Select Bugs From Binary Where Pattern Like CVE Days

Select Bugs From Binary Where Pattern Like CVE Days

Black Hat via YouTube Direct link

Workflow - Run Query

5 of 19

5 of 19

Workflow - Run Query

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Select Bugs From Binary Where Pattern Like CVE Days

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Background for Static Code Analysis
  3. 3 Challenges for Static Code Analysis
  4. 4 What is Workspace, Exactly?
  5. 5 Workflow - Run Query
  6. 6 Query Mode Limitation
  7. 7 Example SQL Query Running Script Mode
  8. 8 Leviathan Utility & Pattern Search Primitives
  9. 9 File Hijacking Pattern: Seed Vulnerabilities
  10. 10 File Hijacking Pattern: Vulnerability Modeling
  11. 11 File Hijacking Pattern Extraction
  12. 12 Reparse Point Pattern: Seed Vulnerability
  13. 13 Reparse Point Pattern: Vulnerability Modeling
  14. 14 Reparse Point Pattern: Code Query Construction
  15. 15 ACL Overwritten Pattern: Seed Vulnerability
  16. 16 RDP Pool Spray Primitive Pattern Extraction
  17. 17 Pool Spray Pattern: Find Data Copy With Memcpy
  18. 18 Connect RDP PDU To Data Copy With Memcpy
  19. 19 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.