YoVDO

SLUB Internals for Exploit Developers

Offered By: Linux Foundation via YouTube

Tags

Exploit Development Courses Buffer Overflow Courses Memory Management Courses Kernel Exploitation Courses Memory Corruption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive deep into the core SLUB allocator internals and explore common slab memory shaping strategies used in Linux kernel exploits. This comprehensive talk covers essential knowledge for exploit developers targeting slab memory corruption bugs in the Linux kernel. Learn how to control memory corruption by shaping slab memory, including techniques for placing specific slab objects next to vulnerable buffers and exploiting use-after-free vulnerabilities. Understand the underlying mechanisms of the SLUB allocator and gain insights into why various slab-shaping strategies are effective in kernel exploitation. Enhance your skills in developing sophisticated Linux kernel exploits by mastering the intricacies of SLUB internals.

Syllabus

SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io


Taught by

Linux Foundation

Tags

Related Courses

Software Design Threats and Mitigations
University of Colorado System via Coursera
Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX
Unlocking Information Security
Tel Aviv University via edX
Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy