For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and reported the vulnerability.
In this episode, Guido Vranken talks about his approach to hacking, about the differences between memory safe and unsafe languages, his use of fuzz testing as a preferred tool, and how he came to discover the validation error in OpenWRT, as well as a serialization error in Cereal, and other vulnerabilities.
EP 85: The Rise Of Bots (and Bots As A Service)
EP 84: When Old Medical Devices Keep Pre-shared Keys
EP 83: Tales From The Dark Web: Ransomware, Data Extortion, and Operational Technology
EP 82: The Vulkan Files
EP 81: Hacking Visual Studio Code Extensions
EP 80: Ghost Token
EP 79: Conducting Incident Response in Costa Rica Post Conti Ransomware
EP 78: Defending Costa Rica From Conti Ransomware
EP 77: Security Chaos Engineering with Kelly Shortridge
EP 76: Hacking Medical Systems
EP 75: Hacking .Mil And Other TLD Domains (Ethically)
EP 74: Disarming Document Threats
EP 73: Hacking Human Behavior
EP 72: Tales From A Ransomware Negotiator
EP 71: The Internet As A Pen Test
EP 70: Hacking Real World Criminals Online
EP 69: Self-Healing Operating Systems
EP 68: Incident Response in the Cloud
EP 67: When The Dark Web Discovered ChatGPT
EP 66: Shattering InfoSec’s Glass Ceiling
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Black Wolf Feed (Chapo Premium Feed Bootleg)
Bannon`s War Room