A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.
The podcast Day[0] is created by dayzerosec. The podcast and the artwork on this page are embedded on this page using the public podcast feed (RSS).
A special episode this week, featuring an interview with John Carse, Chief Information Security Officer (CISO) of SquareX. John speaks about his background in the security industry, grants insight into attacks on browsers, and talks about the work his team at SquareX is doing to detect and mitigate browser-based attacks.
A long episode this week, featuring an attack that can leak secrets from Gemini's Python sandbox, banks abusing private iOS APIs, and Windows new Hypervisor-enforced Paging Translation (HVPT).
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/280.html
[00:00:00] Introduction
[00:00:18] Doing the Due Diligence - Analyzing the Next.js Middleware Bypass [CVE-2025-29927]
[00:29:20] We hacked Google’s A.I Gemini and leaked its source code (at least some part)
[00:44:40] Improper Use of Private iOS APIs in some Vietnamese Banking Apps
[00:55:03] Protecting linear address translations with Hypervisor-enforced Paging Translation (HVPT)
[01:06:57] Code reuse in the age of kCET and HVCI
[01:13:02] GhidraMCP: LLM Assisted RE
[01:31:45] Emulating iOS 14 with qemu
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
API hacking and bypassing Ubuntu's user namespace restrictions feature in this week's episode, as well as a bug in CimFS for Windows and revisiting the infamous NSO group WebP bug.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/279.html
[00:00:00] Introduction
[00:00:28] Next.js and the corrupt middleware: the authorizing artifact
[00:06:15] Pwning Millions of Smart Weighing Machines with API and Hardware Hacking
[00:20:37] oss-sec: Three bypasses of Ubuntu's unprivileged user namespace restrictions
[00:32:10] CimFS: Crashing in memory, Finding SYSTEM (Kernel Edition)
[00:43:18] Blasting Past Webp
[00:47:50] We hacked Google’s A.I Gemini and leaked its source code (at least some part)
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This episode features some game exploitation in Neverwinter Nights, weaknesses in mobile implementation for PassKeys, and a bug that allows disclosure of the email addresses of YouTube creators. We also cover some research on weaknesses in Azure.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/278.html
[00:00:00] Introduction
[00:00:35] Exploiting Neverwinter Nights
[00:08:48] PassKey Account Takeover in All Mobile Browsers [CVE-2024-9956]
[00:22:51] Disclosing YouTube Creator Emails for a $20k Bounty
[00:31:58] Azure’s Weakest Link? How API Connections Spill Secrets
[00:39:02] SAML roulette: the hacker always wins
[00:40:56] Compromise of Fuse Encryption Key for Intel Security Fuses
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Discussion this week starts with the ESP32 "backdoor" drama that circled the media, with some XML-based vulnerabilities in the mix. Finally, we cap off with a post on reviving modprobe_path for Linux exploitation, and some discussion around an attack chain against China that was attributed to the NSA.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/277.html
[00:00:00] Introduction
[00:00:25] The ESP32 "backdoor" that wasn't
[00:14:26] Speedrunners are vulnerability researchers
[00:27:58] Sign in as anyone: Bypassing SAML SSO authentication with parser differentials
[00:38:47] Impossible XXE in PHP
[00:52:41] Reviving the modprobe_path Technique: Overcoming search_binary_handler() Patch
[01:04:15] Trigon: developing a deterministic kernel exploit for iOS
[01:06:43] An inside look at NSA (Equation Group) TTPs from China’s lense
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A very technical episode this week, featuring some posts on hacking the xbox 360 hypervisor as well as AMD microcode hacking.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/276.html
[00:00:00] Introduction
[00:00:15] Reversing Samsung's H-Arx Hypervisor Framework - Part 1
[00:10:34] Hacking the Xbox 360 Hypervisor Part 1: System Overview
[00:21:18] Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit
[00:30:48] Zen and the Art of Microcode Hacking
[00:41:51] A very fancy way to obtain RCE on a Solr server
[01:03:49] Cellebrite zero-day exploit used to target phone of Serbian student activist
[01:16:03] When NULL isn't null: mapping memory at 0x0 on Linux
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week's episode features a variety of vulnerabilities, including a warning on mixing up public and private keys in OpenID Connect deployments, as well as path confusion with an nginx+apache setup.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/275.html
[00:00:00] Introduction
[00:19:00] The OOB Read zi Introduced
[00:16:55] Mixing up Public and Private Keys in OpenID Connect deployments
[00:22:51] Nginx/Apache Path Confusion to Auth Bypass in PAN-OS [CVE-2025-0108]
[00:31:50] Hacking High-Profile Bug Bounty Targets: Deep Dive into a Client-Side Chain
[00:44:14] Uncovering Apple Vulnerabilities: diskarbitrationd and storagekitd Audit Part 3
[00:48:48] GigaVulnerability: readout protection bypass on GigaDevice GD32 MCUs
[00:56:57] Attempted Research in PHP Class Pollution
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
We discuss an 0day that was dropped on Parallels after 7 months of no fix from the vendor, as well as ZDI's troubles with responses to researchers and reproducing bugs. Also included are a bunch of filesystem issues, and an insanely technical linux kernel exploit chain.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/274.html
[00:00:00] Introduction
[00:00:12] Training: Attacking Hypervisors
[00:01:03] Dropping a 0 day: Parallels Desktop Repack Root Privilege Escalation
[00:24:48] From Convenience to Contagion: The Half-Day Threat and Libarchive Vulnerabilities Lurking in Windows 11
[00:30:19] Exploiting LibreOffice [CVE-2024-12425, CVE-2024-12426]
[00:46:47] Patch-Gapping the Google Container-Optimized OS for $0
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
We cover a comical saga of vulnerabilities and variants from incomplete fixes in macOS, as well as a bypass of Chrome's miraclePtr mitigation against Use-After-Frees (UAFs). We also discuss an attack that abuses COM hijacking to elevate to SYSTEM through AVG Antivirus, and a permissions issue that allows unauthorized access to DRM'd audiobooks.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/273.html
[00:00:00] Introduction
[00:00:23] Attacking Hypervisors From KVM to Mobile Security Platforms
[00:01:35] Endless Exploits: The Saga of a macOS Vulnerability Struck Nine Times
[00:11:02] The Most "Golden" Bypass of 2024
[00:44:55] Leaking the email of any YouTube user for $10,000
[01:11:52] Unmasking Cryptographic Risks: A Deep Dive into the Nym Audit w/ Nadim Kobeissi
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In this episode, we discuss the US government discloses how many 0ds were reported to vendors in a first-ever report. We also cover PortSwigger's top 10 web hacking techniques of 2024, as well as a deep dive on how kernel mode shadow stacks are implemented on Windows by Connor McGarr.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/272.html
[00:00:00] Introduction
[00:01:50] U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, Per First-Ever Report
[00:19:54] What Okta Bcrypt incident can teach us about designing better APIs
[00:40:08] Top 10 web hacking techniques of 2024
[00:55:03] Exploit Development: Investigating Kernel Mode Shadow Stacks on Windows
[01:06:11] Accidentally uncovering a seven years old vulnerability in the Linux kernel
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
On the web side, we cover a portswigger post on ways of abusing unicode mishandling to bypass firewalls and a doyensec guide to OAuth vulnerabilities. We also get into a Windows exploit for a use-after-free in the telephony service that bypasses Control Flow Guard, and a data race due to non-atomic writes in the macOS kernel.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/271.html
[00:00:00] Introduction
[00:00:22] Bypassing character blocklists with unicode overflows
[00:06:53] Common OAuth Vulnerabilities
[00:18:37] Windows Telephony Service - It's Got Some Call-ing Issues [CVE-2024-26230]
[00:32:05] TRAVERTINE (CVE-2025-24118)
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Zero Day Initiative posts their trends and observations from their threat hunting highlights of 2024, macOS has a sysctl bug, and a technique leverages CloudFlare to deanonymize users on messaging apps. PortSwigger also publishes a post on the Cookie Sandwich technique, and Subaru's weak admin panel security allows tracking and controlling other people's vehicles.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/270.html
[00:00:00] Introduction
[00:00:11] ZDI Threat Hunting 2024 - Highlights, Trends, and Challenges
[00:21:44] Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform
[00:41:54] Stealing HttpOnly cookies with the cookie sandwich technique
[00:49:06] Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week features a mix of topics, from polyglot PDF/JSON to android kernel vulnerabilities. Project Zero also publishes a post about excavating an exploit strategy from crash logs of an In-The-Wild campaign.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/269.html
[00:00:00] Introduction
[00:07:48] Attacking Hypervisors - From KVM to Mobile Security Platforms
[00:12:18] Bypassing File Upload Restrictions To Exploit Client-Side Path Traversal
[00:19:41] How an obscure PHP footgun led to RCE in Craft CMS
[00:34:44] oss-security - RSYNC: 6 vulnerabilities
[00:42:13] The Qualcomm DSP Driver - Unexpectedly Excavating an Exploit
[00:59:59] security-research/pocs/linux/kernelctf/CVE-2024-50264_lts_cos/docs/exploit.md
[01:10:35] GLibc Heap Exploitation Training
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Specter and zi discuss their winter break, cover some interesting CCC talks, and discuss the summary judgement in the WhatsApp vs. NSO Group case.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/268.html
[00:00:00] Introduction
[00:09:53] 38C3: Illegal Instructions
[00:35:38] WhatsApp v. NSO Group
[01:04:06] Vulnerability Research Highlights 2024
[01:08:45] Debugging memory corruption: Who wrote ‘2’ into my stack?!
[01:16:46] HardBreak
[01:20:14] Announcing CodeQL Community Packs
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In our last episode of 2024, we delve into some operating system bugs in both Windows and Linux, as well as some bugs that are not bugs but rather AI slop.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/267.html
[00:00:00] Introduction
[00:06:48] Buffer Overflow Risk in Curl_inet_ntop and inet_ntop4
[00:19:20] Bypassing WAFs with the phantom $Version cookie
[00:27:51] Windows Sockets: From Registered I/O to SYSTEM Privileges
[00:34:02] ksthunk.sys Integer Overflow (PE)
[00:38:20] Linux Kernel: TOCTOU in Exec System
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week's episode contains some LLM hacking and attacks on classifiers, as well as the renewal of DMA attacks with SD Express and the everlasting problems of null bytes.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/266.html
[00:00:00] Introduction
[00:00:31] Hacking 2024 by No Starch
[00:09:18] Announcing the Adaptive Prompt Injection Challenge (LLMail-Inject)
[00:14:37] Breaking Down Adversarial Machine Learning Attacks Through Red Team Challenges
[00:25:49] Null problem! Or: the dangers of an invisible byte
[00:36:32] New dog, old tricks: DaMAgeCard attack targets memory directly thru SD card reader
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A short episode this week, featuring Keyhole which abuses a logic bug in Windows Store DRM, an OAuth flow issue, and a CSRF protection bypass.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/265.html
[00:00:00] Introduction
[00:00:16] Attacking Hypervisors From KVM to Mobile Security Platforms
[00:02:30] Keyhole
[00:10:12] Drilling the redirect_uri in OAuth
[00:18:00] Cross-Site POST Requests Without a Content-Type Header
[00:24:03] New AMSI Bypss Technique Modifying CLR.DLL in Memory
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Linux userspace is still a mess and has some bad bugs in root utilities, and Vaultwarden has an interesting auth bypass attack.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/264.html
[00:00:00] Introduction
[00:00:29] LPEs in needrestart [Ubuntu]
[00:18:41] Vulnerability Disclosure: Authentication Bypass in Vaultwarden versions < 1.32.5
[00:31:50] From an Android Hook to RCE
[00:43:34] Simple macOS kernel extension fuzzing in userspace with IDA and TinyInst
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week, we dive into some changes to V8CTF, the FortiJump Higher bug in Fortinet's FortiManager, as well as some coverage instrumentation on blackbox macOS binaries via Pishi.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/263.html
[00:00:00] Introduction
[00:00:25] V8 Sandbox Bypass Rewards
[00:25:39] Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager [CVE-2024-47575]
[00:38:07] Pishi: Coverage guided macOS KEXT fuzzing.
[00:44:20] Breaking Control Flow Flattening: A Deep Technical Analysis
[00:55:10] Firefox Animation CVE-2024-9680 - Dimitri Fourny
[00:57:13] Internship Offers for the 2024-2025 Season
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Methodology is the theme of this week's episode. We cover posts about static analysis via CodeQL, as well as a novel blackbox binary querying language called QueryX. Project Zero also leverages Large Language Models to successfully find a SQLite vulnerability. Finally, we wrap up with some discussion on Hexacon and WOOT talks, with a focus on Clem1's In-The-Wild exploit chains insights via Google's Threat Analysis Group.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/262.html
[00:00:00] Introduction
[00:00:35] Discovering Hidden Vulnerabilities in Portainer with CodeQL
[00:18:12] Finding Vulnerabilities in Firmware with Static Analysis Platform QueryX
[00:28:25] From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code
[00:50:00] Hexacon2024 - Caught in the Wild, Past, Present and Future by Clem1
[01:06:34] Hexacon 2024 Videos
[01:11:34] WOOT 2024 Videos
[01:18:38] Securing the open source supply chain: The essential role of CVEs
[01:20:19] A New Era of macOS Sandbox Escapes: Diving into an Overlooked Attack Surface and Uncovering 10+ New Vulnerabilities
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In this week's episode, we talk a little bit about LLMs and how they can be used with static analysis. We also cover GitHub Security Blog's post on attacking browser extensions, as well as a somewhat controversial CyberPanel Pre-Auth RCE that was disclosed.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/261.html
[00:00:00] Introduction
[00:01:56] Autonomous Discovery of Critical Zero-Days
[00:14:43] Attacking browser extensions
[00:25:26] What Are My OPTIONS? CyberPanel v2.3.6 pre-auth RCE
[00:52:15] Security research on Private Cloud Compute
[01:01:02] Bluetooth Low Energy GATT Fuzzing
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In this week's episode, Specter recaps his experiences at Hardwear.IO and a PS5 hypervisor exploit chain presented there. We also cover some of the recently released DEF CON 32 talks. After the conference talk, we get into some filesystem exploit tricks and how arbitrary file write can be taken to code execution in read-only environments.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/260.html
[00:00:00] Introduction
[00:00:27] Hardwear.io NL 2024
[00:14:27] Byepervisor - Breaking the PS5 Hypervisor Security
[00:26:38] DEF CON 32 Main Stage Talks
[00:51:16] The Missing Guide to Filesystem Security
[01:00:51] Why Code Security Matters - Even in Hardened Environments
[01:09:12] How I Defeated An MMO Game Hack Author
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In this week's episode, we cover the fiasco of a vulnerability in Zendesk that could allow intrusion into multiple fortune 500 companies. We also discuss a project zero blogpost that talks about fuzzing Dav1d and the challenges of fuzzing, as well as rooting Linux via EMFI with a lighter.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/259.html
[00:00:00] Introduction
[00:00:57] 1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies
[00:27:10] Effective Fuzzing: A Dav1d Case Study
[00:40:15] Can You Get Root With Only a Cigarette Lighter?
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In our summer recap, we discuss Phrack's latest issue and talks from the new Off-by-One conference. We also cover some interesting bugs, such as a factorio lua RCE and another RCE via iconv.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/258.html
[00:00:00] Introduction
[00:01:06] Getting Started with Exploit Development
[00:14:07] Bytecode Breakdown: Unraveling Factorio's Lua Security Flaws
[00:24:35] Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)
[00:43:29] Off-by-One Conference 2024
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In this week's episode, we cover an attack utilizing HSTS for exploiting Android WebViews and abusing YouTube embeds in Google Slides for clickjacking. We also talk about the infamous CUPS attack, and the nuances that seem to be left behind in much of the discussion around it.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/257.html
[00:00:00] Introduction
[00:01:30] Exploiting Android Client WebViews with Help from HSTS
[00:09:08] Using YouTube to steal your files
[00:18:43] Attacking UNIX Systems via CUPS, Part I
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In this week's episode, we discuss Microsoft's summit with vendors on their intention to lock down the Windows kernel from endpoint security drivers and possibly anti-cheats. We also talk cryptography and about the problems of nonce reuse.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/256.html
[00:00:00] Introduction
[00:01:12] Friends don’t let friends reuse nonces
[00:13:22] Serious Cryptography, 2nd Edition
[00:14:30] Taking steps that drive resiliency and security for Windows customers
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
We are back and testing out a new episode format focusing more on discussion than summaries. We start talking a bit about the value of learning hacking by iterating on the same exploit and challenging yourself as a means of practicing the creative parts of exploitation. Then we dive into the recent Intel SGX fuse key leak, talk a bit about what it means, how it happened.
We are seeking feedback on this format. Particularly interested in those of you with more of a bug bounty or higher-level focus if an episode like this would still be appealing? If you want to share any feedback feel free to DM us (@__zi or @specterdev) or email us at media [at] dayzerosec.com
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/255.html
[00:00:00] Introduction
[00:04:55] Exploiting CVE-2024-20017 4 different ways
[00:22:26] Intel SGX Fuse Keys Extracted
[00:51:01] Introducing the URL validation bypass cheat sheet
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Memory corruption is a difficult problem to solve, but many such as CISA are pushing for moves to memory safe languages. How viable is rewriting compared to mitigating?
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/254.html
[00:00:00] Introduction
[00:01:12] Clarifying Scope & Short/Long Term
[00:04:28] Mitigations
[00:15:37] Safe Languages Are Falliable
[00:21:20] Weaknesses & Evolution of Mitigations
[00:29:19] Rewriting and the Iterative Process
[00:34:55] The Rewriting Scalability Argument
[00:41:43] System vs App Bugs
[00:48:46] Mitigations & Rewriting Are Not Mutually Exclusive
[00:50:25] Corporate vs Open Source
[00:54:12] Generational Change
[00:56:18] Conclusion
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Change is in the air for the DAY[0] podcast! In this episode, we go into some behind the scenes info on the history of the podcast, how it's evolved, and what our plans are for the future.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/253.html
[00:00:00] Introduction [00:01:30] Early days of the DAY[0] podcast [00:14:10] Split into bounty and binary episodes [00:21:50] Novelty focus on topic selection [00:30:47] Difficulties with the current format [00:40:18] Change [00:48:02] New direction for content [00:57:42] Conclusions & Feedback
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Bit of a lighter episode this week with a Linux Kernel ASLR bypass and a clever exploit to RCE FortiGate SSL VPN.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/252.html
[00:00:00] Introduction
[00:00:29] KASLR bypass in privilege-less containers
[00:13:13] Two Bytes is Plenty: FortiGate RCE with CVE-2024-21762
[00:19:32] Making Mojo Exploits More Difficult
[00:22:57] Robots Dream of Root Shells
[00:27:02] Gaining kernel code execution on an MTE-enabled Pixel 8
[00:28:23] SMM isolation - Security policy reporting (ISSR)
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In this week's bounty episode, an attack takes an XSS to RCE on Mailspring, a simple MFA bypass is covered, and a .NET CRLF injection is detailed in its FTP functionality.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/251.html
[00:00:00] Introduction
[00:00:20] Making Desync attacks easy with TRACE
[00:16:01] Reply to calc: The Attack Chain to Compromise Mailspring
[00:35:29] $600 Simple MFA Bypass with GraphQL
[00:38:38] Microsoft .NET CRLF Injection Arbitrary File Write/Deletion Vulnerability [CVE-2023-36049]
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In the 250th episode, we have a follow-up discussion to our "Future of Exploit Development" video from 2020. Memory safety and the impacts of modern mitigations on memory corruption are the main focus.
In this episode we have an libXPC root privilege escalation, a run-as debuggability check bypass in Android, and digital lockpicking on smart locks.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/249.html
[00:00:00] Introduction
[00:00:21] Progress OpenEdge Authentication Bypass Deep-Dive [CVE-2024-1403]
[00:05:19] xpcroleaccountd Root Privilege Escalation [CVE-2023-42942]
[00:10:50] Bypassing the “run-as” debuggability check on Android via newline injection
[00:18:09] Say Friend and Enter: Digitally lockpicking an advanced smart lock (Part 2: discovered vulnerabilities)
[00:43:06] Using form hijacking to bypass CSP
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In this week's binary episode, Binary Ninja Free releases along with Binja 4.0, automated infoleak exploit generation for the Linux kernel is explored, and Nintendo sues Yuzu.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/248.html
[00:00:00] Introduction
[00:00:31] Binary Ninja Free
[00:10:25] K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel
[00:19:53] Glitching in 3D: Low Cost EMFI Attacks
[00:22:08] Nintendo vs. Yuzu
[00:38:32] Finding Gadgets for CPU Side-Channels with Static Analysis Tools
[00:40:12] ThinkstScapes Research Roundup - Q4 - 2023
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A shorter episode this week, featuring some vulnerabilities impacting Google's AI and a SAML auth bypass.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/247.html
[00:00:00] Introduction
[00:00:31] We Hacked Google A.I. for $50,000
[00:17:26] SAML authentication bypass vulnerability in RobotsAndPencils/go-saml [CVE-2023-48703]
[00:22:17] Exploiting CSP Wildcards for Google Domains
[00:26:11] ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
VirtualBox has a very buggy driver, PostgreSQL has an Out of Bounds Access, and lifetime issues are demonstrated in Rust in "safe" code.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/246.html
[00:00:00] Introduction
[00:00:22] cve-rs
[00:18:28] Oracle VM VirtualBox: Intra-Object Out-Of-Bounds Write in virtioNetR3CtrlVlan
[00:32:30] PostgreSQL: Array Set Element Memory Corruption
[00:35:06] Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution Vulnerability
[00:37:15] Continuously fuzzing Python C extensions
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week's episode features a cache deception issue, Joomla inherits a PHP bug, and a DOM clobbering exploit. Also covered is a race condition in Chrome's extension API published by project zero.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/245.html
[00:00:00] Introduction
[00:00:21] Cache Deception Without Path Confusion
[00:07:15] Hello Lucee! Let us hack Apple again?
[00:14:41] Joomla: PHP Bug Introduces Multiple XSS Vulnerabilities
[00:26:37] Go Go XSS Gadgets: Chaining a DOM Clobbering Exploit in the Wild
[00:38:23] chrome.pageCapture.saveAsMHTML() extension API can be used on blocked origins due to racy access check
[00:42:28] 🎮 Diving Back into Games-related Bugs!
[00:44:43] Exploiting Empire C2 Framework
[00:46:19] iMessage with PQ3: The new state of the art in quantum-secure messaging at scale
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Linux becomes a CNA and takes a stance on managing CVEs for themselves, and underutilized fuzzing strategies are discussed.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/244.html
[00:00:00] Introduction
[00:00:14] What to do about CVE numbers
- The first article we bring up is the 2019 LWN article able Greg's talk back then. The topic itself is a more recent change actually moving forward.
[00:26:50] Bug - Double free on `dcm_dataset_insert` · Issue #82 · ImagingDataCommons/libdicom
[00:31:48] Buffer Overflow Vulnerabilities in KiTTY Start Duplicated Session Hostname (CVE-2024-25003) & Username (CVE-2024-25004) Variables
[00:38:35] Underutilized Fuzzing Strategies for Modern Software Testing
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In this bounty episode, some straightforward bugs were disclosed in GhostCMS and ClamAV, and Portswigger publishes their top 10 list of web hacking techniques from 2023.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/243.html
[00:00:00] Introduction
[00:02:15] Ghost CMS Stored XSS Leading to Owner Takeover [CVE-2024-23724]
[00:16:07] ClamAV Not So Calm [CVE-2024-20328]
[00:21:00] Top 10 web hacking techniques of 2023
[00:44:46] Hacking a Smart Home Device
[00:48:15] Cloud cryptography demystified: Amazon Web Services
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Google makes some changes to their kCTF competition, and a few kernel bugs shake out of the LogMeIn and wlan VFS drivers.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/242.html
[00:00:00] Introduction
[00:00:29] Netfilter Tables Removed from kCTF
[00:20:23] LogMeIn / GoTo LMIInfo.sys Handle Duplication
[00:27:20] Several wlan VFS read handlers don't check buffer size leading to userland memory corruption
[00:32:35] International Journal of Proof-of-Concept or Get The Fuck Out (PoC||GTFO) - 0x22
[00:34:15] Exploring AMD Platform Secure Boot
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
DEF CON moves venues, the Canadian government moves to ban Flipper Zero, and some XSS issues affect Microsoft Whiteboard and Meta's Excalidraw.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/241.html
[00:00:00] Introduction
[00:00:33] DEF CON was canceled.
[00:16:42] Federal action on combatting auto theft
[00:39:03] Jenkins Arbitrary File Leak Vulnerability, CVE-2024-23897, Can Lead To RCE
[00:43:27] Back to the (Clip)board with Microsoft Whiteboard and Excalidraw in Meta (CVE-2023-26140)
[00:52:26] SSRF on a Headless Browser Becomes Critical!
[00:59:04] ChatGPT Account Takeover - Wildcard Web Cache Deception
[01:05:14] Differential testing and fuzzing of HTTP servers and proxies
[01:10:14] Hunting for Vulnerabilities that are ignored by most of the Bug Bounty Hunters
[01:19:38] Analyzing AI Application Threat Models
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Libfuzzer goes into maintenance-only mode and syslog vulnerabilities plague some vendors in this week's episode.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/240.html
[00:00:00] Introduction
[00:00:20] LibFuzzer in Maintainence-only Mode
[00:11:41] Heap-based buffer overflow in the glibc's syslog() [CVE-2023-6246]
[00:26:33] Hunting for ~~Un~~authenticated n-days in Asus Routers
[00:34:44] Inside the LogoFAIL PoC: From Integer Overflow to Arbitrary Code Execution
[00:35:51] Chaos Communication Congress (37C3) recap
[00:36:51] GitHub - google/oss-fuzz-gen: LLM powered fuzzing via OSS-Fuzz.
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week we have a crazy crypto fail where some Android devices had updates signed by publicly available private keys, as well as some Docker container escapes.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/239.html
[00:00:00] Introduction
[00:00:22] Missing signs: how several brands forgot to secure a key piece of Android
[00:13:37] ModSecurity: Path Confusion and really easy bypass on v2 and v3
[00:21:24] runc process.cwd & leaked fds container breakout [CVE-2024-21626]
[00:24:23] Buildkit GRPC SecurityMode Privilege Check [CVE-2024-23653]
[00:27:49] Jumpserver Preauth RCE Exploit Chain
[00:43:49] 500$: MFA bypass By Race Condition
[00:49:52] HTTP Downgrade attacks with SmuggleFuzz
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week's binary episode features a range of topics from discussion on Pwn2Own's first automotive competition to an insane bug that broke ASLR on various Linux systems. At the lower level, we also have some bugs in UEFI, including one that can be used to bypass Windows Hypervisor Code Integrity mitigation.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/238.html
[00:00:00] Introduction
[00:02:40]
37C3: Unlocked
- media.ccc.de
[00:08:15] Zero Day Initiative — Pwn2Own Automotive 2024 - Day One Results
[00:16:35] ASLRn’t: How memory alignment broke library ASLR
[00:22:47] Unleashing ksmbd: remote exploitation of the Linux kernel (ZDI-23-979, ZDI-23-980)
[00:26:33] PixieFail: Nine vulnerabilities in Tianocore's EDK II IPv6 network stack.
[00:31:10] Hunting down the HVCI bug in UEFI
[00:35:51] A Deep Dive into V8 Sandbox Escape Technique Used in In-The-Wild Exploit
[00:37:32] Google Chrome V8 CVE-2024-0517 Out-of-Bounds Write Code Execution - Exodus Intelligence
[00:38:38] OffSec EXP-401 Advanced Windows Exploitation (AWE) - Course Review
[00:44:56] Dumping GBA ROMs from Sound
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A packed episode this week as we cover recent vulnerabilities from the last two weeks, including some IDORs, auth bypasses, and a HackerOne bug. Some fun attacks such as a resurface of IDN Homograph Attacks and timing attacks also appear.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/237.html
[00:00:00] Introduction
[00:02:59]
37C3: Unlocked
- media.ccc.de
[00:09:00] Ivanti's Pulse Connect Secure Auth Bypass and RCE
[00:19:47] [HackerOne] View Titles of Private Reports with pending email invitation
[00:23:58] 1 Program, 4 Business Logic Bugs and Cashing in 2300$.
[00:33:32] Global site selector authentication bypass
[00:42:55] IDN Homograph Attack - Reborn of the Rare Case
[00:50:53] PII Disclosure At `theperfumeshop.com/register/forOrder`
[00:54:40] [darkhttpd] timing attack and local leak of HTTP basic auth credentials
[01:02:42] Ransacking your password reset tokens
[01:08:11] Worse than SolarWinds: Three Steps to Hack Blockchains, GitHub, and ML through GitHub Actions
[01:10:41] Crypto Gotchas!
[01:13:37] Web LLM attacks
[01:15:13] Improving LLM Security Against Prompt Injection
[01:16:17] Sys:All: How A Simple Loophole in Google Kubernetes Engine Puts Clusters at Risk of Compromise
[01:17:37] Kubernetes Scheduling And Secure Design
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A bit of a game special this week, with a Counter-Strike: Global Offensive vulnerability and an exploit for Factorio. We also have a Linux kernel bug and a Chromecast secure-boot bypass with some hardware hacking mixed in.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/236.html
[00:00:00] Introduction
[00:00:25] Exploring Counter-Strike: Global Offensive Attack Surface
[00:26:22] Exploiting a Factorio Buffer Overflow
[00:31:46] io_uring: __io_uaddr_map() handles multi-page region dangerously
[00:39:25] Chromecast with Google TV (1080P) Secure-Boot Bypass
[00:51:58] exploits.club
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A short bounty episode featuring some logical bugs in Apache OFBiz, a GitLab Account Takeover, and an unauthenticated RCE in Adobe Coldfusion.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/235.html
[00:00:00] Introduction
[00:00:20] SonicWall Discovers Critical Apache OFBiz Zero-day
[00:11:40] [GitLab] Account Takeover via password reset without user interactions
[00:24:05] Unauthenticated RCE in Adobe Coldfusion [CVE-2023-26360]
[00:35:08] No new iPhone? No secure iOS: Looking at an unfixed iOS vulnerability
[00:36:45] How we made $120k bug bounty in a year with good automation
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week's highly technical episode has discussion around the exploitation of a libwebp vulnerability we covered previously, memory tagging (MTE) implementation with common allocators, and an insane iPhone exploit chain that targeted researchers.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/234.html
[00:00:00] Introduction
[00:02:35] PagedOut Issue 3
[00:05:14] GPSd NTRIP Stream Parsing access violation vulnerability
[00:08:25] Exploiting the libwebp Vulnerability, Part 1: Playing with Huffman Code
[00:30:01] Strengthening the Shield: MTE in Heap Allocators
[00:37:40] Operation Triangulation - What you get when you attack iPhones of Researchers
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Kicking off 2024 with a longer episode as we talk about some auditing desktop applications (in the context of some bad reports to Edge). Then we've got a couple fun issues with a client-side path traversal, and a information disclosure due to a HTTP 307 redirect. A bunch of issues in PandoraFSM, and finally some research about parser differentials in SMTP leading to SMTP smuggling (for effective email spoofing).
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/233.html
[00:00:00] Introduction
[00:10:25] Browser Security Bugs that Aren’t - #1: Local Attacks
[00:22:10] The power of Client-Side Path Traversal: How I found and escalated 2 bugs through “../”
[00:32:30] instipod DuoUniversalKeycloakAuthenticator challenge information disclosure vulnerability
[00:38:25] Technical Advisory – Multiple Vulnerabilities in PandoraFMS Enterprise
[00:45:07] SMTP Smuggling - Spoofing E-Mails Worldwide
[01:16:20] Catching OpenSSL misuse using CodeQL
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A bit of a rambling episode to finish off 2023, we talk about some Linux kernel exploitation research (RetSpill) then get into several vulnerabilities. A type confusion in QNAP QTS5, a JavaScriptCore bug in Safari, and several issues in Steam's Remote Play protocol.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/232.html
[00:00:00] Introduction
[00:02:00] RetSpill - Igniting User-Controlled Data to Burn Away Linux Kernel Protections
[00:12:23] QNAP QTS5 – /usr/lib/libqcloud.so JSON parsing leads to RCE
[00:19:53] Safari, Hold Still for NaN Minutes!
[00:31:00] Achieving Remote Code Execution in Steam: a journey into the Remote Play protocol
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A mix of issues this week, not traditionally bounty topics, but there are some lessons that can be applied. First is a feature, turned vulnerability in VS Code which takes a look at just abusing intentional functionality. Several XOS bugs with a web-console. A Sonos Era 100 jailbreak which involves causing a particular call to fail, a common bug path we've seen before, and some discussion about doing fast DNS rebinding attacks against Chrome and Safari.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/231.html
[00:00:00] Introduction
[00:01:00] It’s not a Feature, It’s a Vulnerability
[00:13:40] Multiple Vulnerabilities In Extreme Networks ExtremeXOS
[00:24:06] Shooting Yourself in the .flags – Jailbreaking the Sonos Era 100
[00:30:08] Tricks for Reliable Split-Second DNS Rebinding in Chrome and Safari
[00:46:02] Apache Struts2 文件上传漏洞分析(CVE-2023-50164) - 先知社区
[00:48:49] Blind CSS Exfiltration: exfiltrate unknown web pages
[00:51:11] Finding that one weird endpoint, with Bambdas
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A Samsung special this week, starting off with two Samsung specific vulnerabilities, one in the baseband chip for code execution. And a stack based overflow in the RILD service handler parsing IPC calls from the baseband chip for a denial of service. Lastly a Mali GPU driver use-after-free. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/230.html [00:00:00] Introduction [00:00:27] Humble Tech Book Bundle: Hacking 2023 by No Starch [00:08:15] CVE-2023-21517: Samsung Baseband LTE ESM TFT Heap Buffer Overflow [00:18:10] CVE-2023-30644: Samsung RIL Stack Buffer Overflow [00:24:58] Arm Mali r44p0: UAF by freeing waitqueue with elements on it [00:31:55] A Detailed Look at Pwn2Own Automotive EV Charger Hardware The DAY[0] Podcast episodes are streamed live on Twitch twice a week: -- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities -- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits. We are also available on the usual podcast platforms: -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063 -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz -- Other audio platforms can be found at https://anchor.fm/dayzerosec You can also join our discord: https://discord.gg/daTxTK9
This week brings up a pretty solid variety of issues. Starting off with some cookie smuggling (and other cookie attacks) which presents some interesting research I hadn't really looked for before that has some potential. Then an AI alignment evasion to leak training data. Not the most interesting attack but it appears to open up some other ideas for further research. A MacOS desktop issue (for a $30k bounty), and some home assistant issues.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/229.html
[00:00:00] Introduction
[00:00:25] Humble Tech Book Bundle: Hacking 2023 by No Starch
[00:06:58] Cookie Bugs - Smuggling & Injection
[00:17:21] Extracting Training Data from ChatGPT
[00:32:22] lateralus (CVE-2023-32407) - a macOS TCC bypass
[00:37:35] Securing our home labs: Home Assistant code review
[00:45:16] TRAP; RESET; POISON; - Taking over a country Kaminsky style
[00:47:04] Exploiting XPath Injection Weaknesses
[00:47:42] Deep dive into the new Amazon EKS Pod Identity feature
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week kicks off with a a V8 misoptimization leading to out-of-bounds access, an unprotected MSR in Microsoft's Hypervisor allowing corruption of Hypervisor code. We also take a quick look at a 2021 CVE with an integer underflow leading to an overflow in the Windows Kernel low-fragmentation heap, and finally an interesting information leak due to the kernel not clearing a sensitive register.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/228.html
[00:00:00] Introduction
[00:00:56] Spot the Vuln - Beyond the Grave
[00:04:00] Chrome V8 Hole Exploit
[00:15:57] How I found Microsoft Hypervisor bugs as a by-product of learning
[00:33:13] Exploitation of a kernel pool overflow from a restrictive chunk size [CVE-2021-31969]
[00:44:13] That's FAR-out, Man
[00:47:38] Money Tree
[00:50:21] How to voltage fault injection
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week we've got a few relatively simple bugs to talk about along with a discussion about auditing and manually analysis for vulnerabilities.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/227.html
[00:00:00] Introduction
[00:00:23] Introducing the Microsoft Defender Bounty Program
[00:04:26] Tapping into a telecommunications company’s office cameras
[00:07:47] CrushFTP Critical Vulnerability CVE-2023-43177 Unauthenticated Remote Code Execution
[00:17:22] [Kubernetes] Ingress nginx annotation injection causes arbitrary command execution
[00:24:38] Testing for audits: there is no spoon
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Last week we brought you several Windows bugs, this week we are talking Linux kernel vulnerabilities and exploitation. We start off looking at a weird but cool CPU bug, Reptar, then we get into nftables, io_uring, and talk about a newer mitigations hitting Linux 6.6 that randomizes the caches allocations end up in.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/226.html
[00:00:00] Introduction
[00:00:21] Reptar
[00:11:56] One shot, Triple kill: Pwning all three Google kernelCTF instances with a single 1-day Linux vulnerability
[00:31:09] Conquering the memory through io_uring - Analysis of CVE-2023-2598
[00:38:00] Exploring Linux's New Random Kmalloc Caches
[00:48:09] ThinkstScapes Quarterly - 2023.Q3
[00:49:34] CacheWarp
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week has an interesting mix of issues, starting with a pretty standard template inject. Then we get into a Windows desktop issue, a TOCTOU in how the Mark-of-the-Web would be applied to file extracted from an archive, a privilege escalation from a Chrome extension, and a bit of a different spin on what you could do with a prompt injection.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/225.html
[00:00:00] Introduction
[00:00:26] Magento Template Engine, a story of CVE-2022-24086
[00:06:57] In-Depth Analysis of July 2023 Exploit Chain Featuring CVE-2023-36884 and CVE-2023-36584
[00:24:50] Google Cloud Vertex AI - Data Exfiltration Vulnerability Fixed in Generative AI Studio
[00:30:40] Uncovering a crazy privilege escalation from Chrome extensions
[00:47:49] Content Providers and the potential weak spots they can have
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
We've got a few Windows bugs this week, but first a fun off-by-one null-byte write. Then we jump into a containerized registry escape, a browser escape with a very simple bug buried deep in the browser, and a kernel bug.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/224.html
[00:00:00] Introduction
[00:00:20] Spot the Vuln - Minimax
[00:05:00] Weston Embedded uC-HTTP HTTP Server Host header parsing memory corruption vulnerability
[00:14:49] Windows Kernel containerized registry escape through integer overflows in VrpBuildKeyPath and other weaknesses
[00:20:04] Escaping the sandbox: A bug that speaks for itself
[00:37:07] Exploiting Windows Kernel Wild Copy With User Fault Handling [CVE-2023–28218]
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Just a few issues this week, a Mastodon normalization issue leading to the potential to impersonate another account. Then we have a more complex chain starting again with a normalization leading to a fairly interesting request smuggling (CL.0 via malformed content-type header) and cache poisoning to leak credentials. Finally a crypto issue with a signature not actually being a signature.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/223.html
[00:00:00] Introduction
[00:00:23] Usurping Mastodon instances - mastodon.so/cial [CVE-2023-42451]
[00:09:59] From Akamai to F5 to NTLM... with love.
[00:33:36] Our Pwn2Own journey against time and randomness (part 2)
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
As memory tagging (MTE) finally comes to a consumer device, we talk about how it may impact vulnerability research and exploit development going forward. Then we get into a few vulnerabilities including a DNS response parsing bug on the Wii U, an Adobe Acrobat bug that was exploited by a North Korean APT, and a CPU bug (iTLB Multihit).
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/222.html
[00:00:00] Introduction
[00:00:23] Hexacon 2023 Talks
[00:02:48] First handset with MTE on the market
[00:24:15] Exploiting DNS response parsing on the Wii U
[00:33:11] Adobe Acrobat PDF Reader RCE when processing TTF fonts [CVE-2023-26369
[00:46:18] iTLB multihit
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Kicking off the week with a bit of Pwn2Own drama, then taking a look at an OAuth attack against Grammarly and a couple other sites, a fun little polyglot file based attack, and Citrix Bleed, a snprintf information disclosure vulnerability on the web.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/221.html
[00:00:00] Introduction
[00:01:24] Wyze Cam v3 - Pwn2Own Drama
[00:17:57] Oh-Auth - Abusing OAuth to take over millions of accounts
[00:30:55] Exploiting Healthcare Servers with Polyglot Files [CVE-2023-33466]
[00:41:06] Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
[00:49:25] Hacking a Silent Disco
[00:50:43] DOM-based race condition: racing in the browser for fun
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Diving right into some binary exploitation issues this week. Starting wtih a look at a rare sort of curl vulnerability where a malicious server could compromise a curl user. Then we take a look at a pretty straight-forward type confusion in Windows kernel code, and an integer underflow in Safari with some questionable exploitation. Ending the episode with some thoughts on how impactful grsecurity's "constify" mitigation could be.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/220.html
[00:00:00] Introduction
[00:00:14] How I made a heap overflow in curl
[00:17:32] Critically close to zero (day): Exploiting Microsoft Kernel streaming service
[00:30:34] Story of an innocent Apple Safari copyWithin gone (way) outside [CVE-2023-38600]
[00:38:10] CONSTIFY: Fast Defenses for New Exploits
[00:46:53] An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit
[00:47:40] Getting RCE in Chrome with incomplete object initialization in the Maglev compiler
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
We've got a mix of topics this week, started with a bit of discussion around the recent Rapid Reset denial of service attack, before diving into a few vulnerabilities. A Node "permissions" module escape due to having a fail-open condition when unexpected but supported types are passed in. Then we talk about some common AWS Cognito issues, a fun little privilege escalation in Confluence, and a log injection bug leading to RCE.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/219.html
[00:00:00] Introduction
[00:00:15] HTTP/2 Rapid Reset Attack [CVE-2023-44487]
[00:04:35] [Node] Path traversal through path stored in Uint8Array
[00:09:44] Attacking AWS Cognito with Pacu
[00:14:33] Privilege Escalation Vulnerability in Confluence Data Center and Server [CVE-2023-22515]
[00:21:15] Not Your Stdout Bug - RCE in Cosmos SDK
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
Some complex and confusing vulnerabilities as we talk about the recent WebP 0day and the complexities of huffman coding. A data-only exploit to escape a kCTF container, the glibc LPE LOONY_TUNABLES, and a Chrome TurboFan RCE.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/218.html
[00:00:00] Introduction
[00:00:40] Expanding our exploit reward program to Chrome and Cloud
[00:06:10] The WebP 0day
- We do somewhat downplay this issue due to the difficulty of exploiting it. But to be clear, it was exploited in the wild on Apple devices, so it exploitable. We're more downplaying the panic that came up around it. It is still a serious issue that should be patched.
[00:34:00] Escaping the Google kCTF Container with a Data-Only Exploit
[00:44:49] Local Privilege Escalation in the glibc's ld.so [CVE-2023-4911]
[01:01:27] Getting RCE in Chrome with incorrect side effect in the JIT compiler
[01:08:03] Behind the Shield: Unmasking Scudo's Defenses
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week we've got some fun issues, including a WinRAR processing bug that results in code execution due (imo) to a filename adjustment when extracting that isn't performed consistently. A MyBB admin-panel RCE, fairly privileged bug but I think the bug pattern could appear elsewhere and is something to watch out for, And several silly issues in a "next-gen" firewall, including source disclosures and RCEs from the login page.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/217.html
[00:00:00] Introduction
[00:01:17] Analysis of CVE-2023-38831 Zero-Day vulnerability in WinRAR
[00:13:32] Yet More Unauth Remote Command Execution Vulns in Firewalls
[00:29:02] MyBB Admin Panel RCE [CVE-2023-41362]
[00:44:55] How to build custom scanners for web security research automation
[00:46:33] Exploiting HTTP Parsers Inconsistencies
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A binary summer-recap episode, looking at some vulnerabilities and research put out over the summer. Talking about what TPM really offers when it comes to full-disk encryption, some thoughts on AI in the fuzzing loop. Then into some cool bugs, kicking off with some ARM Memory Tagging Extension vulnerabilities, a `-fstack-protector` implementation failure and bypass, and then a look at a Android exploit that was found in-the-wild.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/216.html
[00:00:00] Introduction
[00:01:50] Spot the Vuln - Only One Domain
[00:04:46] AI-Powered Fuzzing: Breaking the Bug Hunting Barrier
[00:15:00] Summary: MTE As Implemented
[00:38:21] TPM provides zero practical security
[00:47:30] CVE-2023-4039: GCC’s -fstack-protector fails to guard dynamic stack allocations on ARM64
[00:55:30] Analyzing a Modern In-the-wild Android Exploit
[01:07:31] Various Vulnerabilities in Huawei Trustlets
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
We are back, and talking about our summer with a lengthy discussion about our DEF CON experiences before getting into some favorite issues from the summer. Including a neat twist on a PHP security feature that might be using in your bug bounty chains. A look at classic crypto issue (unauthenticated encrypted blobs), and an easily missed caching issue.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/215.html
[00:00:00] Introduction
[00:02:15] Summer Recap - HardwearIO
[00:11:51] Summer Recap - DEF CON
[00:49:20] CVE-2020-19909 is everything that is wrong with CVEs
[00:58:40] PHP servers drop any header if the header has "\r" [@OctagonNetworks]
[01:03:10] Encrypted Doesn't Mean Authenticated: ShareFile RCE [CVE-2023-24489]
[01:11:40] How Private Cache Can Lead to Mass Account Takeover
[01:15:20] From Terminal Output to Arbitrary Remote Code Execution
[01:16:37] Mashing Enter to bypass full disk encryption with TPM, Clevis, dracut and systemd
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
#BugBounty #BugHunting #InfoSec #CyberSec #Podcast
Continue? (y/N) n
2023/09/26 00:57:09 [1] Set Start Time and Offset
2023/09/26 00:57:09 [2] Download and Convert Episode
2023/09/26 00:57:09 [3] Youtube Stuff
2023/09/26 00:57:09 [4] Print Episode
2023/09/26 00:57:09 [5] Create Blog Post
Selection: 4
2023/09/26 00:57:11 215 - DEF CON, HardwearIO, Broken Caching, and Dropping Headers [Bug Bounty Podcast]
[bounty] DEF CON, HardwearIO, Broken Caching, and Dropping Headers
============================================
We are back, and talking about our summer with a lengthy discussion about our DEF CON experiences before getting into some favorite issues from the summer. Including a neat twist on a PHP security feature that might be using in your bug bounty chains. A look at classic crypto issue (unauthenticated encrypted blobs), and an easily missed caching issue.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/215.html
[00:00:00] Introduction
[00:02:15] Summer Recap - HardwearIO
[00:11:51] Summer Recap - DEF CON
[00:49:20] CVE-2020-19909 is everything that is wrong with CVEs
[00:58:40] PHP servers drop any header if the header has "\r" [@OctagonNetworks]
[01:03:10] Encrypted Doesn't Mean Authenticated: ShareFile RCE [CVE-2023-24489]
[01:11:40] How Private Cache Can Lead to Mass Account Takeover
[01:15:20] From Terminal Output to Arbitrary Remote Code Execution
[01:16:37] Mashing Enter to bypass full disk encryption with TPM, Clevis, dracut and systemd
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week we've got a handful of low-level vulns, VM-escape, Windows EoP, and a single IPv6 packet leading to a kernel panic/denial of service, and one higher-level issue with a bug chain in CS:GO.
This is our final episode until September 25th as we will be heading off on our regular summer break.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/214.html
[00:00:00] Introduction
[00:01:12] Spot the Vuln - Reference Check
[00:06:56] Exploiting VMware Workstation at Pwn2Own Vancouver [CVE-2023-20869/20870]
[00:17:44] CS:GO: From Zero to 0-day
[00:30:27] CVE-2022-41073: Windows Activation Contexts EoP
[00:38:37] Linux IPv6 Route of Death 0day
[00:46:36] Google Chrome V8 ArrayShift Race Condition Remote Code Execution
[00:47:46] Specter Will Give Hardwear.IO PS5 Talk
[00:49:11] Resources while we are on bread
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Another bug bounty podcast, another set of vulnerabilities. Starting off with a desktop info-disclosure in KeePass2 that discloses master passwords to attackers (with a high-level of access). A couple Jellyfin bugs resulting in an RCE chain, and a pretty classic crypto issue that allowed for renting luxury cars for extremely cheap.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/213.html
[00:00:00] Introduction
[00:02:48] KeePass2 Password Disclosure
[00:10:10] Peanut Butter Jellyfin Time
[00:19:14] Abusing Time-Of-Check Time-Of-Use (TOCTOU) Race Condition Vulnerabilities in Games, Harry Potter Style
[00:22:19] Discovering a Hidden Security Loophole: Rent luxury Cars for a Single Dollar
[00:27:00] Bug bounties are broken – the story of “i915” bug, ChromeOS + Intel bounty programs, and beyond
[00:35:28] Resources while we are on break
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week we we've got a neat little printer corruption, a probably unexploitable stockfish bug, though we speculate about exploitation a bit. Then into a VirtualBox escape bug, and an Andreno "vulnerability".
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/212.html
[00:00:00] Introduction
[00:01:31] Spot the Vuln - To Upload or Not To Upload
[00:05:25] The printer goes brrrrr, again!
[00:09:34] [Stockfish] Increase MAX_MOVES to prevent buffer overflow and stack corruption
[00:27:53] Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991
[00:37:09] Qualcomm Adreno/KGSL: secure buffers are addressable by all GPU users
[00:43:37] RET2ASLR - Leaking ASLR from return instructions
[00:46:13] Apple Fails to Fully Reboot iOS Simulator Copyright Case
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
More bug bounty style bugs, but you'd be forgiven reading that title thinking we had a low-level focus this episode. We got some awesome bugs this week though from tricking Dependabot and abusing placeholder values, an IIS auth bypass. Ending off with a kernel bug (OverlayFS) and a VM escape (Parallels Desktop)
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/211.html
[00:00:00] Introduction
[00:00:28] Dependabot Confusion: Gaining Access to Private GitHub Repositories using Dependabot
[00:12:39] Placeholder for Dayzzz: Abusing placeholders to extract customer informations
[00:19:40] Bypass IIS Authorisation with this One Weird Trick - Three RCEs and Two Auth Bypasses in Sitecore 9.3
[00:33:44] PwnAssistant - Controlling /home's via a Home Assistant RCE
[00:39:26] The OverlayFS vulnerability [CVE-2023-0386]
[00:44:01] Escaping Parallels Desktop with Plist Injection
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
#BugBounty #BugHunting #InfoSec #CyberSec #Podcast
This week we go a bit deeper than normal and look at some low level TPM attacks to steal keys. We've got a cool attack that lets us leak a per-chip secret out of the TPM one byte at a time, and a post about reading Bitlocker's secret off the SPI bus. Then we talk about several Shannon baseband bugs disclosed by Google's Project Zero.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/210.html
[00:00:00] Introduction
[00:01:14] Spot the Vuln - Sanitize Now or Later
[00:03:50] faulTPM: Exposing AMD fTPMs’ Deepest Secret
[00:18:33] Stealing the Bitlocker key from a TPM
[00:24:01] Shannon Baseband: Integer overflow when reassembling IPv4 fragments
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
We open up this weeks bug bounty podcast with a discussion about Google's recent support for passkeys, tackling some misunderstanding about what they are and how open the platform is. Also some talk towards the end about potential vulnerabilities to look out for. Then we dive into the vulnerabilities for the week, involving bypassing phone validation in OpenAI, a bad origin check enabling abuse of a permissive CORS policy, and an order of operations issue breaking the purpose of sanitization in Oracle's Opera.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/209.html
[00:00:00] Introduction
[00:02:43] So long passwords, thanks for all the phish
[00:23:49] OpenAI Allowed “Unlimited” Credit on New Accounts
[00:28:53] A smorgasbord of a bug chain: postMessage, JSONP, WAF bypass, DOM-based XSS, CORS, CSRF...
[00:44:28] Exploiting an Order of Operations Bug to Achieve RCE in Oracle Opera
[00:52:16] Testing Zero Touch Production Platforms and Safe Proxies
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Not a lot of interesting binary exploitation topics for this week, we've got a DHCPv6 service vuln, and a fun idea to use a timing side-channel to improve exploit stability. Then we end with a discussion about Rust coming the Windows operating system, what Rust means for the future of exploit development and vulnerability research and the value of memory corruption in Windows.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/208.html
[00:00:00] Introduction
[00:00:17] Spot the Vuln - Organizational Issues
[00:09:21] RCE in the Microsoft Windows DHCPv6 Service [CVE-2023-28231]
[00:12:29] PSPRAY: Timing Side-Channel based Linux Kernel Heap Exploitation Technique
[00:22:16] Rust and the future of VR
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
On this weeks bug bounty podcast we take a look at a few interesting issues. While they are all patched, there is reason to believe they'd all creep up in other applications too. First up is an RCE due to nested use of an escaped string. Second a fgets loop that doesn't account for long lines. A XML signature verification tool with a deceptive interface, and last a look at how Bash's privileged mode can backfire.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/207.html
[00:00:00] Introduction
[00:00:31] Analysis of Pre-Auth RCE in Sophos Web Appliance [CVE-2023-1671]
[00:07:16] Git Arbitrary Configuration Injection [CVE-2023-29007]
[00:11:41] Redash SAML Authentication Bypass
[00:18:51] Bash Privileged-Mode Vulnerabilities in Parallels Desktop and CDPATH Handling in MacOS
[00:29:38] Ambushed by AngularJS: a hidden CSP bypass in Piwik PRO
[00:34:37] [cPanel] Finding XSS in a million websites [CVE-2023-29489]
[00:35:20] Stored XSS on Snyk Advisor service can allow full fabrication of npm packages health score [CVE-2023-1767]
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week's binary exploitation episode has some pretty solid bugs.A string escaping routine that goes out of bounds, a web-based information disclosure. And a couple kernel issues, one in the Windows registry, a logical bug leading to memory corruption, and an AppleSPU out of bounds access.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/206.html
[00:00:00] Introduction
[00:00:30] Reversing the AMD Secure Processor (PSP) - Part 1: Design and Overview
[00:01:15] Spot the Vuln - Left-over Spaces
[00:05:03] Shell in the Ghost: Ghostscript CVE-2023-28879 writeup
[00:17:16] SecurePwn Part 2: Leaking Remote Memory Contents [CVE-2023-22897]
[00:21:50] Windows Kernel insufficient validation of new registry key names in transacted NtRenameKey
[00:30:38] CVE-2022-32917: AppleSPU out of bounds write
[00:34:11] Compromising Garmin's Sport Watches: A Deep Dive into GarminOS and its MonkeyC Virtual Machine
[00:35:27] The Fuzzing Guide to the Galaxy: An Attempt with Android System Services
[00:36:51] Stepping Insyde System Management Mode
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
For this week's bug bounty podcast We start off with a bit of a unique auth bypass in a firewall admin panel. We've also got a couple desktop-based software bugs, with a Docker Desktop privilege escalation on windows, and a chfn bug. We've also got a couple escalation techniques, one for Azure environments, and another trick for exploiting semi-controlled file-writes.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/205.html
[00:00:00] Introduction
[00:00:32] SecurePwn Part 1: Bypassing SecurePoint UTM’s Authentication [CVE-2023-22620]
[00:08:41] Abusing Linux chfn to Misrepresent etc passwd [CVE-2023-29383]
[00:14:39] Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 2
[00:22:42] From listKeys to Glory: How We Achieved a Subscription Privilege Escalation and RCE by Abusing Azure Storage Account Keys
[00:25:52] Pretalx Vulnerabilities: How to get accepted at every conference
[00:34:07] LLM Hacker's Handbook
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
We start with a hardware/glitching attack against the Wii U, then lets talk about integer overflows. We've got three integer overflows this week that lead to buffer overflows in different ways.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/204.html
[00:00:00] Introduction
[00:00:19] Spot the Vuln - Easy as ABC
[00:06:18] de_Fuse, the One True Pwn
[00:15:31] SonicWall Out Of Bounds Write DoS
[00:26:43] Windows bluetooth vulnerability exploit [CVE-2022-44675]
[00:28:52] Windows bluetooth vulnerability exploit [CVE-2022-44675]
[00:30:06] Escaping Adobe Sandbox: Exploiting an Integer Overflow in Microsoft Windows Crypto Provider
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Some fun issues this week as we explore code execution in Synthetics Recorder stemming from a comment in the code. An auth bypass in Pentaho leading to RCE via SSTI, car theft via CAN bus message injection, and how to become a cluster admin from a compromised pod in AWK Elastic Kubernetes Service.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/203.html
[00:00:00] Introduction
[00:00:30] [Elastic] Synthetics Recorder: Code injection when recording website with malicious content
[00:02:45] [Elastic] Synthetics Recorder: Code injection when recording website with malicious content
[00:06:32] Pentah0wnage: Pre-Auth RCE in Pentaho Business Analytics Server
[00:13:47] CAN Injection: keyless car theft
[00:23:48] Privilege escalation in AWS Elastic Kubernetes Service (EKS)
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Just a few bugs this week, a classic buffer overflow because of an unbounded copy in SNIProxy. mast1c0re Part 2 with a few more easy vulnerability but some more complex and difficult exploitation. And a Samsung NPU in-the-wild double free.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/202.html
[00:00:00] Introduction
[00:00:24] Spot The Vuln - Operational Set
[00:03:37] SNIProxy wildcard backend hosts buffer overflow vulnerability
[00:08:17] mast1c0re Part 2 - Compiler Attack
[00:21:46] Samsung NPU device driver double free in Android [CVE-2022-22265]
[00:41:52] CodeQL zero to hero part 1: the fundamentals of static analysis for vulnerability research
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Some audio issues this week, sorry for the ShareX sound. But we have a few interesting issues. A curl quirk that it might be useful to be aware of, Azure Pipelines vulnerability abusing attacker controlled logging. A look at a pretty classic Android/mobile bug, and a crazy auth misconfiguration (BingBang).
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/201.html
[00:00:00] Introduction
[00:00:39] The curl quirk that exposed Burp Suite and Google Chrome
[00:03:33] Exploiting prototype pollution in Node without the filesystem
[00:05:37] Remote Code Execution Vulnerability in Azure Pipelines Can Lead To Software Supply Chain Attack
[00:11:27] Attacking Android Antivirus Applications
[00:20:59] BingBang: AAD misconfiguration led to Bing.com results manipulation and account takeover
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Its our 200th episode, and we've got some stats from our first 200 episodes. Then we talk some Pwn2Own policy changes, a couple memeable overflows, and some new anti-ROP mitigations on OpenBSD.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/200.html
[00:00:00] Introduction
[00:00:52] Spot the Vuln - Just a Coupon
[00:04:56] 200th Episode
[00:14:52] Pwn2Own Vancouver 2023 - The Full Schedule
[00:23:26] WellinTech KingHistorian SORBAx64.dll RecvPacket integer conversion vulnerability
[00:28:23] ARM TrustZone: pivoting to the secure world
[00:34:33] Synthetic Memory Protections - An update on ROP mitigations
[00:57:51] Vulnerabilities 1002: C-Family Software Implementation Vulnerabilities
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
We are back with more discussion about applying AI/ChatGPT to security research, but before that we have a few interesting vulnerabilities. An OTP implementation that is too complex for its own good, a directory traversal leading to a guest to host VM escape, and server-side mime-sniffing.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/199.html
[00:00:00] Introduction
[00:00:31] Bypassing CloudTrail in AWS Service Catalog, and Other Logging Research
[00:07:45] Story of a Beautiful Account Takeover
[00:14:06] Parallels Desktop Toolgate Vulnerability
[00:18:50] Golang Server-Side MIME Sniff
[00:25:55] InjectGPT: the most polite exploit ever
[00:32:36] ChatGPT: The Right Tool for the Job?
[00:40:38] GPT Trick Golf
[00:49:19] [HackerOne] Arbitrary Remote Leak via ImageMagick [CVE-2022-44268]
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
We've got a pretty nice root/super-use check bypass in XNU this week, and a sort of double fetch issue in Intel's SMM leading to a potential privilege escalation into the Management system. We've also got a few meme-able Shannon Baseband issues and some tough to exploit out of bound reads in MIT Kerberos V5.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/198.html
[00:00:00] Introduction
[00:00:27] Spot the Vuln - The Right Context
[00:02:52] Discussion: Using GPT-4 to Spot Vulnerabilities in Code (and SecGPT)
[00:11:05] A Race to Report a TOCTOU: Analysis of a Bug Collision in Intel SMM
[00:19:32] Out-of-Bounds Read in the MIT Kerberos V5 (krb5) library
[00:25:35] XNU: NFSSVC root check bypass; use after free due to insufficient locking in upcall worker threads
[00:32:36] XNU: NFSSVC root check bypass; use after free due to insufficient locking in upcall worker threads
[00:36:35] Shannon Baseband: Intra-object overflow in NrmmMsgCodec when decoding Service Area List
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Recovering data from a cropped image (thanks to an undocumented API change, bypassing an origin check with an emoji, and a trivial SSRF filter bypass all in this week's bug bounty podcast.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/197.html
[00:00:00] Introduction
[00:00:32] SSRF Cross Protocol Redirect Bypass
[00:08:08] EmojiDeploy: Smile! Your Azure Web Service Got RCE’d ._.
[00:20:43] Multiple vulnerabilities in Apollo Configuration Management System [CVE-2023-25569, CVE-2023-25570]
[00:29:00] Exploiting aCropalypse: Recovering Truncated PNGs
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Some simple, but interesting vulnerabilities. A use-after-free because of wrong operation ordering, an interesting type confusion, an integer underflow and some OOB access in TPM 2.0 reference code.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/196.html
[00:00:00] Introduction
[00:00:27] Spot the Vuln - Just be Positive
[00:03:42] oss-sec: Linux kernel: CVE-2023-1118: UAF vulnerabilities in "drivers/media/rc" directory
[00:07:56] oss-sec: CVE-2023-1076: Linux Kernel: Type Confusion hardcodes tuntap socket UID to root
[00:11:21] GitHub - fuzzingrf/openbsd_tcpip_overflow: OpenBSD remote overflow
[00:14:36] Chat Question: What Language is Most Effective for Writing These Types of Exploits
[00:18:22] Vulnerabilities in the TPM 2.0 reference implementation code
[00:28:19] Chat Question: Skillset for Exploit Dev as part of a Red Team
[00:33:40] Espressif ESP32: Glitching The OTP Data Transfer
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A few varied issues this week, exploiting an apparently unexploitable CRLF injection, organization secrets exposure in GitHub, and a Jenkins XSS.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/195.html
[00:00:00] Introduction
[00:00:25] Abusing Hop-by-Hop Header to Chain A CRLF Injection Vulnerability
[00:04:26] HubSpot Full Account Takeover in Bug Bounty
[00:12:22] Unauthorized access to organization secrets in GitHub
[00:17:39] CorePlague: Severe Vulnerabilities in Jenkins Server Lead to RCE
[00:26:37] Firefly: a smart black-box fuzzer for web applications testing
[00:29:27] EJS - Server Side Prototype Pollution gadgets to RCE
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Just one vulnerability this week about hacking the Nintendo DSi browser, but we have a good discussion about fuzzing and a new paper "autofz".
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/194.html
[00:00:00] Introduction
[00:00:27] Spot the Vuln - Checking your Numbers
[00:03:23] autofz: Automated Fuzzer Composition at Runtime
[00:14:52] Alex Plaskett - Fuzzing Insights
[00:23:08] Hacking the Nintendo DSi Browser
[00:29:56] Espressif ESP32: Breaking HW AES with Electromagnetic Analysis
[00:32:08] Finding 10x+ Performance Improvements in C++ with CodeQL – Part 2/2 on Combining Dynamic and Static Analysis for Performance Optimisation
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This episode covers a lot of ground, from an insecure OAuth flow (Booking.com) to a crazy JSON injection and fail-open login system (DataHub) to hacking Bluetooth smart locks (Megafeis-palm). And even a new ImageMagick trick for a local file read.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/193.html
[00:00:00] Introduction
[00:00:26] Traveling with OAuth - Account Takeover on Booking.com
[00:13:25] Megafeis-palm: Exploiting Vulnerabilities to Open Bluetooth SmartLocks
[00:22:46] GitHub Security Lab audited DataHub: Here's what they found
[00:33:43] ImageMagick: The hidden vulnerability behind your online images
[00:38:49] CI/CD secrets extraction, tips and tricks
[00:39:30] A New Vector For “Dirty” Arbitrary File Write to RCE
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Just a couple issues this week, a cache coherency issue because the functions used to flush changes were not implemented on AARCH64. The second was using the "world's worst fuzzer" to find some bugs. Dumb fuzzer, but it worked.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/192.html
[00:00:00] Introduction
[00:00:24] Spot the Vuln - Targeting
[00:06:16] Vulnerability Reward Program: 2022 Year in Review
- Correction: I mistakenly thought Google's Bug Hunter University was older than it is. It was started in 2021.
[00:12:56] The code that wasn't there: Reading memory on an Android device by accident
[00:22:37] Using the “World’s Worst Fuzzer” To Find A Kernel Bug In The FiiO M6
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Parameter pollution for an auth bypass, SQL injection in an ORM, CRLF injection for a WAF bypass...this episode has a great mix of issues.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/191.html
[00:00:00] Introduction
[00:00:26] OpenEMR - Remote Code Execution in your Healthcare System
[00:10:13] Vulnerability write-up - "Dangerous assumptions"
[00:18:05] Chat Question: How do we find topics for the podcast?
[00:19:22] Exploiting Parameter Pollution in Golang Web Apps
[00:24:10] Using CRLF Injection to Bypass a Web App Firewall
[00:34:17] Microsoft Azure Account Takeover via DOM-based XSS in Cosmos DB Explorer
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week we talk about more Rust pitfalls, and fuzzing cURL. Then we have a couple bugs, one involving messing with the TCP stack to reach the vulnerable condition.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/190.html
[00:00:00] Introduction
[00:00:27] Spot the Vuln - Insecure by Default
[00:02:20] cURL audit: How a joke led to significant findings
[00:09:45] Rustproofing Linux (Part 4/4 Shared Memory)
[00:11:25] Rustproofing Linux (Part 4/4 Shared Memory)
[00:17:22] Exploiting a remote heap overflow with a custom TCP stack
[00:34:20] mast1c0re: Part 3 - Escaping the emulator
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A variety episode this week with some bad cryptography in PHP and Azure, information disclosure in suid binaries, request smuggling in HAProxy, and some research on testing for server-side prototype pollution.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/189.html
[00:00:00] Introduction
[00:00:22] PHP :: Sec Bug #81744 :: Password_verify() always return true with some hash
[00:11:25] Readline crime: exploiting a SUID logic bug
[00:18:05] Azure B2C Crypto Misuse and Account Compromise
[00:24:32] BUG/CRITICAL: http: properly reject empty http header field names · haproxy/haproxy@a8598a2
[00:27:23] Server-side prototype pollution: Black-box detection without the DoS
[00:30:47] ThinkstScapes 2022.Q4
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Few discussions this week, from using ASAN for effectively, to vulnerabilities in Rust code, and some discussion about exploiting the OpenSSH double free.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/188.html
[00:00:00] Introduction
[00:00:31] Spot the Vuln - Too Soft
[00:04:19] One Weird Trick to Improve Bug Finding With ASAN
[00:08:27] Rustproofing Linux (Part 2/4 Race Conditions)
[00:22:39] OpenSSH Pre-Auth Double Free Writeup & PoC [CVE-2023-25136]
[00:34:14] mast1c0re: Part 2 - Arbitrary PS2 code execution
[00:42:39] All about UndefinedBehaviorSanitizer
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Bit slow this week, so we talk about the Top Web-hacking techniques of 2022, and some TruffleSec/XSS Hunter drama before so we cover a blockchain verification bug, and a simple path traversal to SSTI and RCE chain.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/187.html
[00:00:00] Introduction
[00:00:32] Top 10 web hacking techniques of 2022
[00:06:30] TruffleSec/XSSHunter Drama
[00:15:33] Binance Smart Chain Token Bridge Hack
[00:24:01] Insecure path join to RCE via SSTI [CVE-2023-22855]
[00:29:06] Fearless CORS: a design philosophy for CORS middleware libraries (and a Go implementation)
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
First, we take a look at some positive changes to OSS Fuzz, then we dive into some vulnerabilities. This includes an XNU heap out-of-bounds write vulnerability, a Chrome heap-based overflow vulnerability, and an out-of-bounds read in cmark-gfm that, while probably not exploitable, is still intriguing.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/186.html
[00:00:00] Introduction
[00:00:22] Spot the Vuln - The Great String Escape
[00:03:03] Taking the next step: OSS-Fuzz in 2023
[00:09:48] XNU Heap Underwrite in dlil.c [CVE-2023-23504]
[00:19:10] Chrome heap buffer overflow in validating command decoder [CVE-2022-4135]
[00:26:19] Out-of-bounds read in cmark-gfm [CVE-2023-22485]
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Is it possible to escalate a self-XSS into an account takeover? Perhaps, we take a look at some potential options by abusing single-sign on. Then we take a look at a few Facebook/Meta authentication issues, and a deserialization trick to increase the usable classes in PHP.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/185.html
[00:00:00] Introduction
[00:00:21] Single-Sign On Gadgets: Escalate (Self-)XSS to Account Takeover
[00:11:11] Account takeover of Facebook/Oculus accounts due to First-Party access_token stealing
[00:14:00] DOM-XSS in Instant Games due to improper verification of supplied URLs
[00:18:55] Account Takeover in Canvas Apps served in Comet due to failure in Cross-Window-Message Origin validation
[00:29:33] Unserializable, but unreachable: Remote code execution on vBulletin
[00:34:54] Lexmark MC3224adwe RCE exploit
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Discussion heavy episode this week, talking about KASAN landing on Windows, shuffling gadgets to make ROP harder, and a paper about automatic exploit primitive discovery.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/184.html
[00:00:00] Introduction
[00:00:26] Spot the Vuln - Just the Data
[00:04:20] Introducing kernel sanitizers on Microsoft platforms
[00:14:54] Fun with Gentoo: Why don't we just shuffle those ROP gadgets away?
