Overview
Syllabus
Intro
Agenda
Motivation
Prologue
Examining the Attack Surface
Data Definition Language
Back to Query Preparation
DDL Patching
CREATE VIEW
Query Hijacking Example
SQL Injection
Memory Corruptions and SQLite
WebSQL - Attacks
Full Text Search
Virtual Tables
Shadow Tables
RTREE Bug
My Exploitation Primitives Wish-list
QOP by Example: The Unfixed CVE-2015-7036
RECAP
Exploitation Game Plan
Memory Leak
Unpacking of 64-bit pointers
Pointer Arithmetics
Crafting Complex Objects in Memory
Fake Object Example
Heap Spray
My Exploitation Primitives Wish- list
QOP Chaining
Next Target: iOS Persistency
Malicious Contacts DB
Secure Boot Bypassed CVE-2019-8577
Takeaways
Taught by
media.ccc.de