@LiveOverflow
  @LiveOverflow
LiveOverflow | Preparing for Stage 2 of a WebKit exploit @LiveOverflow | Uploaded 5 years ago | Updated 5 hours ago
Part 7: In this video we use the stage 1 fakeobj() and addrof() primitives, to craft malicious objects that allow us to implement arbitrary memory read and write.

saelo's phrack paper: http://www.phrack.org/papers/attacking_javascript_engines.html
niklasb's exploit: github.com/niklasb/sploits/blob/master/safari/regexp-uxss.html

-=[ ❀️ Support ]=-

β†’ per Video: patreon.com/join/liveoverflow
β†’ per Month: youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ πŸ”΄ Stuff I use ]=-

β†’ Microphone:* geni.us/ntg3b
β†’ Graphics tablet:* geni.us/wacom-intuos
β†’ Camera#1 for streaming:* geni.us/sony-camera
β†’ Lens for streaming:* geni.us/sony-lense
β†’ Connect Camera#1 to PC:* geni.us/cam-link
β†’ Keyboard:* geni.us/mech-keyboard
β†’ Old Microphone:* geni.us/mic-at2020usb

US Store Front:* amazon.com/shop/liveoverflow

-=[ πŸ• Social ]=-

β†’ Twitter: twitter.com/LiveOverflow
β†’ Website: liveoverflow.com
β†’ Subreddit: reddit.com/r/LiveOverflow
β†’ Facebook: facebook.com/LiveOverflow

-=[ πŸ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#BrowserExploitation
Preparing for Stage 2 of a WebKit exploitNew to Linux? Need Help Understanding Shell Commands?Building an 8-Bit Computer From ScratchHacker Tweets ExplainedJust-in-time Compiler in JavaScriptCore (WebKit)using z3 to reverse a custom hash during a CTF be like #shortsBug Hunter Talks & Init.G for Student - Escal8 2019 Day 2File Path Race Condition & How To Prevent It - bin 0x31Computer Networking (Deepdive)Nintendo Hire me!!!!!!!!Every Computer Can Be Hacked!DLL Injection to Create a Fly Hack - Pwn Adventure 3

Preparing for Stage 2 of a WebKit exploit @LiveOverflow

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER