Part 7: In this video we use the stage 1 fakeobj() and addrof() primitives, to craft malicious objects that allow us to implement arbitrary memory read and write.
saelo's phrack paper: http://www.phrack.org/papers/attackin...
niklasb's exploit: https://github.com/niklasb/sploits/bl...
=[ ❤ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
=[ Stuff I use ]=
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacomintuos
→ Camera#1 for streaming:* https://geni.us/sonycamera
→ Lens for streaming:* https://geni.us/sonylense
→ Connect Camera#1 to PC:* https://geni.us/camlink
→ Keyboard:* https://geni.us/mechkeyboard
→ Old Microphone:* https://geni.us/micat2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
=[ Social ]=
→ Twitter: / liveoverflow
→ Website: https://liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow
=[ P.S. ]=
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#BrowserExploitation