Completed
File Operations Timeline
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
From Logic to Memory - Winning the Solitaire in Reparse Points
Automatically move to the next video in the Classroom when playback concludes
- 1 black hat EUROPE 2021
- 2 Reparse Points
- 3 File Redirection Attacks
- 4 File Redirection Mitigations #3
- 5 Make the exploitation harder
- 6 The unique vulnerability discovery strategy
- 7 Reset Solitaire
- 8 Root cause: vulnerable code
- 9 Challenges
- 10 Re-visit the vulnerability
- 11 File Operations Timeline
- 12 Race Window #0
- 13 Success rate expectation
- 14 Stability, stability, stability!
- 15 Reparse Data Structure
- 16 Reparse Point Tag
- 17 The memory corruption vulnerability model
- 18 Find the target - dynamic
- 19 Memory corruption vulnerability examples
- 20 Desktop bridge activation
- 21 Create the client
- 22 Read reparse point in Appinfo service
- 23 Set reparse point for OOB read
- 24 Out of bounds read crash
- 25 Race condition
- 26 MSRC response and timeline
- 27 The new attack surface impact
- 28 Future bug hunting insights
- 29 Summary