Investigating Windows Graphics Vulnerabilities - A Reverse Engineering & Fuzzing Story - DefCamp - 2019
Offered By: DefCamp via YouTube
Course Description
Overview
Dive into a DefCamp 2019 conference talk that explores Windows graphics vulnerabilities through reverse engineering and fuzzing techniques. Learn about investigating the GDI component, analyzing patch differences, understanding EMF format, and triggering drawing order operations. Gain insights into effective fuzzing strategies, including WinAFL tips and corpus minimization. Follow the speaker's journey through a real-world fuzzing campaign, crash triage, and bug identification. Discover the intricacies of Windows graphics security in this 38-minute presentation from one of Central and Eastern Europe's most prominent information security conferences.
Syllabus
Intro
Background
What component to investigate: GDI
Inspect the fix: Patch Diffing
Inspect the fix: (IDA) BinDIFF plugin
Understanding EMF Format
Triggering a Drawing Order operation
Stop and think for a minute
Fuzzing Strategies
WinAFL Tips
Let's set up the fuzzing campaign
Corpus minimization
1 Day and 21 hours later ...
Crash triage: BugID
All I do is fuzz, fuzz, fuzAAAA?.%u92
Taught by
DefCamp
Related Courses
Advanced White Hat Hacking & Penetration Testing TutorialUdemy Practical Buffer Overflows for OSCP
Udemy Buffer Overflows Made Easy
Cyber Mentor via YouTube Burp Suite
David Bombal via YouTube Buffer Overflows Made Easy - 2022 Edition
Cyber Mentor via YouTube