Completed
My Exploitation Primitives Wish-list
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Select Code Execution From Using SQLite
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Agenda
- 3 Motivation
- 4 Prologue
- 5 Examining the Attack Surface
- 6 Data Definition Language
- 7 Back to Query Preparation
- 8 DDL Patching
- 9 CREATE VIEW
- 10 Query Hijacking Example
- 11 SQL Injection
- 12 Memory Corruptions and SQLite
- 13 WebSQL - Attacks
- 14 Full Text Search
- 15 Virtual Tables
- 16 Shadow Tables
- 17 RTREE Bug
- 18 My Exploitation Primitives Wish-list
- 19 QOP by Example: The Unfixed CVE-2015-7036
- 20 RECAP
- 21 Exploitation Game Plan
- 22 Memory Leak
- 23 Unpacking of 64-bit pointers
- 24 Pointer Arithmetics
- 25 Crafting Complex Objects in Memory
- 26 Fake Object Example
- 27 Heap Spray
- 28 My Exploitation Primitives Wish- list
- 29 QOP Chaining
- 30 Next Target: iOS Persistency
- 31 Malicious Contacts DB
- 32 Secure Boot Bypassed CVE-2019-8577
- 33 Takeaways