Главная
Study mode:
on
1
Intro
2
The known potential of race conditions
3
The true potential of race conditions
4
Making race conditions reliable: Single-packet attack
5
Single-packet attack: under the hood
6
benchmark
7
Probe for clues
8
Object-masking via limit-overrun
9
Multi-endpoint collisions: handling internal latency
10
Single-endpoint collision code analysis
11
Impact
12
Partial construction attacks
13
Data-structures and race-condition defenses
14
Improving the single-packet attack
15
Embrace the chaos
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore advanced web race condition attack techniques in this DEF CON 31 conference talk that goes beyond traditional limit-overrun exploits to reveal the hidden vulnerabilities within website state machines. Learn to identify and exploit new classes of race conditions by sending conflicting inputs that can compromise high-profile websites, enabling token misrouting, trusted data forgery, and backdoor concealment. Master a refined methodology for detecting subtle vulnerability indicators and implement a strategy that achieves sub-1ms execution windows for multiple HTTP requests across global distances. Gain hands-on experience with open-source tools and free online labs while understanding crucial concepts like single-packet attacks, object-masking, multi-endpoint collisions, partial construction attacks, and data structure defenses. Discover how to analyze single-endpoint collision code, improve attack techniques, and understand the impact of these vulnerabilities on web security.

Smashing the State Machine: Advanced Web Race Condition Attacks

DEFCONConference
Add to list