The Power of Data-Oriented Attacks - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques

The Power of Data-Oriented Attacks - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques

Black Hat via YouTube Direct link

Agenda

3 of 16

3 of 16

Agenda

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Power of Data-Oriented Attacks - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 About us
  3. 3 Agenda
  4. 4 Control Flow Guard
  5. 5 No1 Techniques
  6. 6 No1 Code
  7. 7 Demo
  8. 8 Fix
  9. 9 Summary
  10. 10 What is DataOnly Attack
  11. 11 DataOnly Attack Example
  12. 12 Writable Feature
  13. 13 Other Flag
  14. 14 ReadWrite
  15. 15 ACG
  16. 16 Demonstration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.