Preparing for Stage 2 of a WebKit exploit

Preparing for Stage 2 of a WebKit exploit

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=3c6nC0wdU-Q



Duration: 14:33
22,094 views
689


Part 7: In this video we use the stage 1 fakeobj() and addrof() primitives, to craft malicious objects that allow us to implement arbitrary memory read and write.

saelo's phrack paper: http://www.phrack.org/papers/attacking_javascript_engines.html
niklasb's exploit: https://github.com/niklasb/sploits/blob/master/safari/regexp-uxss.html

-=[ ❀️ Support ]=-

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ πŸ”΄ Stuff I use ]=-

β†’ Microphone:* https://geni.us/ntg3b
β†’ Graphics tablet:* https://geni.us/wacom-intuos
β†’ Camera#1 for streaming:* https://geni.us/sony-camera
β†’ Lens for streaming:* https://geni.us/sony-lense
β†’ Connect Camera#1 to PC:* https://geni.us/cam-link
β†’ Keyboard:* https://geni.us/mech-keyboard
β†’ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ πŸ• Social ]=-

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Website: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ πŸ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#BrowserExploitation







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
browser exploitation
browser exploit
jit compiler
addrof
exploit primitive
fakeobj
phrack
saselo
niklasb
linus
linus henze
butterfly
jscell
jsvalue
jsc
lldb
javascript
java script
unboxed
boxed
js values
cell header
oop
object oriented
classes and objects
c++
advanced exploitation
osx
linux
windows
browser hacks
arbitrary read
arbitrary write