Presented at 
AppSec USA 2014,
          Sept. 18, 2014, 10:30 a.m.
          (45 minutes).
          
          
          
          
Use After Free vulnerabilities are the cause of a large number of web browser and client-side compromises. Software bugs residing on the heap can be difficult to detect through standard debugging and QA. This presentation will first define the Use After Free vulnerability class, and then dive deep into detecting the bug in a debugger and weaponizing it into a working exploit against Internet Explorer. We will also cover the concept of memory leaks which can allow for a complete Address Space Layout Randomization (ASLR) bypass.
          
          Presenters:
          
            
            - 
              Stephen Sims
               - Consultant
              
              
Stephen Sims is an industry expert with over 15 years of experience in  information technology and security. Stephen currently works out of San  Francisco as a consultant performing reverse engineering, exploit  development, threat modeling, and penetration testing. Stephen has an MS  in information assurance from Norwich University and is a course author  and senior instructor for the SANS Institute.  He is the author of SANS' only 700-level course, SEC760: Advanced  Exploit Development for Penetration Testers, which concentrates on  complex heap overflows, patch diffing, and client-side exploits. Stephen  is also the lead author on SEC660: Advanced Penetration Testing,  Exploits, and Ethical Hacking. He holds the GIAC Security Expert (GSE)  certification as well as the CISSP, CISA, Immunity NOP, and many other  certifications.
             
            
          
          
          
          Links:
          
          
          
          
          Similar Presentations: