WebKit Everywhere - Secure or Not?
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the security landscape of WebKit, a widely-used web rendering engine, in this 33-minute Black Hat conference talk. Delve into the challenges and possibilities of exploiting WebKit-based applications across various platforms, including Windows, Mac OS X, iOS, and Android. Learn about the security improvements implemented by major tech companies and how they have increased the difficulty of successful exploitations. Examine two detailed exploit demonstrations, including a remote code execution on x64 Safari and techniques applicable to mobile applications. Gain insights into advanced exploit techniques, vulnerability details, and recommendations for enhancing the security of WebKit-based applications. Understand key concepts such as memory corruption, heap arena internals, garbage collection mechanisms, ASLR on Mac OSX, sandbox architecture, and exploitation strategies.
Syllabus
Intro
Background
Historical issues
Memory Corruption
Heap Arena
RenderArena internals
RenderArena enhancement
GC mechanism
Trigger GC: Workaround
ASLR on Mac OSX
Sandbox architecture
Native 64bit App
CVE-2014-1303 : Vulnerability
Restrictive 1-bit write
Exploit : What to overwrite?
Typed Array Internals
Exploitation : Overall strategy
Exploitation : JS Controlled Free
Exploitation : ROPs are for the 99%
Summary of WebKit exploitation
Taught by
Black Hat
Related Courses
CNIT 127: Exploit DevelopmentCNIT - City College of San Francisco via Independent Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam Reverse Engineering Linux 32-bit Applications
PentesterAcademy DHCP Is Hard
Hack In The Box Security Conference via YouTube The Info Leak Era on Software Exploitation
Black Hat via YouTube