Misc"}]},{"id":"fy5e5Sr32kgkGQcu7ZlK","title":"Mono-alphabetic substitution","pathname":"/cryptography/mono-alphabetic-substitution","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"}]},{"id":"YE3LfjMtfZ69e7K6GsQQ","title":"Index of coincidence","pathname":"/cryptography/mono-alphabetic-substitution/index-of-coincidence","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Mono-alphabetic substitution"}]},{"id":"KyfHsxzjYjbSkNHBESOp","title":"frequency analysis","pathname":"/cryptography/mono-alphabetic-substitution/frequency-analysis","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Mono-alphabetic substitution"}]},{"id":"QWVYQIQz9UzyNQ2Lj1RX","title":"Well known algorithms","pathname":"/cryptography/mono-alphabetic-substitution/well-known-algorithms","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Mono-alphabetic substitution"}]},{"id":"goSZLB1ZGh4mZRdHgxOf","title":"Scytale","pathname":"/cryptography/mono-alphabetic-substitution/well-known-algorithms/scytale","siteSpaceId":"sitesp_rtdXf","emoji":"1f534","description":"Spartan cipher","breadcrumbs":[{"label":"Cryptography"},{"label":"Mono-alphabetic substitution"},{"label":"Well known algorithms"}]},{"id":"Dda3zMtkTQHxatl7GdoD","title":"ROT","pathname":"/cryptography/mono-alphabetic-substitution/well-known-algorithms/rot","siteSpaceId":"sitesp_rtdXf","emoji":"1f534","description":"Caesar & ROT13","breadcrumbs":[{"label":"Cryptography"},{"label":"Mono-alphabetic substitution"},{"label":"Well known algorithms"}]},{"id":"c4aSSmk4eyxrH7VhdtzG","title":"Polybe","pathname":"/cryptography/mono-alphabetic-substitution/well-known-algorithms/polybe","siteSpaceId":"sitesp_rtdXf","emoji":"1f534","description":"Cipher square","breadcrumbs":[{"label":"Cryptography"},{"label":"Mono-alphabetic substitution"},{"label":"Well known algorithms"}]},{"id":"LxFultZPhRouuHYhnnpw","title":"Vigenere","pathname":"/cryptography/mono-alphabetic-substitution/well-known-algorithms/vigenere","siteSpaceId":"sitesp_rtdXf","emoji":"1f534","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Mono-alphabetic substitution"},{"label":"Well known algorithms"}]},{"id":"6FNcRGEnwl8LmfjjJ37i","title":"Pigpen cipher","pathname":"/cryptography/mono-alphabetic-substitution/well-known-algorithms/pigpen-cipher","siteSpaceId":"sitesp_rtdXf","emoji":"1f534","description":"Masonic cipher","breadcrumbs":[{"label":"Cryptography"},{"label":"Mono-alphabetic substitution"},{"label":"Well known algorithms"}]},{"id":"yw13xzVt8PwAjRc64Ed4","title":"Affine cipher","pathname":"/cryptography/mono-alphabetic-substitution/well-known-algorithms/affine-cipher","siteSpaceId":"sitesp_rtdXf","emoji":"1f534","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Mono-alphabetic substitution"},{"label":"Well known algorithms"}]},{"id":"CF0oUGsJFEVetuzyl4EB","title":"Symmetric Cryptography","pathname":"/cryptography/symmetric-cryptography","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"}]},{"id":"QVYOqjl0VOiLWOXJD0MB","title":"AES","pathname":"/cryptography/symmetric-cryptography/aes","siteSpaceId":"sitesp_rtdXf","description":"The Rijndael scheme","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"}]},{"id":"Vx8L0CEU8qyYLzXcXmbG","title":"Block Encryption procedure","pathname":"/cryptography/symmetric-cryptography/aes/block-encryption-procedure","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"}]},{"id":"PicRNTPF6fEx0p3JwTJg","title":"Byte Substitution","pathname":"/cryptography/symmetric-cryptography/aes/block-encryption-procedure/byte-substitution","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Block Encryption procedure"}]},{"id":"VIC3bfGYJyljGzbGVBpA","title":"Shift Row","pathname":"/cryptography/symmetric-cryptography/aes/block-encryption-procedure/shift-row","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Block Encryption procedure"}]},{"id":"NjWHfle6PS1qSIldBj9q","title":"Mix Column","pathname":"/cryptography/symmetric-cryptography/aes/block-encryption-procedure/mix-column","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Block Encryption procedure"}]},{"id":"i8lTujBRSrj4SXp8fxmB","title":"Add Key","pathname":"/cryptography/symmetric-cryptography/aes/block-encryption-procedure/add-key","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Block Encryption procedure"}]},{"id":"huMUZDPebnGXGQmyTzvs","title":"Key Expansion / Key