Blog home Search
logologoGo to homepage
  • Technology
  • Features
  • Demos
  • Pricing
  • Resources
    • Helpdesk & FAQ
    • Documentation
    • Github
  • Company
    • About
    • Contact
  • Blog
Blog home Search
Subscribe to What's New Subscribe to What's New
Recent posts
  • Finding uses of cryptographic functions and the data encrypted by an application
  • HITBCyberWeek 2020 REVEN Lab replay
  • Announcing REVEN version 2.7
Categories
  • Reven (13)
  • Technical (18)
  • Tutorial (13)
  • Automation (2)
  • Reven (3)
  • Conference (1)
  • All posts (47)
Tags
  • Axion (7)
  • Reven (36)
  • Reverse engineering (26)
  • Taint (4)
  • Use after free (1)
  • Flash (1)
  • Swf (1)
  • Reven axion (1)
  • Plugin (1)
  • Deobfuscation (3)
  • Ctf (3)
  • Bsod (1)
  • Kernel (2)
  • Race-condition (1)
  • Cve (8)
  • Adobe flash (1)
  • Demo (13)
  • Patchguard (1)
  • Exploit (3)
  • Windows kernel (3)
  • Scripts (1)
  • Windows boot (1)
  • Uefi (1)
  • Malware analysis (2)
  • Releases (6)
  • Announcement (6)
  • Automation (3)
  • Analysis api (6)
  • Workflow api (5)
  • Pe (1)
  • Parsing (1)
  • Taint (3)
  • Pte (1)
  • Syscall (1)
  • Script (1)
  • Ossi (1)
  • Oob (1)
  • Read overflow (1)
  • Reven (4)
  • Use-after-free (1)
  • Uaf (2)
  • Garbage collector (2)
  • Memory management (2)
  • Use after free (1)
  • Scenario recording (5)
  • Api (1)
  • Windbg (1)
  • Buffer overflow (2)
  • Performance (1)
  • Profiling (1)
  • Use case (1)
  • Vulnerability detection (1)
  • Use cases (1)
  • Cryptography (1)

1 post in archive

Buffer overflow exploitation in Quick Player 1.3 (unicode & SEH)

06 Oct 2020 by Quentin - REVEN - Reverse Engineering REVEN Exploit Buffer overflow

In this article, we will talk about the exploitation of a buffer overflow in Quick Player 1.3 leading to an arbitrary code execution, and how we fixed an already existing exploit using REVEN. We will first present the exploit, then explain why it did not work at first, and how...

©2019 Tetrane