Главная
Study mode:
on
1
Introduction
2
Agenda
3
Static Analysis
4
Blackbox Analysis
5
Advantages
6
Problems
7
Graphs
8
Statistics
9
What is RAVAGE
10
RAVAGE Design
11
Data File
12
Tracking Events
13
Splitting Objects
14
Recall Rapper
15
Rapper
16
Demo
17
Web Goat Demo
18
Implementation
19
Mobility
20
Summary
Description:
Explore cutting-edge research on vulnerability detection and exploit generation in this Black Hat conference talk. Delve into RAVAGE, a powerful tool that leverages standard program execution to detect full dataflow vulnerabilities at runtime. Learn how RAVAGE can be used both offensively and defensively, from identifying vulnerabilities and generating exploits to integrating new exploits into existing frameworks. Discover the tool's ability to uncover security vulnerabilities by running non-security-related test cases. Gain insights into RAVAGE's design, including data file handling, event tracking, and object splitting. Watch demonstrations featuring Web Goat and understand the tool's implementation and mobility. By the end of this talk, grasp the potential of RAVAGE in revolutionizing vulnerability analysis and exploit generation, with the added benefit of its open-source availability and design documentation.

Runtime Analysis of Vulnerabilities and Generation of Exploits

Black Hat
Add to list