Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into the world of GLIBC heap exploitation in this comprehensive 90-minute conference talk presented at 44CON Information Security Conference. Explore the intricacies of heap memory management, common vulnerabilities, and advanced exploitation techniques. Learn how to identify and exploit heap-based vulnerabilities, understand the inner workings of the GLIBC allocator, and gain practical insights into crafting sophisticated heap exploits. Discover essential tools and methodologies used by security professionals to analyze and manipulate heap structures. Whether you're a beginner or an experienced security researcher, gain valuable knowledge to enhance your understanding of memory corruption vulnerabilities and improve your ability to secure systems against heap-based attacks.
Syllabus
Introduction To GLIBC Heap Exploitation - Max Kamper
Taught by
44CON Information Security Conference