Investigating Windows Graphics Vulnerabilities - A Reverse Engineering & Fuzzing Story - DefCamp - 2019
Offered By: DefCamp via YouTube
Course Description
Overview
Dive into a DefCamp 2019 conference talk that explores Windows graphics vulnerabilities through reverse engineering and fuzzing techniques. Learn about investigating the GDI component, analyzing patch differences, understanding EMF format, and triggering drawing order operations. Gain insights into effective fuzzing strategies, including WinAFL tips and corpus minimization. Follow the speaker's journey through a real-world fuzzing campaign, crash triage, and bug identification. Discover the intricacies of Windows graphics security in this 38-minute presentation from one of Central and Eastern Europe's most prominent information security conferences.
Syllabus
Intro
Background
What component to investigate: GDI
Inspect the fix: Patch Diffing
Inspect the fix: (IDA) BinDIFF plugin
Understanding EMF Format
Triggering a Drawing Order operation
Stop and think for a minute
Fuzzing Strategies
WinAFL Tips
Let's set up the fuzzing campaign
Corpus minimization
1 Day and 21 hours later ...
Crash triage: BugID
All I do is fuzz, fuzz, fuzAAAA?.%u92
Taught by
DefCamp
Related Courses
The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022DefCamp via YouTube The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube