Ret2page - The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a groundbreaking exploitation technique called "Ret2page" in this 35-minute Black Hat conference talk. Delve into the intricacies of taming both SLUB and BUDDY allocators to reduce time and memory consumption while improving physical page reuse success rates. Analyze two typical Use-After-Free vulnerabilities fixed in the previous year to evaluate Ret2page's effectiveness compared to cross-cache attack techniques. Learn how to exploit these vulnerabilities, bypass general mitigations like KASLR and PAN, and construct universal Android rooting solutions to achieve arbitrary kernel memory read/write capabilities and gain root privileges.
Syllabus
Ret2page: The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network