While learning the fastbin dup attack, all the online resources I found made the same assumptions: GLIBC is either compiled without tcache support, or in one of the exploit steps calloc is called instead of malloc, and that made me confused. In this article I will cover how to use the fastbin dup attack with a modern GLIBC and shed some light on this exploitation technique. The original fastbin dup attack The original fastbin dup attack leverages a so-called double free.