Artwork

Content provided by Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Black Hat Briefings, USA 2007 [Video] Presentations from the security conference. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Stephan Chenette & Moti Joseph: Defeating Web Browser Heap Spray Attacks

35:27
 
Share
 

Manage episode 152211974 series 1053194
Content provided by Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Black Hat Briefings, USA 2007 [Video] Presentations from the security conference. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
In 2007 black hat Europe a talk was given titled: "Heap Feng Shui in JavaScript" That presentation introduced a new technique for precise manipulation of the browser heap layout using specific sequences of JavaScript allocations. This allowed an attacker to set up the heap in any desired state and exploit difficult heap corruption vulnerabilities with more reliability and precision. Our talk is a defensive response to this new technique. We will begin with an overview of "in the wild" heap spray exploits and how we can catch them, as well other zero day exploits using our exploit-detection module. We will give an overview of the analysis engine we have built that utilizes this module and we will demonstrate scanning and detection of a "live" website hosting a heap corruption vulnerability. The talk will focus on Internet Explorer exploitation, but the general technique presented is applicable to other browsers as well.
  continue reading

89 episodes

Artwork
iconShare
 
Manage episode 152211974 series 1053194
Content provided by Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Black Hat Briefings, USA 2007 [Video] Presentations from the security conference. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
In 2007 black hat Europe a talk was given titled: "Heap Feng Shui in JavaScript" That presentation introduced a new technique for precise manipulation of the browser heap layout using specific sequences of JavaScript allocations. This allowed an attacker to set up the heap in any desired state and exploit difficult heap corruption vulnerabilities with more reliability and precision. Our talk is a defensive response to this new technique. We will begin with an overview of "in the wild" heap spray exploits and how we can catch them, as well other zero day exploits using our exploit-detection module. We will give an overview of the analysis engine we have built that utilizes this module and we will demonstrate scanning and detection of a "live" website hosting a heap corruption vulnerability. The talk will focus on Internet Explorer exploitation, but the general technique presented is applicable to other browsers as well.
  continue reading

89 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide