Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Exploit Development Is Dead, Long Live Exploit Development!

Автор: BSidesKC

Загружено: 2021-11-03

Просмотров: 9785

Описание:

It is no secret that the days of jmp esp are far gone. In the age of Virtualization-Based Security and Hypervisor Protected Code Integrity -- code execution, as a result of a memory corruption vulnerability, is not as trivial as it once was. However, a few times a year, there is always that vulnerability which makes headlines, is remotely exploitable, and obtains code execution in ring 0. What gives? This talk addresses the history of binary exploitation and the mitigations operating systems instrument to thwart those vulnerabilities, how adversaries constantly adopt novel and creative solutions to bypass said mitigations, and the future of exploit development in both user mode and kernel mode.
Connor McGarr
(Red Team Consultant at CrowdStrike)

Connor is a red team consultant for CrowdStrike. If you can manage to pull him away from WinDbg and IDA, you can find him writing blogs and enjoying time with his family and dog. Connor is passionate about anything related to Windows internals, vulnerability research, C, or offensive tradecraft.

Exploit Development Is Dead, Long Live Exploit Development!

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

Exploit Development for Dummies

Exploit Development for Dummies

Where to start with exploit development

Where to start with exploit development

The Cuckoo's Egg - 30 years later we are still stuck in Groundhog's Day

The Cuckoo's Egg - 30 years later we are still stuck in Groundhog's Day

Buffer Overflow 101

Buffer Overflow 101

DEF CON 33 - Red Russians: How Russian APT groups follow offensive security research - Will Thomas

DEF CON 33 - Red Russians: How Russian APT groups follow offensive security research - Will Thomas

researchers find an unfixable bug in EVERY ARM cpu

researchers find an unfixable bug in EVERY ARM cpu

Binary Exploitation Deep Dive: Return to LIBC (with Matt)

Binary Exploitation Deep Dive: Return to LIBC (with Matt)

Heap Exploitation

Heap Exploitation

Vulnerability research as a lifestyle - Faraz

Vulnerability research as a lifestyle - Faraz

Learn Assembly for Game Hacking in 2025

Learn Assembly for Game Hacking in 2025

Future of Exploit Development Follow-up (Episode 250)

Future of Exploit Development Follow-up (Episode 250)

HEXACON2023 - A 3-Year Tale of Hacking a Pwn2Own Target by Orange Tsai

HEXACON2023 - A 3-Year Tale of Hacking a Pwn2Own Target by Orange Tsai

Modern attacks on Google Chrome

Modern attacks on Google Chrome

Введение в методы хакеров при переполнении буфера

Введение в методы хакеров при переполнении буфера

Учебное пособие по эксплуатации возвратно-ориентированного программирования (ROP) — двоичная эксп...

Учебное пособие по эксплуатации возвратно-ориентированного программирования (ROP) — двоичная эксп...

A Look at Modern Windows Kernel Exploitation

A Look at Modern Windows Kernel Exploitation

ROP is DEAD! Kernel Driver Binary Exploitation

ROP is DEAD! Kernel Driver Binary Exploitation

DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

35C3 -  The Layman's Guide to Zero-Day Engineering

35C3 - The Layman's Guide to Zero-Day Engineering

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]