Abysssec Present :

- Step 1: Reading Internal Object Pointer

- Step 2: Reading memory values and leaking module imagebase (ASLR bypass)

- Step 3: Using another leak for shellcode address

- Step 4: Using ROP to call VirtualProtect in (flash10h.ocx) and mark memory as executeable (DEP bypass)

- Step 5: Execute Shellcode

- Step 6: Wait 3 Second

- Step 7: Victory Dance


Questions : shahin@abysssec.com

Requests : info@abysssec.com