Post Memory Corruption Analysis & Exploitation

Provided by: SecurityTube.net Topic: Hardware Format: Webcast
In this webcast, the presenter will introduce a new exploitation methodology of invalid memory reads and writes, based on dataflow analysis after a memory corruption bug has occurred inside a running process. The presenter will expose a methodology which shall help with writing a reliable exploit out of a PoC triggering an invalid memory write, in presence of security defense mechanism such as compiler enhancements (full RELRO and SSP) or kernel anti exploitation features (ASLR and NX).

Find By Topic