January 2015
Intermediate to advanced
656 pages
18h 58m
English
This chapter will teach you how to analyze Use-After-Free vulnerabilities found in recent zero days during 2013 and 2014.
In this chapter, we cover the following topics:
• Use-After-Free (UAF) overview:
• Dissecting UAF
• Leveraging UAF
CAUTION It is important to realize that all different addresses calculated in the following labs will certainly be different from those in your environment; however, the results should be the same.
Refer to Chapter 16 before moving forward for the instructions to set up and configure WinDbg debugger.