Overview
Dive into a DefCamp 2019 conference talk that explores Windows graphics vulnerabilities through reverse engineering and fuzzing techniques. Learn about investigating the GDI component, analyzing patch differences, understanding EMF format, and triggering drawing order operations. Gain insights into effective fuzzing strategies, including WinAFL tips and corpus minimization. Follow the speaker's journey through a real-world fuzzing campaign, crash triage, and bug identification. Discover the intricacies of Windows graphics security in this 38-minute presentation from one of Central and Eastern Europe's most prominent information security conferences.
Syllabus
Intro
Background
What component to investigate: GDI
Inspect the fix: Patch Diffing
Inspect the fix: (IDA) BinDIFF plugin
Understanding EMF Format
Triggering a Drawing Order operation
Stop and think for a minute
Fuzzing Strategies
WinAFL Tips
Let's set up the fuzzing campaign
Corpus minimization
1 Day and 21 hours later ...
Crash triage: BugID
All I do is fuzz, fuzz, fuzAAAA?.%u92
Taught by
DefCamp