Shell on Earth: From Browser to System Compromise

by Matt Molinyawe, Jasiel Spelman, Abdul-Aziz Hariri, Joshua Smith
Sept. 15, 2017 1 comment belen_caty Pen Testing & Audits browser shell

This presentation will detail the eight winning browser to super user exploitation chains (21 total vulnerabilities) demonstrated at this year's Pwn2Own contest. We will cover topics such as modern browser exploitation, the complexity of kernel Use-After-Free exploitation, and the simplicity of exploiting logic errors and directory traversals in the kernel. We will analyze all attack vectors, root causes, exploitation techniques, and possible remediations for the vulnerabilities presented.$hell-on-earth-from-browser-to-system-compromise

Steven Ulm 8 months ago

Really good pun title. Easy to read and informative. Good job!