Part 1: We are going to try out Linus's exploit and setup a vulnerable WebKit version including debug symbols.
The Linus: / linushenze
The Exploit: github.com/LinusHenze/WebKit-...
The Vulnerable Commit: 3af5ce129e6636350a887d01237a65c2fce77823
The Fix: bugs.webkit.org/show_bug.cgi?...
saelo's german presentation: • (German!) Attacking Ja...
=[ 🕴️ Advertisement ]=
This video is supported by SSD Secure Disclosure: ssd-disclosure.com/
Offensive Security Conference TyphoonCon (10th - 14th June 2019): typhooncon.com/
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
=[ 🔴 Stuff I use ]=
→ Microphone:* geni.us/ntg3b
→ Graphics tablet:* geni.us/wacom-intuos
→ Camera#1 for streaming:* geni.us/sony-camera
→ Lens for streaming:* geni.us/sony-lense
→ Connect Camera#1 to PC:* geni.us/cam-link
→ Keyboard:* geni.us/mech-keyboard
→ Old Microphone:* geni.us/mic-at2020usb
US Store Front:* www.amazon.com/shop/liveoverflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Website: liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow
=[ 📄 P.S. ]=
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#BrowserExploitation
Негізгі бет Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
No video
Пікірлер: 100