Overview
Syllabus
Intro
Background for Static Code Analysis
Challenges for Static Code Analysis
What is Workspace, Exactly?
Workflow - Run Query
Query Mode Limitation
Example SQL Query Running Script Mode
Leviathan Utility & Pattern Search Primitives
File Hijacking Pattern: Seed Vulnerabilities
File Hijacking Pattern: Vulnerability Modeling
File Hijacking Pattern Extraction
Reparse Point Pattern: Seed Vulnerability
Reparse Point Pattern: Vulnerability Modeling
Reparse Point Pattern: Code Query Construction
ACL Overwritten Pattern: Seed Vulnerability
RDP Pool Spray Primitive Pattern Extraction
Pool Spray Pattern: Find Data Copy With Memcpy
Connect RDP PDU To Data Copy With Memcpy
Summary
Taught by
Black Hat