The fakeobj() Primitive: Turning an Address Leak into a Memory Corruption

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=vwlG2l0ANuc



Duration: 15:59
33,926 views
1,153


Part5: In this video we turn the bug used in addrof() to corrupt the memory of internal JavaScriptCore Objects which can help us to compromise the engine.

The Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit
Saelo's exploit: https://github.com/saelo/cve-2018-4233/blob/master/pwn.js
Saelo's phrack paper: http://www.phrack.org/papers/attacking_javascript_engines.html

-=[ πŸ”΄ Stuff I use ]=-

β†’ Microphone:* https://geni.us/ntg3b
β†’ Graphics tablet:* https://geni.us/wacom-intuos
β†’ Camera#1 for streaming:* https://geni.us/sony-camera
β†’ Lens for streaming:* https://geni.us/sony-lense
β†’ Connect Camera#1 to PC:* https://geni.us/cam-link
β†’ Keyboard:* https://geni.us/mech-keyboard
β†’ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ ❀️ Support ]=-

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ πŸ• Social ]=-

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Website: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ πŸ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#BrowserExploitation







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
webkit
phrack
browser exploitation
saelo
javascriptcore
webkitcore
addrof
fakeobj
exploit primitive
memory corruption
address leak
jscellheader
jscell
jsvalue
double
pointer
objects
jsobject
safari