Select Code Execution From Using SQLite

Select Code Execution From Using SQLite

media.ccc.de via YouTube Direct link

Intro

1 of 33

1 of 33

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Select Code Execution From Using SQLite

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda
  3. 3 Motivation
  4. 4 Prologue
  5. 5 Examining the Attack Surface
  6. 6 Data Definition Language
  7. 7 Back to Query Preparation
  8. 8 DDL Patching
  9. 9 CREATE VIEW
  10. 10 Query Hijacking Example
  11. 11 SQL Injection
  12. 12 Memory Corruptions and SQLite
  13. 13 WebSQL - Attacks
  14. 14 Full Text Search
  15. 15 Virtual Tables
  16. 16 Shadow Tables
  17. 17 RTREE Bug
  18. 18 My Exploitation Primitives Wish-list
  19. 19 QOP by Example: The Unfixed CVE-2015-7036
  20. 20 RECAP
  21. 21 Exploitation Game Plan
  22. 22 Memory Leak
  23. 23 Unpacking of 64-bit pointers
  24. 24 Pointer Arithmetics
  25. 25 Crafting Complex Objects in Memory
  26. 26 Fake Object Example
  27. 27 Heap Spray
  28. 28 My Exploitation Primitives Wish- list
  29. 29 QOP Chaining
  30. 30 Next Target: iOS Persistency
  31. 31 Malicious Contacts DB
  32. 32 Secure Boot Bypassed CVE-2019-8577
  33. 33 Takeaways

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.