Главная
Study mode:
on
1
Introduction
2
Who are you
3
Ideal Reader
4
Architecture
5
The IE Rush
6
JavaScript Attack Surface
7
JavaScript Engine
8
privileged and unprivileged contexts
9
trusted functions
10
folderlevel scripts
11
bin file
12
decompile tool
13
attacking the engine
14
why bypass restrictions
15
discovery
16
root level eval
17
trusted function
18
fix
19
identity
20
global
21
xqdialogue
22
Adobe patch
23
JJS API bypasses
24
Defending the engine
25
History of JavaScript
26
Design Decisions
27
Key Features
28
Reference Monitor
29
Implementation Problem
30
Implementation Example
31
Static Analysis
32
Point Analysis
33
Security Information Flow
34
Soundness is not necessary
35
Soundness is not binary
36
Conclusion
Description:
Explore a comprehensive conference talk from Black Hat that delves into privilege escalation vulnerabilities and defense strategies in JavaScript engines. Learn about surprising discoveries made by Zero Day Initiative program researchers, which were instrumental in verifying application hardening processes. Gain insights into the elimination of vulnerabilities within a security model implemented in a JavaScript engine through a multi-pronged approach. Examine the architecture, attack surfaces, and bypass techniques used in JavaScript engines, including privileged contexts, trusted functions, and folder-level scripts. Understand the history of JavaScript, key design decisions, and implementation challenges. Discover how static analysis, point analysis, and security information flow contribute to defending against privilege escalation attacks. Benefit from the expertise of Abdul-Aziz Hariri and Edgar Pek as they share their findings and strategies for tackling this critical security issue. Read more

Tackling Privilege Escalation with Offense and Defense

Black Hat
Add to list
0:00 / 0:00