Exploitation Flowcharts

Consult these flowcharts when you are planning your exploitation strategy:

Click on a flowchart to open the svg image directly.

Please note that the graphs cannot be exhaustive. However, if you think there is something missing that is helpful for your understanding of the lecture and/or exercises, do not hesitate to suggest your change via abe@seclab-bonn.de. Thanks! :)

Stack Overflow

Stack Overflow Decision Tree

Heap Vulnerabilities

Heap Vulnerabilities Decision Tree

Format String

Format String Decision Tree

Techniques Reference

Techniques Reference Tree