[00:25:14] Detecting Exploit Primitives Automatically for Heap Vulnerabilities on Binary Programs
[00:35:44] Armed to Boot: an enhancement to Arm's Secure Boot chain
[00:37:24] Pwning the all Google phone with a non-Google bug
[00:39:01] AMD SP Loader
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Starting off the week strong we have a CSS injection turned full-read SSRF, and a MyBB exploit chain from XSS to server-side code injection. And we've got a couple auth token disclosures to end off the episode.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/183.html
[00:00:00] Introduction
[00:00:22] Unleashing the power of CSS injection: The access key to an internal API
[00:06:50] MyBB <= 1.8.31: Remote Code Execution Chain
[00:18:53] Client-Side SSRF to Google Cloud Project Takeover [Google VRP]
[00:24:38] Account Takeover in KAYAK
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Null-dereferences might not be too exploitable on a lot of systems, what about the handling of a null-dereference. We cover a great Project Zero post on the topic, then look at a type confusion in Windows COM, a Nintendo buffer overflow, and several memory corruptions in git, highlighting their unique primitives and potential exploitability.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/182.html
[00:00:00] Introduction
[00:01:14] Spot the Vuln - Resolution
[00:03:38] Exploiting null-dereferences in the Linux kernel
[00:15:31] Type confusion in Windows COM+ Event System Service [CVE-2022-41033]
[00:22:57] Information and PoC about the ENLBufferPwn vulnerability
[00:28:11] Git security vulnerabilities announced
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
We've got a cloud focused episode this week, starting with a logging bypass in AWS CloudTrail, a SSH Key injection, and cross-tenant data access in Azure Cognitive Search.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/181.html
[00:00:00] Introduction
[00:00:25] Undocumented API allows CloudTrail bypass
[00:06:00] Multiple Vulnerabilities in the Galaxy App Store (CVE-2023-21433, CVE-2023-21434)
[00:14:53] SSH key injection in Google Cloud Compute Engine [Google VRP]
[00:19:08] Chat Question: Why is Cross-Site Scripting called That
[00:22:36] Cross-tenant network bypass in Azure Cognitive Search
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
An Apple-focused episode this week, with a trivial iPod Nano BootRom exploit, and a WebKit Use-after-free. We also have a really cool XNU Virutal Memory bug, strictly a race condition and a logic differential between two alternate paths resulting in bypassing copy-on-write protection. We also handle a few questions from chat, how much reverse engineering is necessary for vuln research, how much programming knowledge is required, and a bit about AI's applicability to reverse engineering.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/180.html
[00:00:00] Introduction
[00:00:18] Spot the Vuln - An Exceptional Login
[00:02:39] wInd3x, the iPod Bootrom exploit 10 years too late
[00:09:14] XNU VM copy-on-write bypass due to incorrect shadow creation logic during unaligned vm_map_copy operations [CVE-2022-46689]
[00:17:52] [WebKit] Use-after-free of RenderMathMLToken in CSSCrossfadeValue::crossfadeChanged
[00:21:46] Chat Question: How Important is Reverse Engineering to Vuln Research
[00:40:33] Learning eBPF exploitation
[00:41:23] [Chrome] Analyzing and Exploiting CVE-2018-17463
[00:42:40] Off-By-One Security - The Process of Reversing and Exploit Complex Vulnerabilities w/Chompie1337
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week kicks off with another look at client-side path traversal attacks, this time with some more case-studies. Then we get into some mobile issues, one a cool desync between DER processors resulting in an iOS privilege escalation. The other a Bundle processing issue in Android that provides an almost use-after-free like primitive but in Java.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/179.html
[00:00:00] Introduction
[00:00:27] Full Team Takeover
[00:04:20] Fetch Diversion
[00:13:39] Practical Example Of Client Side Path Manipulation
[00:17:50] DER Entitlements: The (Brief) Return of the Psychic Paper
[00:30:47] Privilege escalation to system app via LazyValue using Parcel after recycle() [CVE-2022-20452]
[00:47:38] Critical Thinking - A Bug Bounty Podcast by Justin Gardner (Rhynorater)
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Just a few issues this week, but some solid exploitation. A Kernel UAF, IoT, and a bhyve escape.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/178.html
[00:00:00] Introduction
[00:00:35] Spot the Vuln - Internal Externals
[00:06:35] Escaping from bhyve
[00:13:14] Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg
[00:29:28] MeshyJSON: A TP-Link tdpServer JSON Stack Overflow
[00:42:19] Survey of security mitigations and architectures, December 2022
[00:45:25] Abusing RCU callbacks with a Use-After-Free read to defeat KASLR
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
First episode of the new year, and we've got some cool stuff. Several authentication issues and "class pollution" in Python.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/177.html
[00:00:00] Introduction
[00:00:31] ReDoS "vulnerabilities" and misaligned incentives
[00:17:14] Web Hackers vs. The Auto Industry
[00:37:19] Prototype Pollution in Python
- Correction: We discuss a bit of a disagreement regarding calling the issue "Prototype Pollution" in Python, turns out we missed the fact the author calls it "Class Pollution" in the actual article which is a more fitting name.
[00:50:26] [MK8DX] Improper verification of Competition creation allows to create "Official" competitions
[00:56:36] 0 click Facebook Account Takeover and Two-Factor Authentication Bypass
[01:01:18] How SAML works and some attacks on it
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
In this episode, we discuss the discovery of a type confusion in Internet Explorer's JScript. We also explore a fun exploit strategy for a low-level memory management bug in the Linux kernel and delve into several issues in Huawei's Secure Monitor that enable code execution in the secure world.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/176.html
[00:00:00] Introduction
[00:00:30] Spot the Vuln - Update All The Things
[00:06:02] Type confusion in Internet Explorer's JScript9 engine [CVE-2022-41128]
[00:14:48] Exploiting CVE-2022-42703 - Bringing back the stack attack
[00:29:01] Huawei Secure Monitor Vulnerabilities
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Is Pwn2Own worth it for bug bounty hunters? A handful of trivial command injections, and some awesome WAF bypasses.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/175.html
[00:00:00] Introduction
[00:00:34] Pwn2Own Toronto 2022 - Results
[00:10:31] Cool vulns don't live long - Netgear and Pwn2Own
[00:15:03] The Last Breath of Our Netgear RAX30 Bugs - A Tragic Tale before Pwn2Own Toronto 2022
[00:26:54] Abusing JSON-Based SQL to Bypass WAF
[00:26:54] RCE via SSTI on Spring Boot Error Page with Akamai WAF Bypass
[00:37:25] Abusing JSON-Based SQL to Bypass WAF
[00:46:47] OTP Leaking Through Cookie Leads to Account Takeover
[00:50:47] ChatGPT bid for bogus bug bounty is thwarted
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Will AI be your next vuln research assistant? ... Maybe? We also talk about a stack-based overflow in `ping` and a Huawei hypervisor vuln.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/174.html
[00:00:00] Introduction
[00:00:41] Spot the Vuln - A Nice Choice
[00:03:49] ChatGPT - AI for Vuln Research?
[00:21:46] Memory Safe Languages in Android 13
[00:31:28] [FreeBSD] Stack overflow in ping
[00:40:59] Huawei Security Hypervisor Vulnerability
[00:45:09] Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals
[00:45:16] Chrome Browser Exploitation, Part 2: Introduction to Ignition, Sparkplug and JIT Compilation via TurboFan
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A variety of issues this week, DOM Clobbering, argument injection, a filesystem race condition, cross-site scripting, and a normalization-based auth bypass.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/173.html
[00:00:00] Introduction
[00:00:41] Humble Tech Book Bundle: The Art of Hacking by No Starch Press
[00:03:23] Hijacking service workers via DOM Clobbering
[00:11:14] Grafana RCE via SMTP server parameter injection
[00:16:33] Race condition in snap-confine's must_mkdir_and_open_with_perms() [CVE-2022-3328]
[00:23:56] XSS on account.leagueoflegends.com via easyXDM
[00:32:41] [Hyundai] Remotely control the locks, engine, horn, headlights, and trunk of vehicles made after 2012.
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
The end of kASLR bypasses? Probably just click-bait, but the patch gap is real and we discuss that a bit before getting into a couple AI-based corruptions.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/172.html
[00:00:00] Introduction
[00:01:15] Spot the Vuln - Escape
[00:06:00] Humble Tech Book Bundle: The Art of Hacking by No Starch Press
[00:11:00] An End to KASLR Bypasses?
[00:15:59] Mind the Gap
[00:24:36] ANE_ProgramCreate() multiple kernel memory corruption [CVE-2022-32898]
[00:34:29] Chat Question: Guides/Techniques to Help With C++ Reverse Engineering
[00:36:35] ZinComputeProgramUpdateMutables() OOB write due to double fetch issue [CVE-2022-32932]
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Some RCE chains starting with DNS rebinding, always fun to see, a fairly basic SQL injection, and a JS sandbox escape for RCE in Spotify.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/171.html
[00:00:00] Introduction
[00:00:38] RCE in Tailscale, DNS Rebinding, and You [CVE-2022-41924]
[00:17:55] SQL Injection in ManageEngine Privileged Access Management [CVE-2022-40300]
[00:22:34] Unauthenticated Remote Code Execution in Spotify’s Backstage
[00:36:28] Till REcollapse
[00:41:19] Chat Question: Alternatives to IDA Freeware
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A hardware heavy episode as we talk about two read protection bypasses, Pixel 6 bootloader exploitation and benchmarking fuzzers.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/170.html
[00:00:00] Introduction
[00:00:26] Spot the Vuln - Do More
[00:05:04] Pixel6 Bootloader Exploitation
[00:16:41] NXP i.MX SDP_READ_DISABLE Fuse Bypass [CVE-2022-45163]
[00:22:05] Bypassing the Renesas RH850/P1M-E read protection using fault injection
[00:29:32] FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
This week has the return of cross-site tracing, HTML injection, a golang specific vulnerable code pattern, and a fun case-sensitivity auth bypass.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/169.html
[00:00:00] Introduction
[00:01:02] A Confused Deputy Vulnerability in AWS AppSync
[00:07:05] Grafana Race Condition Leading to Potential Authentication Bypass [CVE-2022-39328]
[00:16:12] Stealing passwords from infosec Mastodon - without bypassing CSP
[00:24:01] Cross-Site Tracing was possible via non-standard override headers [CVE-2022-45411]
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Is the compiler make exploitation easier, these divergent representations seem to do so. We also look at a chrome UAF and a double stack overflow.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/168.html
[00:00:00] Introduction
[00:00:52] Spot the Vuln - The Right Start
[00:03:25] Look out! Divergent representations are everywhere!
[00:12:18] Chrome: heap-use-after-free in password_manager::WellKnownChangePasswordState::SetChangePasswordResponseCode
[00:17:34] Netgear Nighthawk r7000p aws_json Unauthenticated Double Stack Overflow Vulnerability
[00:23:52] A validation flaw in Netfilter leading to Local Privilege Escalation [CVE-2022-1015]
[00:25:03] Windows Kernel multiple memory corruption issues when operating on very long registry paths
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A Pixel Lockscreen bypass and some discussion about dupes in bug bounty, then a long RCE chain, and a look at client-side path traversals.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/167.html
[00:00:00] Introduction
[00:00:48] Accidental $70k Google Pixel Lock Screen Bypass
[00:23:28] Discovering vendor-specific vulnerabilities in Android
[00:34:30] Checkmk: Remote Code Execution by Chaining Multiple Bugs (2/3)
[00:52:13] Practical Client Side Path Traversal Attacks
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A lot of discussion about the OpenSSL vulnerability, fuzzing and exploitation. Then into a RCE in XML Signature verification, and a Samsung exploit chain.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/166.html
[00:00:00] Introduction
[00:00:35] Spot the Vuln - Spaced Out
[00:03:29] OpenSSL punycode vulnerability [CVE-2022-3602]
[00:35:43] Gregor Samsa: Exploiting Java's XML Signature Verification
[00:46:37] A Very Powerful Clipboard: Analysis of a Samsung in-the-wild exploit chain
[00:58:53] Symbolic Triage: Making the Best of a Good Situation
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Several slightly weird issues this week, a reentrancy attack abusing a read-only function, SSRF and XSS through a statically generated website and others.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/165.html
[00:00:00] Introduction
[00:01:10] Vulnerabilities in Apache Batik Default Security Controls - SSRF and RCE Through Remote Class Loading
[00:05:48] Exploiting Static Site Generators: When Static Is Not Actually Static
[00:12:51] Decoding $220K Read-only Reentrancy Exploit
[00:23:56] Weird Vulnerabilities Happening on Load Balancers, Shallow Copies and Caches
[00:28:42] Arbitrary File Read in Tasks.org Android app [CVE-2022-39349]
[00:33:13] [GitLab] RepositoryPipeline allows importing of local git repos
[00:36:15] [GitLab] RepositoryPipeline allows importing of local git repos
[00:46:05] Visual Studio Code Jupyter Notebook RCE
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Kicking off the week with a look at Apple's new security blog and the kalloc_type introduced into XNU, then a mix of issues including an overflow in SQLite.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/164.html
[00:00:00] Introduction
[00:00:24] Spot the Vuln - Right Code, Wrong Place
[00:03:05] Hexacon Talks are Available
[00:04:56] Towards the next generation of XNU memory safety: kalloc_type
[00:21:23] NetBSD Coredump Kernel Refcount LPE
[00:24:56] [Chrome] heap-use-after-free in AccountSelectionBubbleView::OnAccountImageFetched
[00:31:42] Stranger Strings: An exploitable flaw in SQLite
[00:44:35] Reaching Vulnerable Point starting from 0 Knowledge on RPC [CVE-2022-26809
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Several simple bugs with significant impacts, XSS to being able to install apps, CSRFing via a Captcha, and a Google IDOR.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/163.html
[00:00:00] Introduction
[00:00:29] Defcon Talks are Available
[00:03:10] Galaxy Store Applications Installation/Launching without User Interaction
[00:08:49] Facebook SMS Captcha Was Vulnerable to CSRF Attack
[00:15:32] Google Data Studio Insecure Direct Object Reference
[00:21:06] HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
A few issues this week, including an overflow in SHA-3, yet another io_uring bug, and multiple (questionably exploitable) corruptions in Edge.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/162.html
[00:00:00] Introduction
[00:00:23] Spot the Vuln - Tricky Notes
[00:04:04] Memory corruption vulnerabilities in Edge
[00:15:19] SHA-3 Buffer Overflow
[00:23:53] A Journey To The Dawn [CVE-2022-1786]
[00:36:57] Exploiting Xbox Game Frogger Beyond to Execute Arbitrary Unsigned Code
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Several fun issues this week, from a Cobalt Strike RCE, a couple auth bypasses, and stanza smuggling in Jabber.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/161.html
[00:00:00] Introduction
[00:00:28] Sophos Firewall User Portal and Web Admin Code Injection [CVE-2022-3236]
[00:07:05] [Cisco Jabber] XMPP Stanza Smuggling with stream:stream tag
[00:14:52] Authentication Bypass & File Upload & Arbitrary File Overwrite
[00:25:31] Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1
[00:33:38] HTTP/3 connection contamination: an upcoming threat?
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
We've got a few interesting vulns, a blind format string attack, Windows kernel int overflow, and a browser exploit (unchecked bounds after lowering).
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/160.html
[00:00:00] Introduction
[00:00:24] Spot the Vuln - Chat Configuration
[00:02:06] CCC Cancelled
[00:07:53] Hacking TMNF: Part 2 - Exploiting a blind format string
[00:19:17] Windows Kernel integer overflows in registry subkey lists leading to memory corruption
[00:28:13] Browser Exploitation: A Case Study Of CVE-2020-6507
[00:45:48] Chat Question: Getting Into Browser Exploitation
This week we look at a insecure deserialization (GitLab), argument injection (Packagist), and insecure string interpolation (Apache Commons Text)
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/159.html
[00:00:00] Introduction
[00:01:01] New reward system to accelerate learning and growth on Detectify
[00:04:33] RCE via github import
[00:11:27] Securing Developer Tools: A New Supply Chain Attack on PHP
[00:17:32] FortiOS, FortiProxy, and FortiSwitchManager Authentication Bypass Technical Deep Dive [CVE-2022-40684]
[00:23:08] Apache Commons Text Interpolation leading to potential RCE [CVE-2022-42889]
Just a couple issues this week and a discussion about why you should look at old vulnerabilities and the pace exploit development advanced at.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/158.html
[00:00:00] Introduction
[00:00:26] Spot the Vuln - Authentic Token ... Fixed
[00:05:42] Hancom Office 2020 Hword Docx XML parsing heap underflow vulnerability
[00:11:07] Shining New Light on an Old ROM Vulnerability: Secure Boot Bypass via DCD and CSF Tampering on NXP i.MX Devices
[00:22:21] Discussion: Why Care About Old Vulnerabilities
No actual bounties this week, but we start off with a discussion on semgrep vs codeql, then get into some cool issues that you can start testing for.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/157.html
[00:00:00] Introduction
[00:00:39] Comparing Semgrep and CodeQL
[00:14:27] A Deep Dive of CVE-2022–33987 (Got allows a redirect to a UNIX socket)
[00:20:18] Melting the DNS Iceberg: Taking over your infrastructure Kaminsky style
[00:28:23] [OpenJDK] Weak Parsing Logic in java.net.InetAddress and Related Classes
[00:34:22] RCE via Phar Deserialisation [CVE-2022-41343]
Starting off with some discussion about XOM and CFI on the PS5 and how it impacts exploitation. Then into a uClibC issue, and hacking wireless scoreboards.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/156.html
[00:00:00] Introduction
[00:00:27] Spot the Vuln - Authentic Token
[00:05:04] PS5-4.03-Kernel-Exploit: An experimental webkit-based kernel exploit (Arb. R/W) for the PS5 on 4.03FW
[00:17:54] uClibC and uClibC-ng libpthread linuxthreads memory corruption vulnerabilities
[00:26:35] Scoreboard Hacking Part 2 - Getting the AES Key
[00:41:16] When Hypervisor Met Snapshot Fuzzing
Had some varied issues this week, a file format allowing JScript for a $20,000 bounty, Akamai Cache Poisoning, Universal XSS in Chrome.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/155.html
[00:00:00] Introduction
[00:00:26] Two Lines of JScript for $20,000
[00:05:31] Worldwide Server-side Cache Poisoning on All Akamai Edge Nodes ($50K+ Bounty Earned)
[00:14:10] [Chrome] Universal XSS in Autofill Assistant
[00:22:51] Aurora Improper Input Sanitization Bugfix Review
[00:31:21] What I learnt from reading 126* Information Disclosure Writeups.
Starting off with meme vulnerabilities in UNISOC BootROMs, and ending with a discussion about bypassing CFI/Intel CET and some fun issues in-between.
Links and summaries are available at https://dayzerosec.com/podcast/154.html
[00:00:00] Introduction [00:00:24] Spot the Vuln - You Put Where Where?!
[00:04:05] There’s Another Hole In Your SoC: Unisoc ROM Vulnerabilities
[00:12:19] Crow HTTP framework use-after-free
[00:17:51] Crowbleed (Crow HTTP framework vulnerability)
[00:19:34] exploit for CVE-2022-2588
[00:23:24] Bypassing Intel CET with Counterfeit Objects
[00:48:05] Analyzing BSD Kernels for Uninitialized Memory Disclosures using Binary Ninja
[00:50:32] PS5 IPV6_2292PKTOPTIONS Use-After-Free
Discussion this week around Chrome's Sanitizer API, and bypassing firewalls with webhooks and 0days (ModSecurity bypass), and a pre-auth BitBucket RCE.
Links and summaries are available at https://dayzerosec.com/podcast/153.html
[00:00:00] Introduction
[00:00:31] Exploiting Web3’s Hidden Attack Surface: Universal XSS on Netlify’s Next.js Library
[00:10:31] Breaking Bitbucket: Pre Auth Remote Command Execution [CVE-2022-36804]
[00:16:25] [Chrome] Sanitizer API bypass via prototype pollution
[00:23:02] How we Abused Repository Webhooks to Access Internal CI Systems at Scale
[00:35:03] WAF bypasses via 0days
[00:42:40] Cloning internal Google repos for fun and… info?
[00:43:19] How to turn security research into profit: a CL.0 case study
This week we've got some summer highlights: the impact of MTE on Android, an iOS vuln and some primitive chaining in a Titan M exploit.
Links and summaries of today's topics are available on our website: https://dayzerosec.com/podcast/an-ios-bug-attacking-titan-m-and-mte-arrives.html
[00:01:17] Spot the Vuln - Easy Regex
[00:03:53] Binary Ninja - 3.1 The Performance Release
[00:11:52] Dogbolt - Decompiler Explorer
[00:15:28] Making Linux Kernel Exploit Cooking Harder
[00:23:31] MTE comes to Android
[00:37:19] ipc_kmsg_get_from_kernel, iOS 15.4 - root cause analysis
[00:44:48] Attacking Titan M with Only One Byte
[01:00:01] CVE-2022-29582 - An io_uring vulnerability
[01:07:47] mast1c0re: Hacking the PS4 / PS5 through the PS2 Emulator
[01:09:32] bd-jb: The first bd-j hack (PS4/PS5)
[01:11:01] [CVE-2022-34918] A crack in the Linux firewall
We are back at it, covering some write-ups and exploits we found interesting this summer. From browse-powered desyncs, to account take overs.
Links are available on our website at: https://dayzerosec.com/podcast/reading-gitlab-hidden-hackerone-reports-and-golang-parameter-smuggling.html
[00:02:17] Ridiculous vulnerability disclosure process with CrowdStrike Falcon Sensor
[00:15:03] [GitLab] Able to view hackerone report attachments
[00:26:59] Forwarding addresses is hard [CVE-2022-31813]
[00:32:18] "ParseThru" – Exploiting HTTP Parameter Smuggling in Golang
[00:46:41] Browser-Powered Desync Attacks
[01:09:30] Scraping the bottom of the CORS barrel (part 1)
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/fuchsia-os-printer-bugs-and-hacking-radare2.html
Some silly issues in radare2, some printer hacking, some kernel vulnerabilities, and a look at exploiting Fuchsia OS on this weeks episode. Just as a reminder this will be our last episode until September.
[00:00:40] Spot the Vuln - Size Matters
[00:04:30] Multiple vulnerabilities in radare2
[00:10:08] The printer goes brrrrr!!!
[00:17:25] A Kernel Hacker Meets Fuchsia OS
[00:33:55] Finding Bugs in Windows Drivers, Part 1 - WDM
[00:41:23] Chat Question: Learning Kernel Exploitation
[00:50:25] Resources While We are Gone
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-zoom-rce-vmware-auth-bypass-and-gitlab-stored-xss.html
Last bounty episode before our summer vacation, and we are ending off with some cool issues. XML Stanza smuggling in Zoom for a MitM attack, an odd auth bypass, a Gitlab Stored XSS and gadget based CSP bypass, and an interesting technique to leverage a path traversal/desync against NGINX Plus
[00:01:00] How I hacked CTX and PHPass Modules
[00:10:55] [Zoom] Remote Code Execution with XMPP Stanza Smuggling
[00:19:38] VMware Authentication Bypass Vulnerability [CVE-2022-22972]
[00:23:05] Breaking Reverse Proxy Parser Logic
[00:26:44] [GitLab] Stored XSS in Notes (with CSP bypass)
[00:37:13] GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
[00:48:00] Resources While We Are Gone
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/pwn2own-parallels-desktop-and-an-appleavd-bug.html
Just a couple vulnerabilities to talk about this week, but some interesting things to talk about in them. We also have some discussion about this year's pwn2own results and a couple things that caught out attention.
[00:01:02] Spot the Vuln - NoSQL, No Problem
[00:02:46] Pwn2Own Vancouver 2022 - The Results
[00:16:14] CVE-2022-22675: AppleAVD Overflow in AVC_RBSP::parseHRD
[00:23:16] Exploiting an Unbounded memcpy in Parallels Desktop
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/stealing-dropbox-google-drive-tokens-a-gitlab-bug-and-macos-powerdir-vulnerability.html
Kicking off the week with some discussion about DOJ's policy change before getting into some vulnerabilities: "powerdir" a macOS TCC bypass, an integer overflow on the web, and another attack against HelloSign and their Google Drive integration
[00:02:12] DOJ’s New CFAA Policy is a Good Start But Does Not Go Far Enough to Protect Security Researchers
[00:11:02] macOS Vulnerability "powerdir" could lead to unauthorized user data access
[00:17:17] Arbitrary POST request as victim user from HTML injection in Jupyter notebooks
[00:21:44] [Glovo] Integer overflow vulnerability
[00:25:11] Stealing Google Drive OAuth tokens from Dropbox
[00:29:46] Privileged pod escalations in Kubernetes and GKE
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/python-3-uaf-and-ps4-ps5-pppoe-kernel-bug.html
We have a couple normally low-impact bugs in Solana rBPF this week netting a $200k bounty, a Python 2.7+ Use-After-Free and a PS4 and PS5 remote kernel heap overflow along with some discussion about exploitability and usability for a jailbreak.
[00:00:48] Spot the Vuln - Clowning Around
[00:03:27] Earn $200K by fuzzing for a weekend
[00:17:37] Exploiting a Use-After-Free for code execution in every version of Python 3
[00:26:21] [PlayStation] Remote kernel heap overflow
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/yanking-rubygems-big-ip-auth-bypass-and-a-priceline-account-takeover.html
A lot of cool little bugs this week with some solid impact, Facebook and Priceline account takeovers, F5 iControl Authentication Bypass, and a couple other logic bugs.
[00:01:55] rubygems CVE-2022-29176 explained
[00:06:09] Multiple bugs chained to takeover Facebook Accounts which uses Gmail
[00:15:16] [curl] curl removes wrong file on error [CVE-2022-27778]
[00:18:33] [Priceline] Account takeover via Google OneTap
[00:22:14] F5 iControl REST Endpoint Authentication Bypass Technical Deep Dive
[00:29:02] The Underrated Bugs, Clickjacking, CSS Injection, Drag-Drop XSS, Cookie Bomb, Login+Logout CSRF…
[00:30:20] Hunting evasive vulnerabilities
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/pwn2owning-routers-and-anker-eufy-bugs.html
Just a few vulnerabilities this week, but we have some codeql discussion as its used to find several vulnerabilities in Accel-PPP VPN server, and a look at a bug submitted to Pwn2Own 2021.
[00:00:33] Spot the Vuln - Is It Clear
[00:05:13] Anker Eufy Homebase 2 libxm_av.so DemuxCmdInBuffer buffer overflow vulnerability
[00:08:18] Hunting bugs in Accel-PPP with CodeQL
[00:15:53] Competing in Pwn2Own 2021 Austin: Icarus at the Zenith
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/cloudflare-pages-hacking-a-bank-and-attacking-price-oracles.html
Some interesting vulnerabilities this week from a Cloudflare Pages container escape chain, to hacking a bank's web application with some neat tricks to get abuse a file-write in a hardened envrionment, and even another dumb smart-contract bug.
[00:00:23] Cloudflare Pages, part 1: The fellowship of the secret
[00:10:07] Ruby on Rails - Possible XSS Vulnerability in ActionView tag helpers [CVE-2022-27777]
[00:15:01] Hacking a Bank by Finding a 0day in DotCMS
[00:22:23] Aave V3’s Price Oracle Manipulation Vulnerability
[00:33:53] [Reddit] Able to bypass email verification and change email to any other user email
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/nimbuspwn-a-clfs-vulnerability-and-dataflow.html
A few vulnerabilities from a TOCTOU to an arbitrary free, and some research into using data-flow in your fuzzing.
[00:00:18] Spot the Vuln - Where's it At?
[00:03:44] Nimbuspwn - A Linux Elevation of Privilege
[00:08:38] Windows Common Log File System (CLFS) Logical-Error Vulnerability [CVE-2022-24521]
[00:15:32] Arbitrary Free in Accusoft ImageGear ioca_mys_rgb_allocate
[00:25:31] Commit Level Vulnerability Dataset
[00:28:44] DatAFLow - Towards a Data-Flow-Guided Fuzzer
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
<p>Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/xss-for-nfts-a-vmware-workspace-one-uem-ssrf-and-gitlab-ci-container-escape.html</p>
<p>Some straight forward bugs this week with some interesting discussion around cryptographic protocols (VMWare Workspace), XSS in the Web3 world, and whether container escapes into a low-privileged VM matter. Along with a couple just note-worthy test-cases to keep in mind while bug hunting.</p>
<p>[00:00:35] Wormable Cross-Site Scripting Vulnerability affecting Rarible’s NFT Marketplace<br></p>
<p>[00:09:14] Encrypting our way to SSRF in VMWare Workspace One UEM [CVE-2021-22054]<br></p>
<p>[00:14:29] How I Bypass 2FA while Resetting Password<br></p>
<p>[00:16:41] Container escape on public GitLab CI Runners<br></p>
<p>[00:30:39] [Nextcloud] Bypass the protection lock in andoid app<br></p>
<p>The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:<p>
<ul>
<li>Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities</li>
<li>Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.</li>
</ul>
<p>The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec</p>
<p>You can also join our discord: https://discord.gg/daTxTK9</p>
<p>Or follow us on Twitter (@dayzerosec) to know when new releases are coming.</p>
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/getting-into-vulnerability-research-and-a-fuse-use-after-free.html
We are joined by Cts for a discussion about getting into vulnerability research and some thoughts about the higher-level bug hunting process, then a look at some black-box fuzzing of MS Defender for IoT and a FUSE use-after-free.
