Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Investigating Windows Graphics Vulnerabilities - A Reverse Engineering & Fuzzing Story - DefCamp - 2019

DefCamp via YouTube

Overview

Dive into a DefCamp 2019 conference talk that explores Windows graphics vulnerabilities through reverse engineering and fuzzing techniques. Learn about investigating the GDI component, analyzing patch differences, understanding EMF format, and triggering drawing order operations. Gain insights into effective fuzzing strategies, including WinAFL tips and corpus minimization. Follow the speaker's journey through a real-world fuzzing campaign, crash triage, and bug identification. Discover the intricacies of Windows graphics security in this 38-minute presentation from one of Central and Eastern Europe's most prominent information security conferences.

Syllabus

Intro
Background
What component to investigate: GDI
Inspect the fix: Patch Diffing
Inspect the fix: (IDA) BinDIFF plugin
Understanding EMF Format
Triggering a Drawing Order operation
Stop and think for a minute
Fuzzing Strategies
WinAFL Tips
Let's set up the fuzzing campaign
Corpus minimization
1 Day and 21 hours later ...
Crash triage: BugID
All I do is fuzz, fuzz, fuzAAAA?.%u92

Taught by

DefCamp

Reviews

Start your review of Investigating Windows Graphics Vulnerabilities - A Reverse Engineering & Fuzzing Story - DefCamp - 2019

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.