Shell on Earth: From Browser to System Compromise

by Matt Molinyawe, Jasiel Spelman, Abdul-Aziz Hariri, Joshua Smith Sept. 14, 2017 via submitted by belen_caty

This presentation will detail the eight winning browser to super user exploitation chains (21 total vulnerabilities) demonstrated at this year's Pwn2Own contest. We will cover topics such as modern browser exploitation, the complexity of kernel Use-After-Free exploitation, and the simplicity of exploiting logic errors and directory traversals in the kernel. We will analyze all attack vectors, root causes, exploitation techniques, and possible remediations for the vulnerabilities presented.$hell-on-earth-from-browser-to-system-compromise

Steven Ulm 1 month ago

Really good pun title. Easy to read and informative. Good job!