Preparing for Stage 2 of a WebKit exploit

Part 7: In this video we use the stage 1 fakeobj() and addrof() primitives, to craft malicious objects that allow us to implement arbitrary memory read and write. saelo’s phrack paper: niklasb’s exploit: -=[ ❤️ Support ]=- → per Video: → per Month: -=[ 🔴 Stuff I use ]=- → Microphone:* → Graphics tablet:* → Camera#1 for streaming:* → Lens for streaming:* → Connect Camera#1 to PC:* → Keyboard:* → Old Microphone:* US Store Front:* -=[ 🐕 Social ]=- → Twitter: → Website: → Subreddit: ht
Back to Top