Early bird registration rate ends on the 24th of April
This 4 day course will give an in depth examination of a variety of current heap allocators in the context of exploit development, including glibc’s ptmalloc2, Chrome’s PartitionAlloc, JEMalloc, TCMalloc, and embedded allocators such as avr-libc, newlib, or dietlibc, and those used in Linux Docker images such musl and uClibc. The lectures and labs will look at numerous ways to misuse each of these allocators in the latest versions of each.
Key Learning Objectives
To be able to exploit heap corruption in C programs on Linux using the latest versions of a variety of allocators.
Demonstrate understanding of heap data structures.
Demonstrate debugging heap data structures.
Demonstrate attacks against the heap
Who Should Attend
Software Security Auditors/Analysts
Software Exploitation Developers
and anyone interested
Students taking Code Review should have an intermediate C and Python Development background. They should have hands on experience in: