From be807f1816852e2d76b91339d7fcf9756a4841ba Mon Sep 17 00:00:00 2001 From: carlospolop Date: Wed, 20 Aug 2025 11:23:11 +0200 Subject: [PATCH] f --- src/binary-exploitation/libc-heap/use-after-free/first-fit.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/src/binary-exploitation/libc-heap/use-after-free/first-fit.md b/src/binary-exploitation/libc-heap/use-after-free/first-fit.md index 047a52e36..d1cffd5c9 100644 --- a/src/binary-exploitation/libc-heap/use-after-free/first-fit.md +++ b/src/binary-exploitation/libc-heap/use-after-free/first-fit.md @@ -106,9 +106,7 @@ Exploitation recipe (common in recent CTFs): 4. **Allocate** again – the leftover part overlaps with an existing in-use chunk → UAF. 5. Overwrite sensitive fields (function pointers, FILE vtable, etc.) -A practical application can be found in the 2024 HITCON Quals *Setjmp* challenge where this exact primitive is used to pivot from a UAF to full control of `__free_hook`.{{#ref}} -../../../../references/2024_setjmp_firstfit.md -{{#endref}} +A practical application can be found in the 2024 HITCON Quals *Setjmp* challenge where this exact primitive is used to pivot from a UAF to full control of `__free_hook`. --- ### 🛡️ Mitigations & Hardening