Abstract

A program stores a large buffer and at some point we hijack the execution flow we then redirect control to one of the CPU registers that contains part of our buffer and any instructions there will be executed. But ask yourself what if, after we gain control, we don't have enough buffer space for a meaningful payload. It may be the case that the particular vulnerability is not exploitable but that is unlikely. In this case you need to look for one of two things: (1) the buffer space before overwriting EIP is also in memory somewhere and (2) a buffer segment may also be stored in a completely different region of memory.

Egg hunting and exploitation techniques will be covered.

Scripts used in presentation : https://github.com/MalavVyas/KolibriEggHunt

Speaker

Malav Vyas

Just another noob in this cyber world

Timing

Starts at Sunday June 16 2019, 10:15 AM. The sessions runs for about 1 hour.

Resources