Linux Heap Exploitation - Part 1
Free Coupon Discount - Learn hands-on GLIBC heap exploitation with HeapLAB.
Bestseller
Created by Max Kamper
English
Students also bought
Ethical Hacking & Bug Hunting: Buffer Overflow For Beginners
Virtual Private Networks - Zero to Hero (VPN)
WordPress Hacking & Hardening in Simple Steps [2020 Edition]
Computer Security: A Hands-on Approach
Internet Security: A Hands-on Approach
Implementing a Cisco ASA Firewall 9.X - All - in - One
Preview this Udemy Course GET COUPON CODE
Description
For nearly 20 years, exploiting memory allocators has been something of an art form. Become part of that legacy with HeapLAB.
The GNU C Library (GLIBC) is a fundamental part of most Linux desktop and many embedded distributions; its memory allocator is used in everything from starting threads to dealing with I/O. Learn how to leverage this vast attack surface via different heap exploitation techniques, from the original "Unsafe Unlink" to the beautiful overflow-to-shell "House of Orange".
In this hands-on course, students will alternate between learning new techniques and developing their own exploits based on what they've learned. We'll make use of the pwntools and pwndbg frameworks to drop shells from vulnerable practice binaries, and you'll take on challenges that test what you've learned.
Who this course is for:
Exploit developers
Capture The Flag (CTF) players
Those wishing to learn more about exploit dev than just stack buffer overflows
Anyone interested in weird machines
100% Off Udemy Coupon . Free Udemy Courses . Online Classes
Bestseller
Created by Max Kamper
English
Students also bought
Ethical Hacking & Bug Hunting: Buffer Overflow For Beginners
Virtual Private Networks - Zero to Hero (VPN)
WordPress Hacking & Hardening in Simple Steps [2020 Edition]
Computer Security: A Hands-on Approach
Internet Security: A Hands-on Approach
Implementing a Cisco ASA Firewall 9.X - All - in - One
Preview this Udemy Course GET COUPON CODE
Description
For nearly 20 years, exploiting memory allocators has been something of an art form. Become part of that legacy with HeapLAB.
The GNU C Library (GLIBC) is a fundamental part of most Linux desktop and many embedded distributions; its memory allocator is used in everything from starting threads to dealing with I/O. Learn how to leverage this vast attack surface via different heap exploitation techniques, from the original "Unsafe Unlink" to the beautiful overflow-to-shell "House of Orange".
In this hands-on course, students will alternate between learning new techniques and developing their own exploits based on what they've learned. We'll make use of the pwntools and pwndbg frameworks to drop shells from vulnerable practice binaries, and you'll take on challenges that test what you've learned.
Who this course is for:
Exploit developers
Capture The Flag (CTF) players
Those wishing to learn more about exploit dev than just stack buffer overflows
Anyone interested in weird machines
100% Off Udemy Coupon . Free Udemy Courses . Online Classes
Post a Comment for "Linux Heap Exploitation - Part 1"