returntolibc
returntolibc is a technique used in exploit development that allows an attacker to execute arbitrary code by manipulating the control flow of a program to return to a pre-existing function within the standard C library. Instead of injecting shellcode directly into memory, the attacker redirects the program's execution pointer to a useful library function, such as `system()`, `execve()`, or `dup2()`. These functions can then be leveraged to perform malicious actions, like opening a shell or redirecting input/output streams.
The core idea behind returntolibc relies on the fact that many common functions are available in shared
This technique is significant because it bypasses some security measures that aim to prevent the execution