Use-After-Use-After-Free - Exploit UAF by Generating Your Own
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a novel exploitation technique called Use-After-Use-After-Free (UAUAF) for UAF vulnerabilities in Adobe Flash in this 38-minute Black Hat conference talk. Discover how UAUAF transforms a UAF into a multi-class type confusion by leveraging a sequence of object occupations and releases. Learn about gaining full memory access despite recent mitigations added by Adobe. Examine real-world cases, build an exploit step-by-step, and see a Windows 10 example. Gain insights into the implications of this technique for cybersecurity professionals and developers working with Adobe Flash.
Syllabus
Introduction
Use of UAF
RealWorld Case
Build a Exploit
StepByToRage
Windows 10 Example
Conclusion
Taught by
Black Hat
Related Courses
Certified Ethical Hacker (CEH) - Linux Academy's Prep CourseA Cloud Guru Advanced Python Scripting for Cybersecurity
Infosec via Coursera Introduction to IT Security
Akamai via Coursera Cyber Comp 1A
Cabrillo College via California Community Colleges System Ethical Hacking
Cabrillo College via California Community Colleges System