Advanced Exploit Writing: Use-After-Free Vulnerabilities
- Stephen Sims, SANS Senior Instructor
- Wednesday, November 20th, 5:45pm - 7:45pm
We are pleased to invite you to the following advanced technical presentation at the upcoming SANS Sydney Community Night hosted in collaboration with the Australian Information Security Association (AISA).
5:45 - 6:45 Registration & Networking
6:45 - 7:45 Presentation
Use-After-Free vulnerabilities are responsible for the majority of browser-based (client-side) attacks on the Windows OS. In April, 2013, a Use-After-Free vulnerability was being exploited as part of an attack affecting the US Department of Labor website. We will walk through this vulnerability through exploitation, using modern techniques to bypass exploit mitigation controls and performing patch diffing to identify the flaw.
RSVP to: email@example.com by November 19.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
|Advanced Exploit Writing: Use-After-Free Vulnerabilities||Stephen Sims, SANS Senior Instructor||Wednesday, November 20th, 5:45pm - 7:45pm||SANS@Night|
|Playing with JBoss JMXInvokerServlet||Guillaume Thiaux||Thursday, November 21st, 6:30pm - 8:00pm||SANS@Night|