Главная
Study mode:
on
1
Intro
2
Agenda
3
Motivation
4
Prologue
5
Examining the Attack Surface
6
Data Definition Language
7
Back to Query Preparation
8
DDL Patching
9
CREATE VIEW
10
Query Hijacking Example
11
SQL Injection
12
Memory Corruptions and SQLite
13
WebSQL - Attacks
14
Full Text Search
15
Virtual Tables
16
Shadow Tables
17
RTREE Bug
18
My Exploitation Primitives Wish-list
19
QOP by Example: The Unfixed CVE-2015-7036
20
RECAP
21
Exploitation Game Plan
22
Memory Leak
23
Unpacking of 64-bit pointers
24
Pointer Arithmetics
25
Crafting Complex Objects in Memory
26
Fake Object Example
27
Heap Spray
28
My Exploitation Primitives Wish- list
29
QOP Chaining
30
Next Target: iOS Persistency
31
Malicious Contacts DB
32
Secure Boot Bypassed CVE-2019-8577
33
Takeaways
Description:
Explore the world of SQLite exploitation in this 47-minute conference talk from the 36th Chaos Communication Congress. Delve into innovative techniques like Query Hijacking and Query Oriented Programming to achieve code execution using malicious SQLite databases. Learn how to exploit memory corruption vulnerabilities within the SQLite engine using only SQL language, without relying on external environments. Discover real-world attack scenarios, including compromising password stealer backend servers and achieving iOS persistence with elevated privileges. Gain insights into SQLite internals, novel ROP chain techniques using SQL CREATE statements, and the use of JOIN statements for Heap Spray. Understand the potential security implications of SQLite's widespread deployment and the importance of treating database queries with caution. Follow along as the speakers demonstrate their findings, discuss SQLite internals, and explore the foundations for leveraging memory corruption issues in database engines. Read more

Select Code Execution From Using SQLite

media.ccc.de
Add to list
0:00 / 0:00