Setting the foundation for an arbitrary read/write (and re-implementing addrof and fakeobj).
We go over the boxed vs. unboxed values, how to convert addresses to doubles and why our bug is a memory corruption.
We are going to try out Linus's exploit and setup a vulnerable WebKit version including debug symbols.
The start of a new series. We will try to learn some basics about Browser Exploitation.