YoVDO

Runtime Analysis of Vulnerabilities and Generation of Exploits

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Browser Security Courses Static Analysis Courses

Course Description

Overview

Explore cutting-edge research on vulnerability detection and exploit generation in this Black Hat conference talk. Delve into RAVAGE, a powerful tool that leverages standard program execution to detect full dataflow vulnerabilities at runtime. Learn how RAVAGE can be used both offensively and defensively, from identifying vulnerabilities and generating exploits to integrating new exploits into existing frameworks. Discover the tool's ability to uncover security vulnerabilities by running non-security-related test cases. Gain insights into RAVAGE's design, including data file handling, event tracking, and object splitting. Watch demonstrations featuring Web Goat and understand the tool's implementation and mobility. By the end of this talk, grasp the potential of RAVAGE in revolutionizing vulnerability analysis and exploit generation, with the added benefit of its open-source availability and design documentation.

Syllabus

Introduction
Agenda
Static Analysis
Blackbox Analysis
Advantages
Problems
Graphs
Statistics
What is RAVAGE
RAVAGE Design
Data File
Tracking Events
Splitting Objects
Recall Rapper
Rapper
Demo
Web Goat Demo
Implementation
Mobility
Summary


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube