- AMMO
- CFP
- CTF
- CXO Track
- Exhibition
- For You
- Hackathon
- HackerHelp
- Horror Stories from Hacker World
- Recreation
- Resume Clinic
- Schedule
- Speakers
- Sponsors
- StartVille
- Training
- Venue
- Volunteer
- Goa 2020
- Speakers
- Prateek Gianchandani
Prateek Gianchandani
Workshop Title:
Webkit Exploitation
Abstract:
Web browsers are incredibly complex and because of its huge codebase, contain a wide attack surface.
This 2-hour workshop will give attendees an introduction to the world of Browser exploitation. We begin with an introduction to the Browser architecture and the different security mitigations in place. We will then learn how to set up a test environment using the open-source builds of different browser engines. We will then learn how to identify, analyze and exploit vulnerabilities in the WebKit browser engine.
We will focus mostly on WebCore and JavascriptCore, We will understand how objects are allocated and stored in the memory followed by an understanding of how JIT Compilers work, and then learn how a Type-confusion vulnerability can be exploited to get initial addrof() and fakeobj() primitives followed by shellcode execution on an unpatched Safari instance.
Bio:
Prateek Gianchandani is currently working as a Security Researcher at xen1thLabs. He has more than 7 years of experience in security research and penetration testing. His core focus area is mobile exploitation, reversing engineering and embedded device security. He is also the author of the open-source vulnerable application named Damn Vulnerable iOS app. He has presented and trained at many international conferences including Defcon, BlackHat USA, Brucon, Hack in Paris, PHDays, Appsec USA, etc. In his free time, he blogs at http://highaltitudehacks.com