THIS CLASS IS NOW BEING HELD ONLINE FOLLOWING SINGAPORE TIMEZONE (CET +6)
DURATION: 4 DAYS
CAPACITY: 15 pax
SEATS AVAILABLE: REGISTRATION CLOSED
USD3499
Overview
This 4 day course will give an in depth examination of a variety of current heap allocators in the context of exploit development, including glibc’s ptmalloc2, Chrome’s PartitionAlloc, JEMalloc, TCMalloc, and embedded allocators such as avr-libc, newlib, or dietlibc, and those used in Linux Docker images such musl and uClibc. The lectures and labs will look at numerous ways to misuse each of these allocators in the latest versions of each.
Key Learning Objectives
To be able to exploit heap corruption in C programs on Linux using the latest versions of a variety of allocators.
Demonstrate understanding of heap data structures.
Demonstrate debugging heap data structures.
Demonstrate attacks against the heap
Who Should Attend
Developers
IT Professional
Embedded Developers
OS Developers
Penetration Testers
Software Security Auditors/Analysts
Vulnerability Researchers
Software Exploitation Developers
and anyone interested
Prerequisite Knowledge
Students taking Code Review should have an intermediate C and Python Development background. They should have hands on experience in: