YoVDO

The Info Leak Era on Software Exploitation

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Object-oriented programming Courses Software Security Courses Heap Overflows Courses Software Vulnerabilities Courses Stack Overflows Courses

Course Description

Overview

Explore advanced software exploitation techniques in this Black Hat USA 2012 conference talk. Delve into the era of information leaks and their impact on defeating Address Space Layout Randomization (ASLR). Learn why ASLR is crucial for preventing reliable exploitation and how other mitigations fall short without it. Discover various methods for converting vulnerabilities into information leaks, including partial stack overflows, heap overflows with heap massaging, and object manipulation through non-virtual calls. Examine real-world examples, such as CVE-2012-0769, and understand how to transform information leaks into Universal Cross-Site Scripting (UXSS) attacks. Gain insights into continuous distribution, element creation, and object reclamation techniques. Enhance your understanding of software security and exploitation strategies through this comprehensive presentation.

Syllabus

Introduction
Info Leaks
What is an Info Leak
Techniques
Continuous Distribution
Creating an Element
Reclaiming an Object
Converting Vulnerabilities
Stack Overflows
Partial Overflows
JavaScript String
Nonmetal Methods
This is not an info leak
CV
Bitmap
User Data
Base of dll
Final notes
Questions


Taught by

Black Hat

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Reverse Engineering Linux 32-bit Applications
PentesterAcademy
DHCP Is Hard
Hack In The Box Security Conference via YouTube
WebKit Everywhere - Secure or Not?
Black Hat via YouTube