Главная
Study mode:
on
1
Introduction
2
About us
3
Agenda
4
Control Flow Guard
5
No1 Techniques
6
No1 Code
7
Demo
8
Fix
9
Summary
10
What is DataOnly Attack
11
DataOnly Attack Example
12
Writable Feature
13
Other Flag
14
ReadWrite
15
ACG
16
Demonstration
Description:
Explore the power of data-oriented attacks in this Black Hat conference talk. Delve into advanced exploitation techniques that bypass memory mitigation measures like Control Flow Integrity (CFI) and Microsoft's Control Flow Guard (CFG). Learn about data-only exploitation methods, including the use of unprotected ret instructions, and understand their potential to circumvent traditional security measures. Examine real-world examples, code demonstrations, and practical applications of these techniques. Gain insights into writable features, ACG (Arbitrary Code Guard), and other relevant flags. Discover how these attacks work, their implications for cybersecurity, and potential countermeasures to enhance system protection against sophisticated memory vulnerabilities.

The Power of Data-Oriented Attacks - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques

Black Hat
Add to list