Pwn2Own

Results: 18



#Item
11IPhone / Smartphones / Multi-touch / IOS / ITunes / Address space layout randomization / IOS jailbreaking / Pwn2Own / JailbreakMe / Computing / Software / Apple Inc.

http://www.sektioneins.de Antid0te 2.0 - ASLR in iOS Stefan Esser Who am I?

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-28 00:11:30
12X86 architecture / Software bugs / Ioctl / Unix / Memory management / Pointer / X86-64 / Dangling pointer / MOV / Computing / Computer architecture / Software

Pwn2Own 2014 AFD.SYS DANGLING POINTER VULNERABILITY Version: [removed]

Add to Reading List

Source URL: www.siberas.de

Language: English - Date: 2014-07-11 11:07:03
13Portable software / Web browsers / Pwn2Own / Sandbox / Attack surface / Software / Google Chrome / Cloud clients

Public EXTERNAL Polishing Chrome for Fun and Profit Nils & Jon

Add to Reading List

Source URL: labs.mwrinfosecurity.com

Language: English - Date: 2014-09-02 08:45:28
14Hacking / Software testing / Vulnerability / Responsible disclosure / Software bugs / Full disclosure / Pwn2Own / Exploit / Google Chrome / Software / Computer security / Computing

HP-Vulnerability_Infographic_v1

Add to Reading List

Source URL: www.pwn2own.com

Language: English - Date: 2014-03-05 10:32:45
15Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2010-12-28 00:16:40
16Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: vreugdenhilresearch.nl

Language: English - Date: 2010-03-24 14:09:15
17ITunes / IPhone / Software / Address space layout randomization / IOS jailbreaking / Return-to-libc attack / IPad / Pwn2Own / Shellcode / Apple Inc. / Computing / IOS

http://www.sektioneins.de Adding ASLR to jailbroken iPhones Stefan Esser What the talk is NOT about

Add to Reading List

Source URL: antid0te.com

Language: English - Date: 2014-02-28 09:59:45
18Web browsers / FTP clients / Hypertext / Internet Explorer / Safari / Firefox / Google Chrome / Mac OS X Lion / Pwn2Own / Software / Mac OS X / News aggregators

End User Requirements for Version[removed]End User Requirements The tables below are a guideline for end users. The ProgressBook Suite has been successfully tested using these product and version configurations. Other con

Add to Reading List

Source URL: www.mveca.org

Language: English - Date: 2014-03-21 16:41:11
UPDATE