Modern Windows use mitigation techniques such as DEP and ASLR to mitigate exploitation. The combination of ASLR and DEP have been proven to be a solid shield in most cases. Mitigation bypass is always one of the hottest topic in the security community.
This presentation contains two kind of new DEP bypass techniques, two kind of new ASLR bypass techniques, and many lesser known exploration skills. These techniques don't need ROP, JIT, third-party plugins or Non-ASLR modules. They are OS-independent, even CPU-independent in some cases. So exploits can easily "Write Once, Pwn Anywhere" now.
These techniques are fairly different from traditional exploit technique. So they may also be difficult to detect and identify if you don't know them.
YANG is Director of Security Lab at Mobile Internet Group of Tencent. He has more than a decade of experience researching and working in the computer security space. He has spoken at many security conferences in the past, on different topics at CanSecWest, HITCon, XCon, and etc. He is also a $100,000 Microsoft Mitigation Bypass bounty winner.