Главная
Study mode:
on
1
Introduction
2
About Us
3
What is UAF
4
Is it possible
5
Zeroday samples
6
Compatible meta tag
7
Script function
8
Problems of randomness
9
What we learn
10
IE engineers
11
Flowchart
12
First Version
13
Third Version
14
Explicit Pairing
15
Examples
16
Implicit Pairing
17
Clear Attribute
18
Pair Combination
19
Test Cases
20
Demo
21
Implementation
22
Experimentation
23
Reboot
24
Results
25
Future Work
26
Thank You
27
QA
Description:
Explore a powerful browser fuzzing strategy that uncovered over 100 Internet Explorer use-after-free vulnerabilities in this 34-minute Black Hat conference talk. Learn about the custom-built vulnerability hunting system and unique fuzzing approach that led to 19 CVEs affecting all versions of Microsoft IE. Discover the importance of effective fuzzing strategies in finding critical browser vulnerabilities, and gain insights into the methodology behind explicit and implicit pairing techniques. Examine the implementation, experimentation, and results of this innovative approach to browser security testing, and consider its implications for future vulnerability research.

The Power of Pair - One Template that Reveals 100+ UAF IE Vulnerabilities

Black Hat
Add to list