video thumbnail 11:35
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit

2019-05-26

[public] 58.5K views, 2.04K likes, 23.0 dislikes audio only

channel thumbLiveOverflow

Part 1: We are going to try out Linus's exploit and setup a vulnerable WebKit version including debug symbols.

The Linus: https://twitter.com/linushenze

The Exploit: https://github.com/LinusHenze/WebKit-RegEx-Exploit

The Vulnerable Commit: 3af5ce129e6636350a887d01237a65c2fce77823

The Fix: https://bugs.webkit.org/show_bug.cgi?id=191731

saelo's german presentation: https://www.youtube.com/watch?v=1RLt7yscBZc

-=[ šŸ•“ļø Advertisement ]=-

This video is supported by SSD Secure Disclosure: https://ssd-disclosure.com/

Offensive Security Conference TyphoonCon (10th - 14th June 2019): https://typhooncon.com/

-=[ ā¤ļø Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow

→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ šŸ”“ Stuff I use ]=-

→ Microphone:* https://geni.us/ntg3b

→ Graphics tablet:* https://geni.us/wacom-intuos

→ Camera#1 for streaming:* https://geni.us/sony-camera

→ Lens for streaming:* https://geni.us/sony-lense

→ Connect Camera#1 to PC:* https://geni.us/cam-link

→ Keyboard:* https://geni.us/mech-keyboard

→ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ šŸ• Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/

→ Website: https://liveoverflow.com/

→ Subreddit: https://www.reddit.com/r/LiveOverflow/

→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ šŸ“„ P.S. ]=-

All links with "*" are affiliate links.

LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#BrowserExploitation


start a simple web server
/youtube/video/yJewXMwj38s?t=87.5
get a proper debugging environment
/youtube/video/yJewXMwj38s?t=182.89999
analyze the bug
/youtube/video/yJewXMwj38s?t=200.81
build javascript core with debug symbols
/youtube/video/yJewXMwj38s?t=347.89999
print a string hello from javascript core
/youtube/video/yJewXMwj38s?t=369.79999
create a regular empty object
/youtube/video/yJewXMwj38s?t=373.31
unpack this raw byte string again as a double
/youtube/video/yJewXMwj38s?t=432.14001
add a floating point
/youtube/video/yJewXMwj38s?t=474.64899
break into the debugger
/youtube/video/yJewXMwj38s?t=553.88
examine eight 64-bit hex values at this address
/youtube/video/yJewXMwj38s?t=564.5
set a breakpoint
/youtube/video/yJewXMwj38s?t=595.64001
the javascript shell
/youtube/video/yJewXMwj38s?t=628.96997
print the current value of the result variable
/youtube/video/yJewXMwj38s?t=649.51001
LiveOverflow just a wannabe hacker... making videos about various IT security topics and participating in hacking competitions. -=[ ā¤ļø Support me ]=- Patreon per Video: https://www.patreon.com/join/liveoverflow YouTube Membership per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ šŸ“„ Imprint ]=- Security Flag GmbH Celsiusstr. 72 12207 Berlin Germany
/youtube/channel/UClcE-kVhqyiHCcjYwcpfj9w
I’m moving, no videos sorry 17,545 views
/youtube/video/9CS3q0uG1LI
Patreon patreon.com
https://www.patreon.com/join/liveoverflow
Pwn Adventure 3: Pwnie Island by LiveOverflow
/youtube/video/RDZnlcnmPUA