Главная
Study mode:
on
1
Introduction
2
Who am I
3
What is Vulnerability Research
4
What is VR
5
Skills required
6
Getting started in VR
7
DBF Documentation
8
Fuzzing Template
9
Triage Mechanism
10
Zero One Zero Editor
11
Exploit Example
12
Dumb Fuzzing
13
Apache Open Office
14
Inline Validation
15
Bypassing DEP and ASR
16
Rob Chains
17
Cve202133035
18
Disclosure
19
Patch
20
Summary
21
Announcement
22
Govtech Vulnerability Rewards
23
Outro
Description:
Explore the world of vulnerability research and code execution bugs in office applications through this 24-minute conference talk by @spaceraccoon from HackerOne. Dive into the speaker's journey of discovering and exploiting zero-days, learning about fuzzing, source code review, and reverse-engineering techniques. Gain insights into getting started with software vulnerability research, focusing on parsing and processing various file formats in modern office applications. Discover simple approaches to vulnerability research, suitable for researchers curious about binary exploitation, with minimal background knowledge required. Follow along as the speaker covers topics such as DBF documentation, fuzzing templates, triage mechanisms, and exploit examples, including a case study on Apache OpenOffice vulnerabilities and the disclosure process.

All Your -Data-base Are Belong To Us

HackerOne
Add to list