{"id":9193,"date":"2012-05-24T16:56:36","date_gmt":"2012-05-24T14:56:36","guid":{"rendered":"https:\/\/www.corelan.be\/?p=9193"},"modified":"2026-03-23T07:18:01","modified_gmt":"2026-03-23T06:18:01","slug":"hitb2012ams-day-1-window-shopping","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/","title":{"rendered":"HITB2012AMS Day 1 - Window Shopping"},"content":{"rendered":"<h3>Window Shopping: Browser Bugs Hunting in 2012<\/h3>\n<p>In the last talk of Day 1,\u00a0<a href=\"https:\/\/twitter.com\/malerisch\">Roberto Suggi Liverani<\/a> and Scott Bell (not present during the presentation), \u00a0security consultants at Security-Assessment.com, will share the results of some intensive browser bug hunting research, and will drop <strong>5<\/strong> 0days.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"rps20120524_160301_391.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2012\/05\/rps20120524_160301_391.jpg\" alt=\"Rps20120524 160301 391\" width=\"600\" height=\"450\" border=\"0\" \/><\/p>\n<p>Roberto starts by apologizing about the fact that Scott was not able to join him at the conference.<\/p>\n<p>The agenda of the talk contains 3 major components:<\/p>\n<ul>\n<li>Introduction<\/li>\n<li>Window Shopping<\/li>\n<li>Conclusions<\/li>\n<\/ul>\n<h3>Introduction<\/h3>\n<p>Everybody uses browsers, Roberto states. \u00a0Browsers have become predominant desktop applications and we see a clear shift towards client-side applications and attacks. \u00a0It makes a lot of sense to take a look at the security of browsers.<\/p>\n<p>&nbsp;<\/p>\n<h3>Window Shopping<\/h3>\n<h4>Firefox Use After Free &lt; 11 \u00a0(Fixed in FF11), found by Scott Bell.<\/h4>\n<p>This bug only works in Windows 7. Roberto mentions that it took the devs a long time to get fixed, indicating possible complexity involved with this bug. \u00a0A slightly modified version of cross_Fuzz was used to find this bug.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"rps20120524_161225_723.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2012\/05\/rps20120524_161225_723.jpg\" alt=\"Rps20120524 161225 723\" width=\"600\" height=\"450\" border=\"0\" \/><\/p>\n<p>To make cross_fuzz produce the crash, they basically added more entropy, randomizing call parameter count, removed google_gc() and changed some other things. \u00a0 To create a different HTML file every time, they implemented \u00a0HTMLGen. \u00a0They also removed some phases in cross_fuzz to make things faster.<\/p>\n<p>After triggering the crash, they had to simplify the html page that caused the crash and remove unnecessary components. \u00a0Using the JSLOG Firefox extension, they logged DOM operations, allowing them to observe browser behavior around the time of the crash. \u00a0 FInally, they had to trace the browser behavior in a debugger\u2026 which took a fair bit of time (months). \u00a0In the end, they were able to pinpoint the exact code that causes the UAF condition.<\/p>\n<p>In terms of exploitability, they discovered that there's some kind of race condition involved, making timings particularly important to gain code execution. \u00a0The proof of concept code demonstrated on stage doesn't include DEP\/ASLR bypass either (it just sprays and ends up jumping into the spray).<\/p>\n<h4>Maxthon - XCS and SOP Bypass, found by Roberto<\/h4>\n<p>Roberto found a couple of bugs in Maxthon and first explains what a Cross Zone Scripting is and the fact that it offers and intrinsic Same Origin Policy bypass. \u00a0If you have javascript running in a trusted zone (and each browser has a trusted zone), you can access the local system API's. \u00a0If you can do that, you can execute code, and it would be 100% reliable.<\/p>\n<p>Maxthon, a chinese web browser, supports Trident and Webkit layout engines, and is used, according to Maxthon, by 130 million users. \u00a0Roberto found 5 ways to get code execution in the Maxthon browser. \u00a0In addition to the Trusted Zone issues (and the fact that they could inject code into the about:history page),\u00a0they also discovered that i.maxthon.com appears to be a trusted domain, allowing access to privileged API's. \u00a0There's no control on domain name to IP resolution, and no SSL either. \u00a0MiTM anyone ? \u00a0 \u00a0The latest version of the browser is still vulnerable to some of the bugs they found. \u00a0 To demonstrate code execution, he used a few lines of javascript that creates a .bat file, adds some commands into the file and then runs it.<\/p>\n<h4>Avant Browser XCS &amp; SOP Bypass, found by Roberto<\/h4>\n<p>Yet another Chinese browser fell apart during their research. \u00a0Roberto drops 3 0day bugs during the talk (because the Avant devs didn't respond to any of his reports). \u00a0Avant is a custom web browser application, using IE (light version) or IE\/FF\/Chrome (Ultimate) in the background. \u00a0With 26 million downloads, the app seems to be used by a lot of people. \u00a0Some of the files in the res folder are rendered in special pages, allowing for the execution of a privileged function (ARFunCommand()). \u00a0They fuzzed the methods from this undocumented function and found some interesting results, returning information from the browser and browsing sessions. \u00a0 Using the 60003 value found during the fuzzing, they managed to perform a SOP bypass and XCS.<\/p>\n<h4>Firefox, patched in 3.6.14 - CVE 2010-1585<\/h4>\n<p>Roberto discovered that the nslScriptableUnescapeHTML.parseFragment() function, which is used to filter and sanitize data. \u00a0Instead of using &lt;script&gt; (which gets removed by that function), \u00a0he used javascript:alert(window). \u00a0When the user clicks the scripts, it gets executed in the Chrome zone, allowing you to run privileged commands (such as downloading a file and running it).<\/p>\n<h4>Opera Use-After-Free &lt; 11.52<\/h4>\n<p>Labeled as low severity by Opera, because Roberto couldn't give them a proof of concept exploit. (???) \u00a0 It was recognized as a memory corruption bug, but not classified as a security issue. \u00a0At the same time, Opera mentioned that, if Roberto would deliver an exploit, they might revisit their position. \u00a0The researchers used their own custom fuzzer to find this bug.<\/p>\n<h4>Firefox\/Opera - XCS via bookmarks<\/h4>\n<p>Ancient bug, reported in 2005 by M. Krax. \u00a0If the user is lured into bookmarking a malicious javascript: URI + payload and the user clicks on it, it might lead to a universal XSS (when used in a standard web page), or a XCS (when used in a privileged browser zone). \u00a0 Roberto explains that there are many ways to fool a user. \u00a0You can spoof URL and status bar. \u00a0Javascript can be compressed. \u00a0You can even hide code (@Agarri_FR found a bug in Opera, where you could use a null byte to hide code from the source view). \u00a0Of course, this type of exploit requires a couple of requirements or conditions to be met, but it works painfully well.<\/p>\n<p>The problem is even worse in Firefox, because you can't really see the javascript code from the \"Add Bookmark\" window. \u00a0This issue has been fixed in Firefox 11.<\/p>\n<p>&nbsp;<\/p>\n<h3>Conclusions<\/h3>\n<ul>\n<li>Some browser vendors still do not understand how reporting &amp; dealing with security disclosure works.<\/li>\n<li>Injection bugs are simple but impact can be significant<\/li>\n<li>No need to find memory corruption bugs to achieve code execution<\/li>\n<li>Presenting browsers to be \"as secure as IE \/ Chrome\" provides a false sense of security.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>This concludes my first day at Hack In The Box 2012 Amsterdam. \u00a0Stay tuned for more posts tomorrow!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Window Shopping: Browser Bugs Hunting in 2012 In the last talk of Day 1,\u00a0Roberto Suggi Liverani and Scott Bell (not present during the presentation), \u00a0security consultants at Security-Assessment.com, will share the results of some intensive browser bug hunting research, and will drop 5 0days. Roberto starts by apologizing about the fact that Scott was not &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"HITB2012AMS Day 1 - Window Shopping\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250],"tags":[3783,3732,2916,2775,2170,261],"class_list":["post-9193","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","tag-conference","tag-heap-exploitation","tag-firefox","tag-hitb","tag-0day","tag-corelan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>HITB2012AMS Day 1 - Window Shopping - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HITB2012AMS Day 1 - Window Shopping - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Window Shopping: Browser Bugs Hunting in 2012 In the last talk of Day 1,\u00a0Roberto Suggi Liverani and Scott Bell (not present during the presentation), \u00a0security consultants at Security-Assessment.com, will share the results of some intensive browser bug hunting research, and will drop 5 0days. Roberto starts by apologizing about the fact that Scott was not &hellip; Continue reading &quot;HITB2012AMS Day 1 - Window Shopping&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-24T14:56:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T06:18:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2012\/05\/rps20120524_160301_391.jpg\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-window-shopping\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-window-shopping\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"HITB2012AMS Day 1 - Window Shopping\",\"datePublished\":\"2012-05-24T14:56:36+00:00\",\"dateModified\":\"2026-03-23T06:18:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-window-shopping\\\/\"},\"wordCount\":1017,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-window-shopping\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2012\\\/05\\\/rps20120524_160301_391.jpg\",\"keywords\":[\"conference\",\"heap exploitation\",\"firefox\",\"hitb\",\"0day\",\"corelan\"],\"articleSection\":[\"Cons and Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-window-shopping\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-window-shopping\\\/\",\"name\":\"HITB2012AMS Day 1 - Window Shopping - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-window-shopping\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-window-shopping\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2012\\\/05\\\/rps20120524_160301_391.jpg\",\"datePublished\":\"2012-05-24T14:56:36+00:00\",\"dateModified\":\"2026-03-23T06:18:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-window-shopping\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-window-shopping\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-window-shopping\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2012\\\/05\\\/rps20120524_160301_391.jpg\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2012\\\/05\\\/rps20120524_160301_391.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/24\\\/hitb2012ams-day-1-window-shopping\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HITB2012AMS Day 1 - Window Shopping\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HITB2012AMS Day 1 - Window Shopping - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/","og_locale":"en_US","og_type":"article","og_title":"HITB2012AMS Day 1 - Window Shopping - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Window Shopping: Browser Bugs Hunting in 2012 In the last talk of Day 1,\u00a0Roberto Suggi Liverani and Scott Bell (not present during the presentation), \u00a0security consultants at Security-Assessment.com, will share the results of some intensive browser bug hunting research, and will drop 5 0days. Roberto starts by apologizing about the fact that Scott was not &hellip; Continue reading \"HITB2012AMS Day 1 - Window Shopping\"","og_url":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2012-05-24T14:56:36+00:00","article_modified_time":"2026-03-23T06:18:01+00:00","og_image":[{"url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2012\/05\/rps20120524_160301_391.jpg","type":"","width":"","height":""}],"author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"HITB2012AMS Day 1 - Window Shopping","datePublished":"2012-05-24T14:56:36+00:00","dateModified":"2026-03-23T06:18:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/"},"wordCount":1017,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2012\/05\/rps20120524_160301_391.jpg","keywords":["conference","heap exploitation","firefox","hitb","0day","corelan"],"articleSection":["Cons and Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/","url":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/","name":"HITB2012AMS Day 1 - Window Shopping - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/#primaryimage"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2012\/05\/rps20120524_160301_391.jpg","datePublished":"2012-05-24T14:56:36+00:00","dateModified":"2026-03-23T06:18:01+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/#primaryimage","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2012\/05\/rps20120524_160301_391.jpg","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2012\/05\/rps20120524_160301_391.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/24\/hitb2012ams-day-1-window-shopping\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"HITB2012AMS Day 1 - Window Shopping"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":3767,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=9193"}],"version-history":[{"count":1,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9193\/revisions"}],"predecessor-version":[{"id":17837,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9193\/revisions\/17837"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=9193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=9193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=9193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}