Thursday, August 29, 2013 5 years ago ,
What does it take to take on Google Chrome in the Pwn2Own cage match and come out on top? This talk will be a technical tear-down of how to do just that, from this year’s winners. But far from being a boring re-hash of public advisories, this talk will dish the goodies on how the vulnerabilities were found, and how to find other similar vulnerabilities using knowledge gleamed from weeks of source code review. Then, we will turn our attention to the Windows kernel, showing how to combine reverse engineering and fuzzing to get results, even in the over-fished waters of win32k.
Expect a deep dive into WebKit internals, a tour of some cutting-edge exploitation techniques, a brain-melting look at the Windows messaging subsystem, and a view of one of the rarest sights in exploit development – a SYSTEM level calc.exe (with accompanying command prompt for good measure).