Schedule","pathname":"/cryptography/symmetric-cryptography/aes/block-encryption-procedure/key-expansion-key-schedule","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Block Encryption procedure"}]},{"id":"K6Dx26xvRFsbTEfJ2R0F","title":"Mode of Operation","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"}]},{"id":"kuzjizX1lVBj0HjAl2zg","title":"ECB","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/ecb","siteSpaceId":"sitesp_rtdXf","description":"Electronic Codebook Block","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"}]},{"id":"yK05q4ofmd3FkkvDkgEE","title":"Block shuffling","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/ecb/block-shuffling","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"},{"label":"ECB"}]},{"id":"BCySzqm2PwHXJ9akwC9n","title":"Challenge example","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/ecb/block-shuffling/challenge-example","siteSpaceId":"sitesp_rtdXf","description":"Arbitrary token","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"},{"label":"ECB"},{"label":"Block shuffling"}]},{"id":"7nrd3rvvxIopOPYAJA4z","title":"ECB Oracle","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/ecb/ecb-oracle","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"},{"label":"ECB"}]},{"id":"SugLeaO1lnmP9lMQqbCG","title":"Challenge example","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/ecb/ecb-oracle/challenge-example","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"},{"label":"ECB"},{"label":"ECB Oracle"}]},{"id":"hPyGaDkgipESMA3qcA3j","title":"CBC","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/cbc","siteSpaceId":"sitesp_rtdXf","description":"Cipher Block Chaining","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"}]},{"id":"Ex444jTto3UYHOe1p61l","title":"Bit flipping","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/cbc/bit-flipping","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"},{"label":"CBC"}]},{"id":"KvSzsz6w9S0LcLZhM5JQ","title":"Challenge example","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/cbc/bit-flipping/challenge-example","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"},{"label":"CBC"},{"label":"Bit flipping"}]},{"id":"xpyp1AEfKmpOiS9bfGdm","title":"Padding oracle","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/cbc/padding-oracle","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"},{"label":"CBC"}]},{"id":"PMO8RsDsn1iwd72jFiA5","title":"Challenge example","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/cbc/padding-oracle/challenge-example","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"},{"label":"CBC"},{"label":"Padding oracle"}]},{"id":"AOLQ884WuyjhtCT4K9Uc","title":"OFB","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/ofb","siteSpaceId":"sitesp_rtdXf","description":"Output Feedback","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"}]},{"id":"gdWmv1baB6oI1D5kqFJM","title":"Key stream reconstruction","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/ofb/key-stream-reconstruction","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"},{"label":"OFB"}]},{"id":"W7Okzpco4KI08QGDXKpz","title":"Encrypt to Uncrypt","pathname":"/cryptography/symmetric-cryptography/aes/mode-of-operation/ofb/encrypt-to-uncrypt","siteSpaceId":"sitesp_rtdXf","description":"Encrypt + Encrypt = plaintext","breadcrumbs":[{"label":"Cryptography"},{"label":"Symmetric Cryptography"},{"label":"AES"},{"label":"Mode of Operation"},{"label":"OFB"}]},{"id":"zDT9Ji45PiZrrKMjPTmK","title":"General knowledge","pathname":"/pwn/general-knowledge","siteSpaceId":"sitesp_rtdXf","description":"Pwn refers to the exploitation of a vulnerability in a binary to gain access to sensitive data or gain unauthorized control over the service.","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"}]},{"id":"2yVxqtBmdtCVprSQlkkW","title":"STACK","pathname":"/pwn/general-knowledge/operation-of-the-stack","siteSpaceId":"sitesp_rtdXf","description":"The stack is a data structure that operates as a last-in-first-out (LIFO) structure","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"General knowledge"}]},{"id":"3xtSxZbdgHVLrOKTi9tQ","title":"Variables storage","pathname":"/pwn/general-knowledge/operation-of-the-stack/variables-storage","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"General knowledge"},{"label":"STACK"}]},{"id":"8DvUSTsuEUKqiliRc7Fl","title":"Stack frame","pathname":"/pwn/general-knowledge/operation-of-the-stack/stack-frame","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"General