YoVDO

Use-After-Use-After-Free - Exploit UAF by Generating Your Own

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Ethical Hacking Courses Windows 10 Courses Use-After-Free Vulnerability Courses

Course Description

Overview

Explore a novel exploitation technique called Use-After-Use-After-Free (UAUAF) for UAF vulnerabilities in Adobe Flash in this 38-minute Black Hat conference talk. Discover how UAUAF transforms a UAF into a multi-class type confusion by leveraging a sequence of object occupations and releases. Learn about gaining full memory access despite recent mitigations added by Adobe. Examine real-world cases, build an exploit step-by-step, and see a Windows 10 example. Gain insights into the implications of this technique for cybersecurity professionals and developers working with Adobe Flash.

Syllabus

Introduction
Use of UAF
RealWorld Case
Build a Exploit
StepByToRage
Windows 10 Example
Conclusion


Taught by

Black Hat

Related Courses

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
A Cloud Guru
Advanced Python Scripting for Cybersecurity
Infosec via Coursera
Introduction to IT Security
Akamai via Coursera
Cyber Comp 1A
Cabrillo College via California Community Colleges System
Ethical Hacking
Cabrillo College via California Community Colleges System