YoVDO

Ret2page - The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Ethical Hacking Courses Use-After-Free Vulnerability Courses

Course Description

Overview

Explore a groundbreaking exploitation technique called "Ret2page" in this 35-minute Black Hat conference talk. Delve into the intricacies of taming both SLUB and BUDDY allocators to reduce time and memory consumption while improving physical page reuse success rates. Analyze two typical Use-After-Free vulnerabilities fixed in the previous year to evaluate Ret2page's effectiveness compared to cross-cache attack techniques. Learn how to exploit these vulnerabilities, bypass general mitigations like KASLR and PAN, and construct universal Android rooting solutions to achieve arbitrary kernel memory read/write capabilities and gain root privileges.

Syllabus

Ret2page: The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache


Taught by

Black Hat

Related Courses

The Art of Exploiting UAF by Ret2bpf in Android Kernel
Black Hat via YouTube
Attacking iPhone XS Max
Black Hat via YouTube
Use-After-Use-After-Free - Exploit UAF by Generating Your Own
Black Hat via YouTube
Breaking Android Kernel Isolation and Rooting with ARM MMU Features
Black Hat via YouTube
Exploiting a Limited UAF on Ubuntu 22.04 to Achieve LPE
Hack In The Box Security Conference via YouTube