Главная
Study mode:
on
1
Intro
2
What is Scratch
3
Variables
4
Robot Arms
5
Python Script
6
Block Definition
7
Demo
8
Socket functions
9
Scratch sockets
10
Exploit lab
11
Live demo
12
Stack smash
13
Reconnecting
14
Sending pattern buffer
15
Writing down location
16
Finding jump ESP instruction
17
Exploit code
18
Slides
19
Why bother
20
How long
21
Lego
22
Questions
Description:
Explore the unconventional use of Scratch programming language for network exploitation in this 52-minute conference talk from 44CON 2018. Discover how Kev Sheldrake leverages experimental HTTP extensions in Scratch v2 to implement TCP/IP functions, enabling fuzzing and exploitation of vulnerable network services. Learn about the process of creating custom blocks linked to Python functions, overcoming sandbox limitations, and developing proof-of-concept exploits for various vulnerabilities. Gain insights into the intricacies of the Scratch extension API, its limitations, and how to combine simple concepts to create functional exploits. Witness live demonstrations of exploiting stack smash and format string vulnerabilities in echo servers, and understand how this approach can make exploit development accessible to those with basic Scratch programming skills.

Exploits with Scratch

44CON Information Security Conference
Add to list