- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
190 - Fuzzing cURL, Netatalk, and an Emulator Escape [Binary Exploitation Podcast]
This week we talk about more Rust pitfalls, and fuzzing cURL. Then we have a couple bugs, one involving messing with the TCP stack to reach the vulnerable condition.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/190.html
[00:00:00] Introduction
[00:00:27] Spot the Vuln - Insecure by Default
[00:02:20] cURL audit: How a joke led to significant findings
[00:09:45] Rustproofing Linux (Part 4/4 Shared Memory)
[00:11:25] Rustproofing Linux (Part 4/4 Shared Memory)
[00:17:22] Exploiting a remote heap overflow with a custom TCP stack
[00:34:20] mast1c0re: Part 3 - Escaping the emulator
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
#ExploitDevelopment #BinaryExploitation #InfoSec #CyberSec #Podcast
Видео 190 - Fuzzing cURL, Netatalk, and an Emulator Escape [Binary Exploitation Podcast] канала DAY[0]
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/190.html
[00:00:00] Introduction
[00:00:27] Spot the Vuln - Insecure by Default
[00:02:20] cURL audit: How a joke led to significant findings
[00:09:45] Rustproofing Linux (Part 4/4 Shared Memory)
[00:11:25] Rustproofing Linux (Part 4/4 Shared Memory)
[00:17:22] Exploiting a remote heap overflow with a custom TCP stack
[00:34:20] mast1c0re: Part 3 - Escaping the emulator
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
#ExploitDevelopment #BinaryExploitation #InfoSec #CyberSec #Podcast
Видео 190 - Fuzzing cURL, Netatalk, and an Emulator Escape [Binary Exploitation Podcast] канала DAY[0]
Комментарии отсутствуют
Информация о видео
23 февраля 2023 г. 6:00:02
00:40:12
Другие видео канала


![185 - Facebook Account Takeovers and a vBulletin RCE [Bug Bounty Podcast]](https://i.ytimg.com/vi/ref7zbeNGFo/default.jpg)
![186 - An XNU Exploit and a Chrome Heap Overflow [Binary Exploitation Podcast]](https://i.ytimg.com/vi/gNahVSDSH1M/default.jpg)
![223 - Usurping Mastodon and Broken Signature Schemes [Bug Bounty Podcast]](https://i.ytimg.com/vi/VhCxOTJkBFs/default.jpg)


![233 - Spoofing Emails, PandoraFMS, and Keycloak [Bug Bounty Podcast]](https://i.ytimg.com/vi/KuIdZ70xEhU/default.jpg)
![195 - Stealing Secrets with Security Advisories and CorePlague [Bug Bounty Podcast]](https://i.ytimg.com/vi/clm2nYgk3oI/default.jpg)
![119 - Baby Monitor Bugs, Grafana, and Twitter De-anonymization [Bug Bounty Podcast]](https://i.ytimg.com/vi/-eRzqTguyoc/default.jpg)

![212 - Attacking VirtualBox and Malicious Chess [Binary Exploitation Podcast]](https://i.ytimg.com/vi/Qytii_mpqR4/default.jpg)
![181 - Cloud Bugs and More Vulns in Galaxy App Store [Bug Bounty Podcast]](https://i.ytimg.com/vi/gvbjSpWCp1A/default.jpg)
![106 - MediaTek, Yet Another Chrome Bug, and BigSig [Binary Exploitation Podcast]](https://i.ytimg.com/vi/bjzS-eBZIFY/default.jpg)


![220 - Windows Kernel Bugs, Safari Integer Underflow, and CONSTIFY [Binary Exploitation Podcast]](https://i.ytimg.com/vi/72E2ZePCrnQ/default.jpg)
![130 - Chrome Heap OOB Access and TLStorm [Binary Exploitation Podcast]](https://i.ytimg.com/vi/fQGz7cWLAqI/default.jpg)
![082 - NETGEAR smart switches, SpookJS, & Parallels Desktop [Binary Exploitation Podcast]](https://i.ytimg.com/vi/FIYxRfk8zzU/default.jpg)

![118 - Fastly Infoleak, Samba OOB Access, and Pwning MacOS [Binary Exploitation Podcast]](https://i.ytimg.com/vi/YKU3eDChD6c/default.jpg)
