The Art of Reverse Engineering Flash Exploits

by Jeong Wook Oh
Sept. 16, 2017 1 comment belen_caty Pen Testing & Audits

With this presentation, I want to deliver two things: 1. The tactics and debugging technique that can be used to reverse engineer exploits. This includes using existing toolsets and combining them in an effective way. 2. The detailed exploit code reverse engineering examples that can help you understand what's the current and past status of attack and mitigation war. You might have heard of Vector corruption, ByteArray corruption and other JIT manipulation technique. Technical details will be discussed on how the exploits are using these and how the vendor defended against these.

Steven Ulm 8 months ago

Flash exploits are not a surprise anymore, people just should stop investing and using Flash...