Главная
Study mode:
on
1
Intro
2
Tencent Blade Team
3
Agenda
4
The Magellan 2.0
5
Vulnerabilities or Bugs Found by the Fuzzer
6
Auditing Strategies: Blobs
7
Auditing Strategies: The memory operations
8
Auditing Strategies: Special Commands
9
Shadow Tables
10
Structure-Aware Fuzzing
11
How the Fuzzer is Implemented
12
Differences from Google's (1)
13
Raw Data
14
Generated Testcase
15
Preparations
16
Initial Queries of the Fuzzer
17
The Structure opdata_16
18
Example of Translating Opcode to Query
19
Table Selector and Column Selector
20
SQL Operation Selector
21
Get Data from Data Provider
22
Run Generated SQL Queries
23
Bypass the Defense-In-Depth
24
It's a Little Bit' Tough
25
Let's Make Some Fake Objects
26
Stabilize the Heap and the RCE
27
Get Uninitialized Heap Data
28
Overwrite the sqlite3Config
29
Set the Memory Page to RWX
30
Restore the Stack
31
Conclusion
Description:
Explore the intricacies of SQLite vulnerabilities and exploitation techniques in this comprehensive conference talk from the Hack In The Box Security Conference. Delve into the discovery of the Magellan vulnerabilities and their impact on Google Home and Chrome. Learn about new protective measures implemented in SQLite and WebSQL. Examine seven newly discovered vulnerabilities and three bugs that can be chained together to bypass Defense-In-Depth and cause Remote Code Execution in Chrome through WebSQL. Gain insights into manual auditing techniques and the development of an effective fuzzer, sqlite3_shadow_table_fuzzer, now running on Google's ClusterFuzz. Understand the weaknesses in existing fuzzers and strategies for optimizing vulnerability discovery. Follow along as the speaker demonstrates auditing strategies for blobs, memory operations, and special commands. Discover the power of shadow tables and structure-aware fuzzing in identifying security flaws. Learn how to bypass Defense-In-Depth measures and create fake objects to stabilize the heap for successful exploitation. Conclude with valuable insights on improving security research efficiency and effectiveness in SQLite and related technologies. Read more

Exploring and Exploiting the SQLite

Hack In The Box Security Conference
Add to list
0:00 / 0:00