Главная
Study mode:
on
1
Intro
2
Background
3
Historical issues
4
Memory Corruption
5
Heap Arena
6
RenderArena internals
7
RenderArena enhancement
8
GC mechanism
9
Trigger GC: Workaround
10
ASLR on Mac OSX
11
Sandbox architecture
12
Native 64bit App
13
CVE-2014-1303 : Vulnerability
14
Restrictive 1-bit write
15
Exploit : What to overwrite?
16
Typed Array Internals
17
Exploitation : Overall strategy
18
Exploitation : JS Controlled Free
19
Exploitation : ROPs are for the 99%
20
Summary of WebKit exploitation
Description:
Explore the security landscape of WebKit, a widely-used web rendering engine, in this 33-minute Black Hat conference talk. Delve into the challenges and possibilities of exploiting WebKit-based applications across various platforms, including Windows, Mac OS X, iOS, and Android. Learn about the security improvements implemented by major tech companies and how they have increased the difficulty of successful exploitations. Examine two detailed exploit demonstrations, including a remote code execution on x64 Safari and techniques applicable to mobile applications. Gain insights into advanced exploit techniques, vulnerability details, and recommendations for enhancing the security of WebKit-based applications. Understand key concepts such as memory corruption, heap arena internals, garbage collection mechanisms, ASLR on Mac OSX, sandbox architecture, and exploitation strategies.

WebKit Everywhere - Secure or Not?

Black Hat
Add to list
0:00 / 0:00