ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Black Hat USA 2013 - Hacking like in the Movies: Visualizing Page Tables for Local Exploitation

Usa

Black Hat

Blackhat

InfoSec

Hat

Black Hat Briefings

Black

BlackHat

2013

Briefings

Information Security

Автор: Black Hat

Загружено: 2013-12-03

Просмотров: 3283

Описание: By: Georg Wicherski, Alexandru Radocea & Alex Ionescu

A shiny and sparkling way to break user-space ASLR, kernel ASLR and even find driver bugs! Understanding how a specific Operating System organizes its Page Tables allow you to find your own ASLR bypasses and even driver vulnerabilities. We will drop one 0day Android ASLR bypass as an example; you can then break all your other expensive toys yourself. Page Tables are the data structures that map between the virtual address space your programs see to the actual physical addresses identifying locations on your physical RAM chips. We will visualize these data structures for:

Windows 8 on x86_64
Windows 8 RT on ARMv7
Linux 3.8 on x86_64
Linux 3.4 on ARMv7 alias Android 4.2
XNU on x86_64 alias OS X
XNU on ARMv7 alias iOS

Besides showing pretty pictures, we will actually explain what they show and how to interpret commonalities and differences across the same kernel on different architectures.

By comparing the page table state on the same architecture across different runs, we will identify static physical mappings created by drivers, which can be useful for DMA attacks (think FireWire or Thunderbolt forensics). Static virtual mappings are even more interesting and can be used for (K)ASLR bypasses.

To make a final point, that this is not only nice to look at, we will show how we found a mitigated Android 4.0.x generic user-space ASLR bypass. For those interested in actually owning targets, we will show an Android 4.2.2 generic user-space ASLR bypass that also affects other latest Linux/ARM kernels.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Black Hat USA 2013 - Hacking like in the Movies: Visualizing Page Tables for Local Exploitation

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Black Hat USA 2013 - A Practical Attack against MDM Solutions

Black Hat USA 2013 - A Practical Attack against MDM Solutions

Black Hat USA 2025 | Uncovering Threats and Exposing Vulnerabilities in Next-Gen Cellular RAN

Black Hat USA 2025 | Uncovering Threats and Exposing Vulnerabilities in Next-Gen Cellular RAN

Black Hat USA 2025 | Training Specialist Models: Automating Malware Development

Black Hat USA 2025 | Training Specialist Models: Automating Malware Development

Black Hat USA 2025 | Watching the Watchers: Exploring and Testing Defenses of Anti-Cheat Systems

Black Hat USA 2025 | Watching the Watchers: Exploring and Testing Defenses of Anti-Cheat Systems

Black Hat USA | LLMs-Driven Automated YARA Rules Generation with Explainable File Features & DNAHash

Black Hat USA | LLMs-Driven Automated YARA Rules Generation with Explainable File Features & DNAHash

Я создал целую команду ИИ-маркетологов с помощью кода Клода за 16 минут.

Я создал целую команду ИИ-маркетологов с помощью кода Клода за 16 минут.

Black Hat USA 2025 | Turning Camera Surveillance on its Axis

Black Hat USA 2025 | Turning Camera Surveillance on its Axis

Black Hat USA 2025 | Reinventing Agentic AI Security With Architectural Controls

Black Hat USA 2025 | Reinventing Agentic AI Security With Architectural Controls

SpaceX Unveils Insane New Product

SpaceX Unveils Insane New Product

Apple Just Broke CloudAI with M5 Ultra

Apple Just Broke CloudAI with M5 Ultra

Майнеры бросают биткоин ради ИИ. И вот чем это закончится

Майнеры бросают биткоин ради ИИ. И вот чем это закончится

Introduction to Threat Hunting Using Garuda Framework - Hunting Living off the land attack (LoLbin)

Introduction to Threat Hunting Using Garuda Framework - Hunting Living off the land attack (LoLbin)

Black Hat USA 2025 | Conjuring Hardware Failures to Breach CPU Privilege Boundaries

Black Hat USA 2025 | Conjuring Hardware Failures to Breach CPU Privilege Boundaries

Black Hat USA 2013 - A Tribute to Barnaby Jack

Black Hat USA 2013 - A Tribute to Barnaby Jack

Google Just Achieved Mathematical AGI

Google Just Achieved Mathematical AGI

Black Hat USA 2013 - The Web IS Vulnerable: XSS Defense on the BattleFront

Black Hat USA 2013 - The Web IS Vulnerable: XSS Defense on the BattleFront

Ex-Google PM Builds God's Eye to Monitor Iran in 4D

Ex-Google PM Builds God's Eye to Monitor Iran in 4D

Black Hat USA 2025 | Wormable Zero-Click RCE in AirPlay Impacts Billions of Apple and IoT Devices

Black Hat USA 2025 | Wormable Zero-Click RCE in AirPlay Impacts Billions of Apple and IoT Devices

Choose Your Own Investigation: A Live Walkthrough of Modern Browser Threats

Choose Your Own Investigation: A Live Walkthrough of Modern Browser Threats

Perplexity Computer — первый ИИ, который действительно ощущается как сотрудник.

Perplexity Computer — первый ИИ, который действительно ощущается как сотрудник.

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]