Exposing Hidden Exploitable Behaviors Using EDF

Exposing Hidden Exploitable Behaviors Using EDF

Hack In The Box Security Conference via YouTube Direct link

SPEAKER BIO

1 of 23

1 of 23

SPEAKER BIO

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Exposing Hidden Exploitable Behaviors Using EDF

Automatically move to the next video in the Classroom when playback concludes

  1. 1 SPEAKER BIO
  2. 2 1.3. How: Fuzzing Process
  3. 3 1.3. How: The Input
  4. 4 1.3. How: The Software
  5. 5 1.4. Why? To automatize the output analysis
  6. 6 Common Fuzzing: Crashes
  7. 7 2. Crashes: XDIFF Output - Valgrind
  8. 8 2. Crashes: XDIFF Output - Return Codes
  9. 9 2. Crashes: XDIFF Output - Hangs
  10. 10 What is Differential Fuzzing?
  11. 11 What to Execute
  12. 12 3.1. Different Implementations: Stdout
  13. 13 3.2. Different Inputs: Stdout
  14. 14 3.3. Different Versions: Stdout
  15. 15 What to Detect
  16. 16 4.1. Path Disclosure: XDIFF Output
  17. 17 4.1. Path Disclosure: Powershell (cont'd)
  18. 18 4.3. Error Disclosure: XDiFF Output
  19. 19 4.4. Code Evaluated: XDIFF Output
  20. 20 4.5. Command Execution: XDIFF Output
  21. 21 4.6. Network Connection: XDiFF Output
  22. 22 4.6. Network Connection: JRuby RCE
  23. 23 4.7. File Read: Leak Root's Password

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.