Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Use-After-Free Vulnerability
Showing:
12
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
OWASP Foundation
Use After Free Exploitation - Detecting and Exploiting Heap Vulnerabilities
0
rewiews
Explore Use After Free vulnerabilities, their detection, and exploitation in web browsers. Learn about memory leaks and ASLR bypass techniques from an industry expert.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
OWASP Foundation
AppSecUSA 2014 - Breakers Track Sessions
0
rewiews
Explore cutting-edge web and mobile security topics, including mobile attacks, use-after-free exploitation, static analysis, runtime manipulation, and top hacking techniques from AppSecUSA 2014.
Add to list
5
Lesons
6 hours 12 minutes
On-Demand
Free-Video
Linux Foundation
Mitigating Use-after-frees in the Linux Kernel
0
rewiews
Explore techniques for mitigating use-after-free vulnerabilities in the Linux kernel, covering performance trade-offs, pointer checks, and RCU implementation strategies.
Add to list
18
Lesons
46 minutes
On-Demand
Free-Video
Black Hat
Ret2page - The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache
0
rewiews
Explore a new exploitation technique for Use-After-Free vulnerabilities, focusing on SLUB and BUDDY allocators to improve efficiency and success rates in physical page reuse and Android rooting.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Black Hat
Attacking iPhone XS Max
0
rewiews
Explore iPhone XS Max vulnerabilities, including PAC implementation, XNU bug exploitation, and kernel read/write access. Learn about Unix Domain Socket, race conditions, and unprotected control flow transfer points.
Add to list
16
Lesons
35 minutes
On-Demand
Free-Video
Black Hat
Use-After-Use-After-Free - Exploit UAF by Generating Your Own
0
rewiews
Explore a novel exploitation technique for UAF vulnerabilities in Adobe Flash, transforming them into multi-class type confusions for full memory access despite recent mitigations.
Add to list
7
Lesons
38 minutes
On-Demand
Free-Video
Black Hat
The Art of Exploiting UAF by Ret2bpf in Android Kernel
0
rewiews
Explore Android kernel exploitation techniques, focusing on a Use-After-Free vulnerability in xt_qtaguid. Learn about KASLR bypass, rooting methods, and security measures against such attacks.
Add to list
21
Lesons
32 minutes
On-Demand
Free-Video
Black Hat
The Power of Pair - One Template that Reveals 100+ UAF IE Vulnerabilities
0
rewiews
Discover a unique fuzzing strategy that revealed over 100 IE use-after-free vulnerabilities. Learn about the vulnerability hunting system and techniques used to find critical browser security flaws.
Add to list
27
Lesons
34 minutes
On-Demand
Free-Video
Black Hat
Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorer
0
rewiews
Explore Internet Explorer's silent exploit mitigations, their weaknesses, and potential attack vectors. Learn techniques to bypass these security measures and gain insights into hardening browser defenses.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Exploiting a Limited UAF on Ubuntu 22.04 to Achieve LPE
0
rewiews
Detailed exploration of exploiting a Linux kernel vulnerability in Ubuntu 22.04 to achieve local privilege escalation, focusing on advanced exploitation techniques and bypass methods.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Exploiting UAF by Ret2bpf in Android Kernel
0
rewiews
Exploiting a 10-year-old Use-After-Free vulnerability in Android's xt_qtaguid kernel module, demonstrating local privilege escalation on Mi9 device using ret2bpf technique to bypass protections.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Black Hat
Breaking Android Kernel Isolation and Rooting with ARM MMU Features
0
rewiews
Explore a new Android rooting solution, ReVent, exploiting a Use-After-Free vulnerability in 3.18 Linux kernels. Learn about breaking kernel isolation and ARM MMU features for device security.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
load more...