Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Power of Data-Oriented Attacks - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques

Black Hat via YouTube

Overview

Explore the power of data-oriented attacks in this Black Hat conference talk. Delve into advanced exploitation techniques that bypass memory mitigation measures like Control Flow Integrity (CFI) and Microsoft's Control Flow Guard (CFG). Learn about data-only exploitation methods, including the use of unprotected ret instructions, and understand their potential to circumvent traditional security measures. Examine real-world examples, code demonstrations, and practical applications of these techniques. Gain insights into writable features, ACG (Arbitrary Code Guard), and other relevant flags. Discover how these attacks work, their implications for cybersecurity, and potential countermeasures to enhance system protection against sophisticated memory vulnerabilities.

Syllabus

Introduction
About us
Agenda
Control Flow Guard
No1 Techniques
No1 Code
Demo
Fix
Summary
What is DataOnly Attack
DataOnly Attack Example
Writable Feature
Other Flag
ReadWrite
ACG
Demonstration

Taught by

Black Hat

Reviews

Start your review of The Power of Data-Oriented Attacks - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.