Главная
Study mode:
on
1
Introduction
2
Use of UAF
3
RealWorld Case
4
Build a Exploit
5
StepByToRage
6
Windows 10 Example
7
Conclusion
Description:
Explore a novel exploitation technique called Use-After-Use-After-Free (UAUAF) for UAF vulnerabilities in Adobe Flash in this 38-minute Black Hat conference talk. Discover how UAUAF transforms a UAF into a multi-class type confusion by leveraging a sequence of object occupations and releases. Learn about gaining full memory access despite recent mitigations added by Adobe. Examine real-world cases, build an exploit step-by-step, and see a Windows 10 example. Gain insights into the implications of this technique for cybersecurity professionals and developers working with Adobe Flash.

Use-After-Use-After-Free - Exploit UAF by Generating Your Own

Black Hat
Add to list
0:00 / 0:00