Preparing for Stage 2 of a Web Kit exploit
Part 7: In this video we use the stage 1 fakeobj() and addrof() primitives, to craft malicious objects that allow us to implement arbitrary memory read and write. saelo s phrack paper: niklasb s exploit: Support per Video: per Month: Stuff I use Microphone: Graphics tablet: Camera, 1 for streaming: Lens for streaming: Connect Camera, 1 to PC: Keyboard: Old Microphone: US Store Front: Social Twitter: Website: Subreddit: ht
|
|