YoVDO

Leverage One-shot UAF to a Minigun

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cybersecurity Courses Exploit Development Courses

Course Description

Overview

Explore a novel exploitation technique for Use-After-Free (UAF) vulnerabilities in Adobe Flash in this 41-minute conference talk from the 44CON Information Security Conference. Delve into the Use-After-Use-After-Free (UAUAF) method, which transforms a UAF into a multi-class type confusion, enabling full memory access. Learn how this technique bypasses Adobe's mitigation efforts against common exploitation methods. Examine the detailed exploitation process of CVE-2016-1097, a real-world UAF zero-day vulnerability, from discovery to achieving arbitrary code execution. Gain insights into leveraging object occupations and releases, chaining ROP gadgets, and overcoming challenges in modern Flash exploitation.

Syllabus

Leverage One-shot UAF to a Minigun - Presented By Guanxing Wen


Taught by

44CON Information Security Conference

Related Courses

Supply Chain Unchained - How To Be A Bad SaaS
44CON Information Security Conference via YouTube
Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube