Linux Heap Exploitation live, online - expressions of interest

Wednesday, 30 June 2021, 9:00 AM - 5:00 PM [AEST]

Register Now

1. Select Seats

2. Review and Proceed


Expression of Interest PARTIAL APPROVAL - Free

Registration closes on 30/06/2021

We are currently taking expressions of interest for live, online training. The cost of the course is $6000 including GST. A registration of interest is not a commitment to buy. If you put in your details we will contact you once a course is released. Dates TBA

Enter your discount code

  • Fee
  • Total amount

Wednesday, 30 June 2021, 9:00 AM - 5:00 PM [AEST]

You will be registering your interest in a online, live offering of Linux Heap Exploitation. Dates TBA, we will notify you when the course has dates available.

This 5 day course will give an in depth examination of a variety of current heap allocators in the context of exploit development, including glibc’s ptmalloc2, Chrome’s PartitionAlloc, JEMalloc, TCMalloc, embedded allocators such as avr-libc, newlib, or dietlibc, and those used in Linux Docker images such musl and uClibc. The lectures and labs will look at numerous ways to misuse each of these allocators in the latest versions of each.

To achieve these attacks we will have detailed examinations of the main heap structures including the thread caches, freelists, bins, malloc chunks, and arenas.

These attacks will be used to gain such primitives as:

  • Having malloc return an arbitrary pointer
  • Having allocated chunks overlap each other
  • Returning the same allocated memory
  • Having calloc return uninitialised memory
  • Leaking the libc base and other sensitive information

Attacks will be constructed for a variety of heap allocators, including:

  • Freelist poisoning
  • Overlapping chunks
  • Freeing attacker controlled pointers
  • Contemporary unlink attacks
  • Double frees

Course Objectives

To learn and demonstrate attacks on current heap allocators to gain exploitation primitives.

Training Outcomes

  • Demonstrate understanding of the heap data structures
  • Demonstrate debugging heap data structures
  • Demonstrate attacks against multiple heap allocators

Who Should Attend?

  • Developers
  • IT Professionals
  • Embedded Developers
  • OS Developers
  • Penetration Testers
  • Software Security Auditers/Analysts
  • Vulnerability Researchers
  • Software Exploitation Developers
  • Anyone else interested


What to Bring

  • All materials are provided by InfoSect

What will be Provided?

  • Laptops for class use
  • Coil bound lecture materials
  • Catering provided.
  • Access to VMs with laboratories
  • InfoSect Swag

 Participant Skillset

Students taking Linux Heap Exploitation should have an intermediate C Development background. They should have hands on experience in:

  • C Coding Experience
  • Python Coding Experience
  • Linux

InfoSect’s Code Review course is a suitable prerequisite.

Class Syllabus **

Day 1

Heap Misuse

Control Flow Hijacking

Heap Data Structures


TCache Poisoning

TCache Double Free

Fast Bin Double Free

Day 2

Overlapping Chunk

Calloc I

Calloc II

House of Force

Double Free Mitigation Bypass

Day 3 

TCache House of Spirit

Fast Bin Poisoning I

Fast Bin Poisoning II

Unsorted Bin Libc Base Leak

Day 4


Freelist Poisoning

Double Frees

Overlapping Chunks


                 Overlapping Chunks 


Freelist Poisoning

Double Frees

Overlapping Chunks

Day 5




Freelist Poisoning

House of Spirit


Freelist Poisoning

House of Spirit


Freelist Poisoning


Freelist Poisoning

House of Spirit

Overlapping Chunks

** subject to changes


Dr Silvio Cesare is the Managing Director at InfoSect. He has worked in technical roles and been involved in computer security for over 20 years. This period includes time in Silicon Valley in the USA, France, and Australia. He has worked commercially in both defensive and offensive roles within engineering. He has reported hundreds of software bugs and vulnerabilities in Operating Systems kernels. He was previously the Director for Education and Training at UNSW Canberra Cyber, ensuring quality content and delivery. In his early career, he was the scanner architect and a C developer at Qualys. He is also the co-founder of BSides Canberra - Australia’s largest cyber security conference. He has a Ph.D. from Deakin University and has published within industry and academia, is a 4-time Black Hat speaker, gone through academic research commercialisation, and authored a book (Software Similarity and Classification, published by Springer).

Contact the Organizer