Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Grab it
Explore effective static code analysis techniques for discovering vulnerability variants and exploitation primitives in a 39-minute Black Hat conference talk. Delve into the challenges of code pattern extraction and searching, particularly for closed-source software like Windows. Learn about workspace concepts, query modes, and the Leviathan utility for pattern search primitives. Examine real-world examples of file hijacking, reparse point, and ACL overwritten patterns, as well as RDP pool spray primitive extraction. Gain insights into constructing code queries, modeling vulnerabilities, and connecting RDP PDU to data copy operations using memcpy. Enhance your understanding of static analysis practices for improved software security.
Select Bugs From Binary Where Pattern Like CVE Days