Linux Heap Exploitation - Part 1

Learn hands-on GLIBC heap exploitation with HeapLAB.
4.84 (810 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
Linux Heap Exploitation - Part 1
5 150
students
5 hours
content
Jul 2024
last update
$79.99
regular price

What you will learn

Scripting exploits with pwntools

Introspecting the heap with pwndbg

The House of Force technique

The Fastbin Dup technique

The Unsafe Unlink technique

The Safe Unlink technique

The House of Orange technique

Using one-gadgets to drop a shell

Leveraging a single-byte heap overflow to drop a shell

Course Gallery

Linux Heap Exploitation - Part 1 – Screenshot 1
Screenshot 1Linux Heap Exploitation - Part 1
Linux Heap Exploitation - Part 1 – Screenshot 2
Screenshot 2Linux Heap Exploitation - Part 1
Linux Heap Exploitation - Part 1 – Screenshot 3
Screenshot 3Linux Heap Exploitation - Part 1
Linux Heap Exploitation - Part 1 – Screenshot 4
Screenshot 4Linux Heap Exploitation - Part 1

Charts

Students
Price
Rating & Reviews
Enrollment Distribution

Comidoc Review

Our Verdict

Linux Heap Exploitation - Part 1 offers a hands-on deep dive into GLibC heap exploitation techniques, with clear explanations and practical challenges. Though it assumes foundational knowledge in debugging and GDB usage, this course is an excellent choice for aspiring pwners eager to build their skillset in binary exploitation while working through progressively more challenging exercises.

What We Liked

  • Comprehensive coverage of GLibC heap exploitation techniques, including House of Force, Fastbin Dup, Unsafe Unlink, Safe Unlink, and House of Orange
  • Hands-on learning with practical challenge binaries, enabling students to apply learned concepts immediately
  • Pwntools scripting and pwndbg introspection for enhanced understanding and exploitation
  • High-quality instruction with clear explanations and a well-structured curriculum

Potential Drawbacks

  • Steeper learning curve for those new to binary exploitation and debugging
  • Some users may require prerequisite knowledge in GDB or Linux binaries
  • Challenge binaries can be quite tough, requiring significant time investment to solve without hints
  • Lacks broader context such as cross-platform heap exploitation and real-world exploit examples
2982240
udemy ID
10/04/2020
course created date
20/07/2020
course indexed date
Bot
course submited by