Главная
Study mode:
on
1
Intro
2
Background for Static Code Analysis
3
Challenges for Static Code Analysis
4
What is Workspace, Exactly?
5
Workflow - Run Query
6
Query Mode Limitation
7
Example SQL Query Running Script Mode
8
Leviathan Utility & Pattern Search Primitives
9
File Hijacking Pattern: Seed Vulnerabilities
10
File Hijacking Pattern: Vulnerability Modeling
11
File Hijacking Pattern Extraction
12
Reparse Point Pattern: Seed Vulnerability
13
Reparse Point Pattern: Vulnerability Modeling
14
Reparse Point Pattern: Code Query Construction
15
ACL Overwritten Pattern: Seed Vulnerability
16
RDP Pool Spray Primitive Pattern Extraction
17
Pool Spray Pattern: Find Data Copy With Memcpy
18
Connect RDP PDU To Data Copy With Memcpy
19
Summary
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore effective static code analysis techniques for discovering vulnerability variants and exploitation primitives in a 39-minute Black Hat conference talk. Delve into the challenges of code pattern extraction and searching, particularly for closed-source software like Windows. Learn about workspace concepts, query modes, and the Leviathan utility for pattern search primitives. Examine real-world examples of file hijacking, reparse point, and ACL overwritten patterns, as well as RDP pool spray primitive extraction. Gain insights into constructing code queries, modeling vulnerabilities, and connecting RDP PDU to data copy operations using memcpy. Enhance your understanding of static analysis practices for improved software security.

Select Bugs From Binary Where Pattern Like CVE Days

Black Hat
Add to list
0:00 / 0:00