Главная
Study mode:
on
1
Introduction
2
Info Leaks
3
What is an Info Leak
4
Techniques
5
Continuous Distribution
6
Creating an Element
7
Reclaiming an Object
8
Converting Vulnerabilities
9
Stack Overflows
10
Partial Overflows
11
JavaScript String
12
Nonmetal Methods
13
This is not an info leak
14
CV
15
Bitmap
16
User Data
17
Base of dll
18
Final notes
19
Questions
Description:
Explore advanced software exploitation techniques in this Black Hat USA 2012 conference talk. Delve into the era of information leaks and their impact on defeating Address Space Layout Randomization (ASLR). Learn why ASLR is crucial for preventing reliable exploitation and how other mitigations fall short without it. Discover various methods for converting vulnerabilities into information leaks, including partial stack overflows, heap overflows with heap massaging, and object manipulation through non-virtual calls. Examine real-world examples, such as CVE-2012-0769, and understand how to transform information leaks into Universal Cross-Site Scripting (UXSS) attacks. Gain insights into continuous distribution, element creation, and object reclamation techniques. Enhance your understanding of software security and exploitation strategies through this comprehensive presentation.

The Info Leak Era on Software Exploitation

Black Hat
Add to list
0:00 / 0:00