knowledge"},{"label":"STACK"}]},{"id":"oRIA75zaW0nmrU9wy2eX","title":"PLT and GOT","pathname":"/pwn/general-knowledge/plt-and-got","siteSpaceId":"sitesp_rtdXf","description":"Dynamic Linking","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"General knowledge"}]},{"id":"ZFvU3LoXddueSvR6XiSm","title":"HEAP","pathname":"/pwn/general-knowledge/operation-of-the-heap","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"General knowledge"}]},{"id":"TIOa9bJA1WUylYduV7pi","title":"HEAP operations","pathname":"/pwn/general-knowledge/operation-of-the-heap/heap-operations","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"General knowledge"},{"label":"HEAP"}]},{"id":"3MLmLghxUXqfGRfolUcj","title":"Chunk","pathname":"/pwn/general-knowledge/operation-of-the-heap/chunk","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"General knowledge"},{"label":"HEAP"}]},{"id":"BplV6L9j2lOEoa6j0a51","title":"Bins","pathname":"/pwn/general-knowledge/operation-of-the-heap/bins","siteSpaceId":"sitesp_rtdXf","description":"Free chunks collections","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"General knowledge"},{"label":"HEAP"}]},{"id":"KgreHITNwUczW3cxwlW1","title":"Chunk allocation and reallocation","pathname":"/pwn/general-knowledge/operation-of-the-heap/chunk-allocation-and-reallocation","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"General knowledge"},{"label":"HEAP"}]},{"id":"7la1Y98NQvRnswM2v2kw","title":"Syscall","pathname":"/pwn/general-knowledge/syscall","siteSpaceId":"sitesp_rtdXf","description":"System Call","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"General knowledge"}]},{"id":"BKkz9NkJsUJwr5by3xZd","title":"Architectures","pathname":"/pwn/architectures","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"}]},{"id":"AN1JqNWNZ299e9BLz043","title":"aarch32","pathname":"/pwn/architectures/aarch32","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"}]},{"id":"C93A5K0x4fLe0V5mPHQo","title":"Registers","pathname":"/pwn/architectures/aarch32/registers","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"aarch32"}]},{"id":"HRNl4E03noue04Z0Auvv","title":"Instruction set","pathname":"/pwn/architectures/aarch32/instruction-set","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"aarch32"}]},{"id":"Jh8qbPwn6TKNHDr2pEp9","title":"Calling convention","pathname":"/pwn/architectures/aarch32/calling-convention","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"aarch32"}]},{"id":"2Q8zsWXxLKftROAGI5Ru","title":"aarch64","pathname":"/pwn/architectures/aarch64","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"}]},{"id":"6QFFYvz16vyWorME2Bl6","title":"Registers","pathname":"/pwn/architectures/aarch64/registers","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"aarch64"}]},{"id":"xGfhj5c77krUsFcg4GEG","title":"Instruction set","pathname":"/pwn/architectures/aarch64/instruction-set","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"aarch64"}]},{"id":"VVsJLwbDk9VBoMKDKsHZ","title":"Calling convention","pathname":"/pwn/architectures/aarch64/calling-convention","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"aarch64"}]},{"id":"MsD7S3MXqe7ojWutSPyO","title":"mips32","pathname":"/pwn/architectures/mips32","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"}]},{"id":"f6GSexahi4icXk0tw5Fr","title":"Registers","pathname":"/pwn/architectures/mips32/registers","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"mips32"}]},{"id":"yqAjbM440TNVWsA4TsXY","title":"Instruction set","pathname":"/pwn/architectures/mips32/instruction-set","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"mips32"}]},{"id":"QwnnXDhdJymfLzKRNKh9","title":"Calling convention","pathname":"/pwn/architectures/mips32/calling-convention","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"mips32"}]},{"id":"1AeqRrZNV6gKgZQ9pmKD","title":"mips64","pathname":"/pwn/architectures/mips64","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"}]},{"id":"VUYhy6Sz71yFMrH9Yuj0","title":"Registers","pathname":"/pwn/architectures/mips64/registers","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"mips64"}]},{"id":"Tv1z9L8GwF59jTc4gjWr","title":"Instruction set","pathname":"/pwn/architectures/mips64/instruction-set","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"mips64"}]},{"id":"xQT7LrpqmZffftxBJj5Q","title":"Calling convention","pathname":"/pwn/architectures/mips64/calling-convention","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"mips64"}]},{"id":"qMRgeuBSnakKMLAc40lc","title":"x86 / x64","pathname":"/pwn/architectures/x86-x64","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"}]},{"id":"RVhmAaP088EmNXpI2sOb","title":"Registers","pathname":"/pwn/architectures/x86-x64/registers","siteSpaceId":"sitesp_rtdXf","description":"Main x86 and x64 registers","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"x86 / x64"}]},{"id":"KY0zD8lZLZNI4VLAJ038","title":"Instruction set","pathname":"/pwn/architectures/x86-x64/instruction-set","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"x86 / x64"}]},{"id":"m6itT8TiFBjO3bA2K2rZ","title":"Calling convention","pathname":"/pwn/architectures/x86-x64/calling-convention","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Architectures"},{"label":"x86 / x64"}]},{"id":"259SvSpsk43cHJDwUfca","title":"Stack exploitation","pathname":"/pwn/stack-exploitation","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"}]},{"id":"fbG62cay9RRC2IOnFgc1","title":"Stack Buffer Overflow","pathname":"/pwn/stack-exploitation/stack-buffer-overflow","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"}]},{"id":"PzQxKI2x2xiILCiPTDiy","title":"Dangerous functions","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/dangerous-functions","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"}]},{"id":"cIWABwoUb9qSFAnnzGiL","title":"gets","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/dangerous-functions/gets","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"},{"label":"Dangerous functions"}]},{"id":"p4a9lm1J9f59kSyuRWZ3","title":"memcpy","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/dangerous-functions/memcpy","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"},{"label":"Dangerous functions"}]},{"id":"FabVtX780aC9AqZuGpbn","title":"sprintf","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/dangerous-functions/sprintf","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"},{"label":"Dangerous functions"}]},{"id":"qxsHYL2Sy0GL6pt5SzSM","title":"strcat","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/dangerous-functions/strcat","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"},{"label":"Dangerous functions"}]},{"id":"alItBy3vpFuhEXXnfQlB","title":"strcpy","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/dangerous-functions/strcpy","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"},{"label":"Dangerous functions"}]},{"id":"YOKpI9yKnTtxCe5KKYr5","title":"Basics","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/basics","siteSpaceId":"sitesp_rtdXf","description":"Data overwrite","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"}]},{"id":"UQRQxyu5w2P30bRRvu0w","title":"Challenge example","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/basics/challenge-example","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"},{"label":"Basics"}]},{"id":"OipzGCRjxXr3HANRBQ4C","title":"Instruction pointer Overwrite","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/instruction-pointer-overwrite","siteSpaceId":"sitesp_rtdXf","description":"Arbitrary Instruction redirection","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"}]},{"id":"oRlW2PgCyQtbBpwet6sU","title":"Challenge example","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/instruction-pointer-overwrite/challenge-example","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"},{"label":"Instruction pointer Overwrite"}]},{"id":"bXraWw1Rik7wY7rjkdlR","title":"De Bruijn Sequences","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/de-bruijn-sequences","siteSpaceId":"sitesp_rtdXf","description":"\"Calculating\" offset","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"}]},{"id":"W43biqF7z2U3yHutLy1R","title":"Stack reading","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/stack-reading","siteSpaceId":"sitesp_rtdXf","description":"Bruteforce as stack reader","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"}]},{"id":"Guc5Az4d5g5AWFkQpWih","title":"Challenge example","pathname":"/pwn/stack-exploitation/stack-buffer-overflow/stack-reading/challenge-example","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Stack Buffer Overflow"},{"label":"Stack reading"}]},{"id":"BgZ5Orl3NjHDB9zFnkno","title":"Format string","pathname":"/pwn/stack-exploitation/format-string","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"}]},{"id":"aRMUUyLnd1Mt1yjFdDQs","title":"Dangerous