• XSS.stack #1 – первый литературный журнал от юзеров форума

Видео [BSides Canberra 2024] You can be an iOS hacker: Stack Pivots and JOP/ROPs

weaver

31 c0 bb ea 1b e6 77 66 b8 88 13 50 ff d3
Забанен
Регистрация
19.12.2018
Сообщения
3 301
Решения
11
Реакции
4 622
Депозит
0.0001
Пожалуйста, обратите внимание, что пользователь заблокирован
Description
The world of iOS exploitation is daunting and intimidating to even seasoned security researchers. High barriers of entry, the mysterious world of exploit brokerage and a list of exploit mitigations that seem to perpetually go on and on... One core component of iOS exploitation is the construction of JOP/ROP chains and stack pivoting. If you don’t know what that is, this is the talk for you. Even the most untechnical security researcher will walk away knowing exactly how to find stack pivots used in real world iOS exploits.

 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх