2024-09-26 –, Main Track
We discuss an overview of the V8 and explain common exploitation techniques, using the n-day CVE-2023-3079 as a use-case. We show how to use the published advisory and public PoC code to exploit the vulnerability, covering a suggested approach, methodology and tooling that was used during the research.
Ayman is a senior consultant with a decade of experience in cyber security; penetration testing, vulnerability research, exploit development, reverse engineering and malware analysis.