FYI: ASLR & DEP can be bypassed on x86, there's just nothing public at the moment.
Cheers, SkyLined Berend-Jan Wever <berendjanwe...@gmail.com> http://skypher.com/SkyLined On Thu, Oct 1, 2009 at 6:44 PM, Freddie Vicious <fred.vici...@gmail.com>wrote: > Yes, I am aware of the JVM and the Flash AVM heap spray techniques, no > DEP/ASLR there... But as you said, so far there's no known "catch-all" > technique against IE8. > Along with other security features ( > http://blogs.msdn.com/architecture/archive/2009/08/13/internet-explorer-8-rated-tops-against-malware-and-phishing-attacks.aspx) > this basicly means that IE8 is the most secure web browser nowadays? > > On Thu, Oct 1, 2009 at 8:27 AM, Jared DeMott <jared.dem...@harris.com>wrote: > >> I'm not aware of any catch-all technique just for IE8, though there are >> a few common ones like return oriented programming. Application >> specific techniques are also common when third party extensions are >> involved. >> >> -- >> __________________________________________ >> Jared D. DeMott >> Principal Security Researcher >> >> > > > -- > Best wishes, > Freddie Vicious > http://twitter.com/viciousf > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/