[Update Links] Linux Heap Exploitation – Part 1 | Udemy


Linux Heap Exploitation – Part 1 | Udemy
English | Size: 1.83 GB
Genre: eLearning

What you’ll learn
Scripting exploits with pwntools
Introspecting the heap with pwndbg
The House of Force technique
The Fastbin Dup technique
The Unsafe Unlink technique
The Safe Unlink technique
The House of Orange technique
Using one-gadgets to drop a shell
Leveraging a single-byte heap overflow to drop a shell

For nearly 20 years, exploiting memory allocators has been something of an art form. Become part of that legacy with HeapLAB.

The GNU C Library (GLIBC) is a fundamental part of most Linux desktop and many embedded distributions; its memory allocator is used in everything from starting threads to dealing with I/O. Learn how to leverage this vast attack surface via different heap exploitation techniques, from the original “Unsafe Unlink” to the beautiful overflow-to-shell “House of Orange”.

In this hands-on course, students will alternate between learning new techniques and developing their own exploits based on what they’ve learned. We’ll make use of the pwntools and pwndbg frameworks to drop shells from vulnerable practice binaries, and you’ll take on challenges that test what you’ve learned.

Who this course is for:
Exploit developers
Capture The Flag (CTF) players
Those wishing to learn more about exploit dev than just stack buffer overflows
Anyone interested in weird machines


Password Unlock tut4dl

Protected Area

This content is password-protected. Please verify with a password to unlock the content.


If any links die or problem unrar, send request to
goo.gl/t4uR9G

About WoW Team

I'm WoW Team , I love to share all the video tutorials. If you have a video tutorial, please send me, I'll post on my website. Because knowledge is not limited to, irrespective of qualifications, people join hands to help me.

Speak Your Mind

This site uses Akismet to reduce spam. Learn how your comment data is processed.