In the 250th episode, we have a follow-up discussion to our "Future of Exploit Development" video from 2020. Memory safety and the impacts of modern mitigations on memory corruption are the main focus.
[binary] Exploiting VMware Workstation and the Return of CSG0-Days
[bounty] Jellyfin Exploits and TOCTOU Spellcasting
[binary] Attacking VirtualBox and Malicious Chess
[bounty] OverlayFS to Root and Parallels Desktop Escapes
[binary] TPMs and Baseband Bugs
[bounty] Bad Ordering, Free OpenAI Credits, and Goodbye Passwords?
[binary] A Timing Side-Channel for Kernel Exploitation and VR in the wake of Rust
[bounty] Git Config Injection and a Sophos Pre-Auth RCE
[binary] A Ghostscript RCE and a Windows Registry Bug
[bounty] SecurePoint UTM, Chfn, and Docker Named Pipe Vulns
[binary] Glitching the Wii-U and Integer Overflows
[bounty] Pentaho Pre-Auth RCE and Theft by CAN Injection
[binary] A SNIProxy Bug and a Samsung NPU Double Free
[bounty] Bamboozling Bing and a Curl Gotcha
[binary] 200th Episode! Integer Bugs & Synthetic Memory Protections
[bounty] Bypassing CloudTrail and Tricking GPTs
[binary] TOCTOUs in Intel SMM and Shannon Baseband Bugs
[bounty] Popping Azure Web Services and Apollo Config Bugs
[binary] An OpenBSD overflow and TPM bugs
[bounty] Stealing Secrets with Security Advisories and CorePlague
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast