![]() Executing our own payload is made impossible by NX but we can still execute code despite NX using ROP (Return Oriented Programming). However the ps3 OS is protected by NX ( No eXecute is the bsd/linux equivalent of DEP on Windows), no address randomisation though. By hijacking webkit, we inherit its privileges which means we are root & we get access to lv2 syscalls. However, he knew nothing about webkit exploitation & he started to collaborate with W. I started investigating the ps3 webkit about 6/7 months, but at the time, it was only to gather information, I had no idea I would eventually be the one working on it!Įnd of August, I gave the information I had to esc0rtd3w & expected he would work on it alone.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |