- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
080 - Escaping the Bhyve, WhatsApp & BrakTooth [Binary Exploitation Podcast]
A tricky to exploit WhatsApp vulnerability, but still an interesting bug, several Bhyve vulnerabilities, and a named bluetooth vuln (Braktooth)
Links and summaries are available on our website: https://dayzerosec.com/podcast/escaping-the-bhyve-whatsapp-braktooth.html
[00:00:00] Introduction + The Future
[00:02:08] Spot The Vuln Solution
[00:07:25] Replay-based attack on Honda and Acura vehicles
[00:15:54] A Heap-based Buffer Overflow Bug in the MySQL InnoDB memcached Plugin [CVE-2021-2429]
[00:25:44] Vulnerability in WhatsApp could have led to data exposure of users
[00:32:26] Code execution outside the virtualized guest in bhyve [CVE-2021-29631]
[00:40:59] Your vulnerability is in another OEM!
[01:01:36] BrakTooth
[01:09:00] HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs
The DAY[0] podcast is streamed live on Twitch. -- https://www.twitch.tv/dayzerosec
Mondays at 3:00pm Eastern with an emphasis on Bug Bounties style issues.
Tuesdays at 7:00pm Eastern focusing on more low-level vulnerabilities.
The audio-only version of the podcast is available on:
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Видео 080 - Escaping the Bhyve, WhatsApp & BrakTooth [Binary Exploitation Podcast] канала DAY[0]
Links and summaries are available on our website: https://dayzerosec.com/podcast/escaping-the-bhyve-whatsapp-braktooth.html
[00:00:00] Introduction + The Future
[00:02:08] Spot The Vuln Solution
[00:07:25] Replay-based attack on Honda and Acura vehicles
[00:15:54] A Heap-based Buffer Overflow Bug in the MySQL InnoDB memcached Plugin [CVE-2021-2429]
[00:25:44] Vulnerability in WhatsApp could have led to data exposure of users
[00:32:26] Code execution outside the virtualized guest in bhyve [CVE-2021-29631]
[00:40:59] Your vulnerability is in another OEM!
[01:01:36] BrakTooth
[01:09:00] HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs
The DAY[0] podcast is streamed live on Twitch. -- https://www.twitch.tv/dayzerosec
Mondays at 3:00pm Eastern with an emphasis on Bug Bounties style issues.
Tuesdays at 7:00pm Eastern focusing on more low-level vulnerabilities.
The audio-only version of the podcast is available on:
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Видео 080 - Escaping the Bhyve, WhatsApp & BrakTooth [Binary Exploitation Podcast] канала DAY[0]
Комментарии отсутствуют
Информация о видео
9 сентября 2021 г. 5:00:22
01:18:18
Другие видео канала


![185 - Facebook Account Takeovers and a vBulletin RCE [Bug Bounty Podcast]](https://i.ytimg.com/vi/ref7zbeNGFo/default.jpg)
![186 - An XNU Exploit and a Chrome Heap Overflow [Binary Exploitation Podcast]](https://i.ytimg.com/vi/gNahVSDSH1M/default.jpg)
![223 - Usurping Mastodon and Broken Signature Schemes [Bug Bounty Podcast]](https://i.ytimg.com/vi/VhCxOTJkBFs/default.jpg)


![233 - Spoofing Emails, PandoraFMS, and Keycloak [Bug Bounty Podcast]](https://i.ytimg.com/vi/KuIdZ70xEhU/default.jpg)
![195 - Stealing Secrets with Security Advisories and CorePlague [Bug Bounty Podcast]](https://i.ytimg.com/vi/clm2nYgk3oI/default.jpg)
![119 - Baby Monitor Bugs, Grafana, and Twitter De-anonymization [Bug Bounty Podcast]](https://i.ytimg.com/vi/-eRzqTguyoc/default.jpg)

![212 - Attacking VirtualBox and Malicious Chess [Binary Exploitation Podcast]](https://i.ytimg.com/vi/Qytii_mpqR4/default.jpg)
![181 - Cloud Bugs and More Vulns in Galaxy App Store [Bug Bounty Podcast]](https://i.ytimg.com/vi/gvbjSpWCp1A/default.jpg)
![106 - MediaTek, Yet Another Chrome Bug, and BigSig [Binary Exploitation Podcast]](https://i.ytimg.com/vi/bjzS-eBZIFY/default.jpg)


![220 - Windows Kernel Bugs, Safari Integer Underflow, and CONSTIFY [Binary Exploitation Podcast]](https://i.ytimg.com/vi/72E2ZePCrnQ/default.jpg)
![130 - Chrome Heap OOB Access and TLStorm [Binary Exploitation Podcast]](https://i.ytimg.com/vi/fQGz7cWLAqI/default.jpg)
![082 - NETGEAR smart switches, SpookJS, & Parallels Desktop [Binary Exploitation Podcast]](https://i.ytimg.com/vi/FIYxRfk8zzU/default.jpg)

![118 - Fastly Infoleak, Samba OOB Access, and Pwning MacOS [Binary Exploitation Podcast]](https://i.ytimg.com/vi/YKU3eDChD6c/default.jpg)
