• 0%
    0 votes
  • Rate this episode
    What did you think?

Chaos Communication Congress: Season 36

36x45 SELECT code_execution FROM * USING SQLite;

  • 2019-12-27T00:00:00Z
  • 1h
  • English
(--Gaining code execution using a malicious SQLite database) SQLite is one of the most deployed software in the world. However, from a security perspective, it has only been examined through the narrow lens of WebSQL and browser exploitation. We believe that this is just the tip of the iceberg. In our long term research, we experimented with the exploitation of memory corruption issues within SQLite without relying on any environment other than the SQL language. Using our innovative techniques of Query Hijacking and Query Oriented Programming, we proved it is possible to reliably exploit memory corruptions issues in the SQLite engine. We demonstrate these techniques a couple of real-world scenarios: pwning a password stealer backend server, and achieving iOS persistency with higher privileges.
Loading...