Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Use-After-Use-After-Free - Exploit UAF by Generating Your Own

Black Hat via YouTube

Overview

Explore a novel exploitation technique called Use-After-Use-After-Free (UAUAF) for UAF vulnerabilities in Adobe Flash in this 38-minute Black Hat conference talk. Discover how UAUAF transforms a UAF into a multi-class type confusion by leveraging a sequence of object occupations and releases. Learn about gaining full memory access despite recent mitigations added by Adobe. Examine real-world cases, build an exploit step-by-step, and see a Windows 10 example. Gain insights into the implications of this technique for cybersecurity professionals and developers working with Adobe Flash.

Syllabus

Introduction
Use of UAF
RealWorld Case
Build a Exploit
StepByToRage
Windows 10 Example
Conclusion

Taught by

Black Hat

Reviews

Start your review of Use-After-Use-After-Free - Exploit UAF by Generating Your Own

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.