Post Memory Corruption Analysis & Exploitation

In this webcast, the presenter will introduce a new exploitation methodology of invalid memory reads and writes, based on dataflow analysis after a memory corruption bug has occurred inside a running process. The presenter will expose a methodology which shall help with writing a reliable exploit out of a PoC triggering an invalid memory write, in presence of security defense mechanism such as compiler enhancements (full RELRO and SSP) or kernel anti exploitation features (ASLR and NX).

Provided by: Topic: Hardware Date Added: Mar 2012 Format: Webcast

Find By Topic