Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Introduction to GLIBC Heap Exploitation

44CON Information Security Conference via YouTube

Overview

Dive into the world of GLIBC heap exploitation in this comprehensive 90-minute conference talk presented at 44CON Information Security Conference. Explore the intricacies of heap memory management, common vulnerabilities, and advanced exploitation techniques. Learn how to identify and exploit heap-based vulnerabilities, understand the inner workings of the GLIBC allocator, and gain practical insights into crafting sophisticated heap exploits. Discover essential tools and methodologies used by security professionals to analyze and manipulate heap structures. Whether you're a beginner or an experienced security researcher, gain valuable knowledge to enhance your understanding of memory corruption vulnerabilities and improve your ability to secure systems against heap-based attacks.

Syllabus

Introduction To GLIBC Heap Exploitation - Max Kamper

Taught by

44CON Information Security Conference

Reviews

Start your review of Introduction to GLIBC Heap Exploitation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.