Showing only posts by Google Project Zero ([email protected]). Show all posts.

The Windows Registry Adventure #8: Practical exploitation of hive memory corruption

Source

Posted by Mateusz Jurczyk, Google Project Zero In the previous blog post, we focused on the general security analysis of the registry and how to effectively approach finding vulnerabilities in it. Here, we will direct our attention to the exploitation of hive-based memory corruption bugs, i.e., those that …

Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages

Source

Guest post by Dillon Franke, Senior Security Engineer, 20% time on Project Zero Every second, highly-privileged MacOS system daemons accept and process hundreds of IPC messages. In some cases, these message handlers accept data from sandboxed or unprivileged processes. In this blog post, I’ll explore using Mach IPC …