SLUB Internals for Exploit Developers
Offered By: Linux Foundation via YouTube
Course Description
Overview
Dive deep into the core SLUB allocator internals and explore common slab memory shaping strategies used in Linux kernel exploits. This comprehensive talk covers essential knowledge for exploit developers targeting slab memory corruption bugs in the Linux kernel. Learn how to control memory corruption by shaping slab memory, including techniques for placing specific slab objects next to vulnerable buffers and exploiting use-after-free vulnerabilities. Understand the underlying mechanisms of the SLUB allocator and gain insights into why various slab-shaping strategies are effective in kernel exploitation. Enhance your skills in developing sophisticated Linux kernel exploits by mastering the intricacies of SLUB internals.
Syllabus
SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io
Taught by
Linux Foundation
Tags
Related Courses
Software Design Threats and MitigationsUniversity of Colorado System via Coursera Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX Unlocking Information Security
Tel Aviv University via edX Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy