Hacking Browsers - Setup and Debug JavaScriptCore / WebKit

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=yJewXMwj38s



Duration: 11:36
67,280 views
2,000


Part 1: We are going to try out Linus's exploit and setup a vulnerable WebKit version including debug symbols.

The Linus: https://twitter.com/linushenze
The Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit
The Vulnerable Commit: 3af5ce129e6636350a887d01237a65c2fce77823
The Fix: https://bugs.webkit.org/show_bug.cgi?id=191731
saelo's german presentation: https://www.youtube.com/watch?v=1RLt7yscBZc

-=[ πŸ•΄οΈ Advertisement ]=-

This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/
Offensive Security Conference TyphoonCon (10th - 14th June 2019): https://typhooncon.com/

-=[ ❀️ Support ]=-

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ πŸ”΄ Stuff I use ]=-

β†’ Microphone:* https://geni.us/ntg3b
β†’ Graphics tablet:* https://geni.us/wacom-intuos
β†’ Camera#1 for streaming:* https://geni.us/sony-camera
β†’ Lens for streaming:* https://geni.us/sony-lense
β†’ Connect Camera#1 to PC:* https://geni.us/cam-link
β†’ Keyboard:* https://geni.us/mech-keyboard
β†’ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ πŸ• Social ]=-

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Website: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ πŸ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#BrowserExploitation







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
browser exploitation
exploits
webkit
javascriptcore
webcore
javascript
svn
git
regexp
regex
side effects
jailbreak
playstation
nintendo switch
security research
saelo
linus henze
webkit.org
safari
macos
osx
linux
researcher
vulnerability
remote code execution
0day
zero day
1day
zero-day
shellcode
jit
just in time
just-in-time
compiler
bug
bugs
js