YoVDO

Use-After-Use-After-Free - Exploit UAF by Generating Your Own

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Ethical Hacking Courses Windows 10 Courses Use-After-Free Vulnerability Courses

Course Description

Overview

Explore a novel exploitation technique called Use-After-Use-After-Free (UAUAF) for UAF vulnerabilities in Adobe Flash in this 38-minute Black Hat conference talk. Discover how UAUAF transforms a UAF into a multi-class type confusion by leveraging a sequence of object occupations and releases. Learn about gaining full memory access despite recent mitigations added by Adobe. Examine real-world cases, build an exploit step-by-step, and see a Windows 10 example. Gain insights into the implications of this technique for cybersecurity professionals and developers working with Adobe Flash.

Syllabus

Introduction
Use of UAF
RealWorld Case
Build a Exploit
StepByToRage
Windows 10 Example
Conclusion


Taught by

Black Hat

Related Courses

Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Windows 10 pour l'entreprise
Microsoft Virtual Academy via OpenClassrooms
Apprendre à coder pour les vrais débutants
Microsoft Virtual Academy via OpenClassrooms
Windows 10 Features for a Mobile Workforce: Configuring Additional Resources
edX
Windows Support Essentials: Installation
Microsoft via edX