functions","pathname":"/pwn/stack-exploitation/format-string/dangerous-functions","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Format string"}]},{"id":"KDQAeB5BXIEVtYWFoEFs","title":"printf","pathname":"/pwn/stack-exploitation/format-string/dangerous-functions/printf","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Format string"},{"label":"Dangerous functions"}]},{"id":"x3rYNJa6a8sLdpPwLEm5","title":"fprintf","pathname":"/pwn/stack-exploitation/format-string/dangerous-functions/fprintf","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Format string"},{"label":"Dangerous functions"}]},{"id":"XfLNuipG6AMACkTqrsyN","title":"Placeholder","pathname":"/pwn/stack-exploitation/format-string/specifier","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Format string"}]},{"id":"04qVudZEyhnUZEhKBHRd","title":"Data Leak","pathname":"/pwn/stack-exploitation/format-string/data-leak","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Format string"}]},{"id":"3aScH3G02RHn8IOgcK6f","title":"Challenge example","pathname":"/pwn/stack-exploitation/format-string/data-leak/challenge-example","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Format string"},{"label":"Data Leak"}]},{"id":"QdoJM8f1bb3GHHh5ugIH","title":"Data modification","pathname":"/pwn/stack-exploitation/format-string/data-modification","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Format string"}]},{"id":"igWIIlOpqzzx2BjRk2n0","title":"Challenge example","pathname":"/pwn/stack-exploitation/format-string/data-modification/data-modification","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Format string"},{"label":"Data modification"}]},{"id":"NYN5X837z9OMTRw4AJm7","title":"Arbitrary code execution","pathname":"/pwn/stack-exploitation/arbitrary-code-execution","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"}]},{"id":"Q6Po1cMNRIstNBQhpcqW","title":"Shellcode","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/arbitrary-code-execution","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"}]},{"id":"9oc0PbeIZI83bu0xdEhy","title":"ret2reg","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/ret2reg","siteSpaceId":"sitesp_rtdXf","description":"Using register","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"}]},{"id":"WfajIftKA6XpxMmbK0q5","title":"Code reuse attack","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"}]},{"id":"RjJMPNEt5ViM5jiW3SDo","title":"Ret2plt","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/ret2plt","siteSpaceId":"sitesp_rtdXf","description":"ASLR bypass","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"}]},{"id":"NUuV9AcoeKgQBReesTIQ","title":"Ret2dlresolve","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/ret2dlresolve","siteSpaceId":"sitesp_rtdXf","description":"Resolving an arbitrary libc functions","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"}]},{"id":"dbzIDezjnwBG9iKuXG2S","title":"GOT Overwrite","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/got-overwrite","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"}]},{"id":"A3KtXLvk1ivbXAx7UUAi","title":"Ret2LibC","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/ret2libc","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"}]},{"id":"1MPeQ0n56PS4svYsAr4f","title":"Leaking LibC","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/leaking-libc","siteSpaceId":"sitesp_rtdXf","description":"ASLR bypass","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"}]},{"id":"PukXzTJslXsfNZbxPbP9","title":"Ret2csu","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/ret2csu","siteSpaceId":"sitesp_rtdXf","description":"Controlling registers","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"}]},{"id":"4Ey9tbrP8oCZDzwWTtZW","title":"Return Oriented Programming - ROP","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/return-oriented-programming-rop","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"}]},{"id":"WbV1WSd5YHb1o8SGw0Kb","title":"Sigreturn Oriented Programming - SROP","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/sigreturn-oriented-programming-srop","siteSpaceId":"sitesp_rtdXf","description":"A syscall to rule them all","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"}]},{"id":"YYwugpa7ZFdKYMlw56F0","title":"Blind Return Oriented Programming - BROP","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/blind-return-oriented-programming-brop","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"}]},{"id":"tGdX6WRPS4UlogJ3sQLJ","title":"Challenge