Abysssec Present :
- Step 1: Reading Internal Object Pointer
- Step 2: Reading memory values and leaking module imagebase (ASLR bypass)
- Step 3: Using another leak for shellcode address
- Step 4: Using ROP to call VirtualProtect in (flash10h.ocx) and mark memory as executeable (DEP bypass)
- Step 5: Execute Shellcode
- Step 6: Wait 3 Second
- Step 7: Victory Dance
Questions : shahin@abysssec.com
Requests : info@abysssec.com