This week is a shorter episode, but still some solid bugs to look at. From a full chain Chrome exploit, to a Kindle chain from remote to root and a eBPF incorrect calculation leading to OOB read/write.
The DAY[0] podcast is streamed live on Twitch every Monday afternoon at 3:pm EST -- [ Ссылка ]
The audio-only version of the podcast is available on:
-- Spotify: [ Ссылка ]
-- Apple Podcasts: [ Ссылка ]
-- Google Podcasts: [ Ссылка ]
-- Other audio platforms can be found at [ Ссылка ]
You can also join our discord: [ Ссылка ]
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
00:00:00 Introduction
00:00:41 Albicla launch clusterfuck
[ Ссылка ]
00:04:41 [NordVPN] RCE through Windows Custom Protocol on Windows client
[ Ссылка ]
00:09:00 Chaining Multiple bugs for Unauthenticated RCE in the SolarWinds Orion Platform
[ Ссылка ]
00:18:50 The Embedded YouTube Player Told Me What You Were Watching (and more)
[ Ссылка ]
00:24:27 The State of State Machines
[ Ссылка ]
[ Ссылка ]
00:34:21 KindleDrip - From Your Kindle’s Email Address to Using Your Credit Card
[ Ссылка ]
00:44:00 New campaign targeting security researchers
[ Ссылка ]
00:44:42 An Incorrect Calculation Bug in the Linux Kernel eBPF Verifier
[ Ссылка ]
00:49:17 Chat Question: What do we think of HackTheBox
[ Ссылка ]
00:53:51 Bad Pods: Kubernetes Pod Privilege Escalation
[ Ссылка ]
00:53:24 [Linux Kernel Exploitation 0x2] Controlling RIP and Escalating privileges via Stack Overflow
[ Ссылка ]
[ Ссылка ]
Ещё видео!