example","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/blind-return-oriented-programming-brop/challenge-example","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"},{"label":"Blind Return Oriented Programming - BROP"}]},{"id":"pXfsvbpYCIjO6SN17ldd","title":"Call Oriented Programming - COP","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/call-oriented-programming-cop","siteSpaceId":"sitesp_rtdXf","emoji":"1f534","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"}]},{"id":"FPSptpHD2lMAdLLfsHDx","title":"Jump Oriented Programming - JOP","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/jump-oriented-programming-jop","siteSpaceId":"sitesp_rtdXf","emoji":"1f534","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"}]},{"id":"ou0ZniIqFqkmYtUJorNk","title":"One gadget","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/code-reuse-attack/one-gadget","siteSpaceId":"sitesp_rtdXf","description":"Quick win","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"},{"label":"Code reuse attack"}]},{"id":"7EzfEJQEGyVrwUMCTkFV","title":"Stack pivoting","pathname":"/pwn/stack-exploitation/arbitrary-code-execution/stack-pivoting","siteSpaceId":"sitesp_rtdXf","description":"ROP with a small buffer","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Stack exploitation"},{"label":"Arbitrary code execution"}]},{"id":"iRqmO4uPMZGVsaLssSvO","title":"Heap exploitation","pathname":"/pwn/heap-exploitation","siteSpaceId":"sitesp_rtdXf","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"}]},{"id":"AFQIeWLeXcscHwLop4mf","title":"Heap overflow","pathname":"/pwn/heap-exploitation/heap-overflow","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Heap exploitation","emoji":"1f6e0"}]},{"id":"LNFKxPJDhmK2EMynFCu9","title":"Challenge example","pathname":"/pwn/heap-exploitation/heap-overflow/challenge-example","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Heap exploitation","emoji":"1f6e0"},{"label":"Heap overflow"}]},{"id":"Nc8HzNsJ7aLpsMN4s8aP","title":"Use after free","pathname":"/pwn/heap-exploitation/use-after-free","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Heap exploitation","emoji":"1f6e0"}]},{"id":"vBCRnV8VV9EPpIASs0U8","title":"Challenge example","pathname":"/pwn/heap-exploitation/use-after-free/challenge-example","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Heap exploitation","emoji":"1f6e0"},{"label":"Use after free"}]},{"id":"24lB9TNqcN6Soufv8af2","title":"Double free","pathname":"/pwn/heap-exploitation/double-free","siteSpaceId":"sitesp_rtdXf","emoji":"1f6e0","description":"Arbitrary write","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Heap exploitation","emoji":"1f6e0"}]},{"id":"81mFVX3Vx3ofBKx3bgQl","title":"Unlink exploit","pathname":"/pwn/heap-exploitation/unlink-exploit","siteSpaceId":"sitesp_rtdXf","emoji":"1f534","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Heap exploitation","emoji":"1f6e0"}]},{"id":"AtuGxRomfjesa8pIXOz0","title":"Protections","pathname":"/pwn/protections","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"}]},{"id":"g8ljEZ6axHL8BnkqE8nK","title":"Stack Canaries","pathname":"/pwn/protections/stack-canaries","siteSpaceId":"sitesp_rtdXf","description":"Buffer Overflow prevention","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Protections"}]},{"id":"DiaVZUCAZd1oQGZywtkl","title":"No eXecute","pathname":"/pwn/protections/no-execute","siteSpaceId":"sitesp_rtdXf","description":"The shellcode prevention","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Protections"}]},{"id":"c6x8I29gatTydJdOgpbP","title":"PIE","pathname":"/pwn/protections/pie","siteSpaceId":"sitesp_rtdXf","description":"Position Independent Executable","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Protections"}]},{"id":"BpmdExSyPDbOWK2LEMMi","title":"ASLR","pathname":"/pwn/protections/aslr","siteSpaceId":"sitesp_rtdXf","description":"Address Space Layout Randomisation","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Protections"}]},{"id":"ICW4oTZvyva10WWYyUWp","title":"RELRO","pathname":"/pwn/protections/relro","siteSpaceId":"sitesp_rtdXf","description":"Relocation Read-Only","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"},{"label":"Protections"}]},{"id":"E4C27C9aghbVpNheqVUU","title":"Integer overflow","pathname":"/pwn/integer-overflow","siteSpaceId":"sitesp_rtdXf","description":"","breadcrumbs":[{"label":"Pwn","emoji":"1f6e0"}]}]}