[00:00:44] Spot the Vuln - What do I need?
[00:03:11] Discussion: Getting into Vulnerability Research
[00:39:43] Inside the Black Box - How We Fuzzed Microsoft Defender for IoT and Found Multiple Vulnerabilities
[00:43:25] FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes
[00:46:51] FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-struts-rce-broken-java-ecdsa-psychic-signatures-and-a-bad-log4shell-fix.html
An intresting mix of issues from crypto (Psychic Signatures), to a bad vulnerability patching service (patching log4shell), and bad logic leading to authentication bypassing and leaking sensitive keys.
[00:00:24] Psychic Signatures in Java [CVE-2022-21449]
[00:15:09] AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege Escalation
[00:18:33] Bypass Apple Corp SSO on Apple Admin Panel
[00:21:55] Exploiting Struts RCE on 2.5.26
[00:27:46] bluez: malicious USB devices can steal Bluetooth link keys over HCI using fake BD_ADDR
[00:31:20] New XSS vectors
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/another-ios-bug-and-edge-chakra-exploitation.html
A massive 11,000 byte overflow in WatchGuard, some discussion about lock-related vulnerabilities and analysis, and a look at a ChakraCore exploit dealing with all the mitigations (ASLR, DEP, CFG, ACG,CIG)
[00:00:32] Spot the Vuln - The Global Query
[00:05:04] Diving Deeper into WatchGuard Pre-Auth RCE [CVE-2022-26318]
[00:09:42] HTTP Protocol Stack Remote Code Execution Vulnerability [CVE-2022-21907]
[00:18:21] iOS in-the-wild vulnerability in vouchers [CVE-2021-1782]
[00:37:06] Microsoft Edge Type Confusion Vulnerability (Part 2) [CVE-2019-0567]
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/taking-over-an-internal-aws-service-and-an-interesting-xss-vector.html
Short episode this week, looking at some relatively simple vulnerabilities ranging XSS, to leaking internal service credentials in AWS Relational Database Service by disabling validiation.
[00:00:40] Git security vulnerability announced
[00:06:37] AWS RDS Vulnerability Leads to AWS Internal Service Credentials
[00:14:04] Privilege Escalation to SYSTEM in AWS VPN Client [CVE-2022-25165]
[00:18:37] Copy-paste XSS in vditor text editor [CVE-2021-32855]
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-subtle-ios-parsing-bug-and-a-php-use-after-free.html
We dive into an ASN.1 parsing bug impacting iOS, and a PHP use-after-free to bypass disabled functions, ending the week with a discussion about whether or not its too late to get into this area of security.
[00:00:29] Spot the Vuln - One HMAC at a Time
[00:03:19] CVE-2021-30737, @xerub's 2021 iOS ASN.1 Vulnerability
[00:19:03] In the land of PHP you will always be (use-after-)free
[00:30:13] security things in Linux v5.10
[00:36:16] Discussion: Is It too late to get into "cyber security"
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-double-edged-ssrf-pritunl-vpn-lpe-and-a-nodebb-vuln.html
Quick bounty episode this week with some request smuggling, abusing a SSRF for client-sided impact, a weird oauth flow, and a desktop VPN client LPE.
[00:00:28] HTTP Request Smuggling on business.apple.com and Others.
[00:06:25] Exploiting a double-edged SSRF for server and client-side impact
[00:14:47] Local Privilege Escalation in Pritunl VPN Client [CVE-2022-25372]
[00:20:27] A NodeBB 0-day
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/forcedentry-sandbox-escape-and-netfilter-bugs.html
More information about the FORCEDENTRY exploit chain, and some Linux exploitation with a couple netfilter bugs. Ending the episode with some discussion about exploiting blind kernel read primitives from Microsoft.
[00:00:28] Spot the Vuln - Adding Entropy
[00:02:56] FORCEDENTRY: Sandbox Escape
[00:15:21] How The Tables Have Turned: An analysis of two new Linux vulnerabilities in nf_tables
[00:32:38] Exploring a New Class of Kernel Exploit Primitive
[00:40:18] BlueHat IL Videos are up
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/spring4shell-pear-bugs-and-gitlab-hardcoded-passwords.html
This week we have some fun with some bugs that really shouldn't have passed code-review, we of course talk about Spring4Shell/SpringShell and dive into the decade long history of that bug, and a bit of discussion about triaging more subtle bugs.
[00:00:29] [Stripe] CSRF token validation system is disabled
[00:09:42] GitLab Account Takeover with Hardcoded Password
[00:21:22] Spring4Shell: Security Analysis of the latest Java RCE '0-day' vulnerabilities in Spring
[00:37:49] PHP Supply Chain Attack on PEAR
[00:52:16] Finding bugs that doesn’t exists
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/pwning-wd-nas-netgear-routers-and-overflowing-kernel-pages.html
Plenty of exploit strategy talk this week with vulnerabilities and complete exploits targeting a NAS, a router, and a Linux Kernel module with a page-level overflow.
[00:00:26] Spot the Vuln - Normalized Regex
[00:01:52] Remote Code Execution on Western Digital PR4100 NAS (CVE-2022-23121)
[00:07:10] Defeating the Netgear R6700v3
[00:18:36] Exploit esp6 modules in Linux kernel [CVE-2022-27666]
[00:27:17] Racing against the clock -- hitting a tiny kernel race window
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/gitlab-arbitrary-file-read-and-bypassing-php-s-filter-var.html
Some easy vulnerabilities this week, a directory traversal due to a bad regex, a simply yet somewhat mysterious authentication bypass, arbitrary file read in GitLab thanks to archives with symlinks, and a PHP filter_var bypass.
[00:00:25] elFinder: The story of a repwning
[00:11:56] Authentication bypass using root array
[00:17:04] [GitLab] Arbitrary file read via the bulk imports UploadsPipeline
[00:19:54] PHP filter_var shenanigans
[00:30:26] Quick Thoughts on Finding a Mentor
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/chrome-heap-oob-access-and-tlstorm.html
A few issues this week, a OOB access in chrome and in the Linux Kernel's Netfilter, and a few issues in Smart UPS devices.
[00:00:17] Spot the Vuln - Where's My Token
[00:03:21] Chrome: heap-buffer-overflow in chrome_pdf::PDFiumEngine::RequestThumbnail
[00:06:23] TLStorm - Three Critical Vulnerabilities in Smart-UPS devices
[00:15:59] The Discovery and Exploitation of CVE-2022-25636
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/dompdf-xss-to-rce-chrome-leaking-envrionment-vars-and-cr8escape.html
Several easy issues this week from leaking envrionment variables, to gaining host code execution and an XSS to RCE.
[00:01:15] Chrome, Edge and Opera - System environment variables leak [CVE-2022-0337]
[00:10:05] [Yoti] Pin Bruteforce Rate-Limiting Bypass
[00:21:58] From XSS to RCE (dompdf 0day)
[00:31:49] cr8escape: New Vulnerability in CRI-O Container Engine [CVE-2022-0811]
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-windows-uaf-branch-prediction-bugs-and-an-io-uring-exploit.html
This time as we get side tracked with a couple discussions, first about security through obscurity, secondly about the nvidia leaks. We also have our usual mix of vulnerabilities this week, a cool exploit in the Linux kernel, a use-after-free in Windows Common Logging File System, and some speculative execution issues.
[00:00:43] Spot the Vuln - Do You Even HMAC?
[00:05:49] Put an io_uring on it: Exploiting the Linux Kernel
[00:26:18] Discussion: Security through Obscurity in the Linux Kernel
[00:34:20] Exploiting a use-after-free in Windows Common Logging File System (CLFS)
[00:43:57] The AMD Branch (Mis)predictor Part 2: Where No CPU has Gone Before [CVE-2021-26341]
[00:56:20] Branch History Injection
[01:04:25] Chat Question: About the Nvidia Leak
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/pascom-rce-autowarp-and-a-gke-container-escape.html
We've got some cloud issues this week, in Azure Automation and GKE Autopilot along with a couple other interesting chains.
[00:02:11] Pascom: The story of 3 bugs that lead to unauthed RCE
[00:12:37] How I Made +$16,500 Hacking CDN Caching Servers - Part 2
[00:17:16] AutoWarp Microsoft Azure Automation Vulnerability
[00:23:19] Container Escape to Shadow Admin: GKE Autopilot Vulnerabilities
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/dirty-pipe-and-analyzing-memory-tagging.html
No spot the vuln this week, but we do have a cool kernel bug, "Dirty Pipe", a look at a stack based overflow: BrokenPrint, and finally some discussion about memory tagging.
[00:00:31] The Dirty Pipe Vulnerability
[00:18:26] BrokenPrint: A Netgear stack overflow
[00:30:21] Security Analysis of MTE Through Examples [BHIL2022]
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/facebook-exploits-pfsense-rce-and-mysqljs-sqli.html
A few interesting issues you this week, a JS race condition in some auth related code for Facebook, some fake prepared queries, and a RCE through sed commands (in pfSense)
[00:00:56] Remote Code Execution in pfSense (2.5.2 and earlier)
[00:06:13] Finding an Authorization Bypass on my Own Website
[00:17:43] More secure Facebook Canvas Part 2: More Account Takeovers
[00:32:43] The perils of the “real” client IP
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/imagegear-jpeg-vulns-netfilter-and-libcurl.html
Quick episode with four somewhat simple bugs in JPEG parsing, a remote memory disclosure in libcurl due to the difference `sizeof(long)` on Linux vs Windows, and a heap out of bounds write in the Linux Kernel.
[00:00:16] Spot the Vuln - One of a Kind
[00:03:14] Accusoft ImageGear JPEG-JFIF Scan header parser out-of-bounds write vulnerability
[00:07:15] Accusoft ImageGear Palette box parser heap-based buffer overflow vulnerability
[00:11:55] Remote memory disclosure vulnerability in libcurl on 64 Bit Windows
[00:19:15] Linux kernel: heap out of bounds write in nf_dup_netdev.c since 5.4
[00:23:03] Overview of GLIBC heap exploitation techniques
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/dynamicweb-rce-vmware-bugs-and-exploiting-github-actions.html
Re-accessing the stup page, an unlikely scenario leaking Github Secrets, and a proxying issue in Carbon Black.
[00:00:34] Logic Flaw Leading to RCE in Dynamicweb 9.5.0 - 9.12.7
[00:06:15] Stealing a few more GitHub Actions secrets
[00:19:31] Catching bugs in VMware: Carbon Black Cloud Workload Appliance and vRealize Operations Manager
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/zynq-7000-secure-boot-bypass-and-compiler-created-bugs.html
Just one vulnerability this week, a secure boot bypass, and some research into detecting compiler introduced bugs. Ending the week with a discussion about how to learn fuzzing.
[00:00:58] Spot the Vuln - All Inclusive HMAC
[00:03:47] Zynq-7000 Secure Boot Bypass [CVE-2021-44850]
[00:19:32] Cross-Architecture Testing for Compiler-Introduced Security Bugs
[00:35:02] Question: Learning to Fuzz
[01:03:00] tmp.0ut v2
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/coindesk-zabbix-and-leaking-secrets-through-mirrored-repos.html
Lets talk about "sidedoors" this week, with two vulnerabilities abusing alternative access points, along with an overly verbose error message that actually had some immediate impact, and a look at the challenges of client-sided session.
[00:00:26] CoinDesk API Error Exposes Privileged Token
[00:05:28] A tale of 0-Click Account Takeover and 2FA Bypass.
[00:10:26] Zabbix - A Case Study of Unsafe Session Storage
[00:17:54] Multiple vulnerabilities in Concrete CMS - part2 (PrivEsc/SSRF/etc)
[00:25:15] Finding secrets in mirrored Git repositories
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/another-kernel-tipc-bug-mysql-and-buggy-go.html
This week we discuss taint analysis and where to use it compared with fuzzing, a couple buggy code patterns in Go to be on the lookout for, and another remote stack-overflow in the Kernel TIPC module.
[00:00:14] Spot the Vuln - How Much
[00:03:11] Linux Kernel kCTF VRP Extended
[00:05:39] MindShaRE: When MySQL Cluster Encounters Taint Analysis
[00:24:46] A deeper dive into CVE-2021-39137 - a Golang security bug that Rust would have prevented
[00:38:47] Remote Stack Overflow in Linux Kernel TIPC Module since 4.8 (net/tipc) [CVE-2022-0435]
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/baby-monitor-bugs-grafana-and-twitter-de-anonymization.html
CSRF lives again in the form of CORF, Cross-Origin Request Forgery with an attack against Grafana. We also take a look at some baby monitor issues and a de-anonymization attack against Twitter.
[00:00:28] Cross-origin request forgery against Grafana [CVE-2022-21703]
[00:17:50] Vulnerabilities Identified in Nooie Baby Monitor
[00:26:47] [Twitter] Discoverability by phone number/email restriction bypass
[00:32:40] EarnHub Exploit - Post mortem
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/fastly-infoleak-samba-oob-access-and-pwning-macos.html
A discussion heavy episode this week as we speculate about how some XNU code passed muster, and how to exploit a small overflow and weaponizing a large info-leak.
[00:00:17] Spot the Vuln - From Bits to Bytes
[00:05:09] MacOS 12 Use After Free
[00:13:08] A story of leaking uninitialized memory from Fastly
[00:34:08] Details on a Samba Code Execution Bug [CVE-2021-44142]
[00:46:05] Winning a $31337 Bounty after Pwning Ubuntu and Escaping Google's KCTF Containers [CVE-2022-0185]
[00:49:38] Sha256 Algorithm Explained
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/hacking-google-drive-integrations-and-xss-puzzles.html
A "maybe" issue this week in Ruby's net/http library, some long chains leading to XSS, and a look at abusing parameter injection for SSRF in applications integrating with the Google Drive API.
[00:00:26] [Ruby - net/http] HTTP Header Injection in the set_content_type method
[00:10:22] Don't trust comments
[00:16:54] HigherLogic Community RCE Vulnerability
[00:24:29] Solving DOM XSS Puzzles
[00:37:32] Hacking Google Drive Integrations
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/pwnkit-a-win32k-type-confusion-and-binary-ninja-3-0.html
Binary ninja 3.0 just dropped, lets talk about that, then into pwnkit and a couple kernel bugs, and ending this week off with a discussion about dealing with imposter syndrome.
[00:00:18] Spot the Vuln - Maintain Order
[00:03:52] Binary Ninja 3.0
[00:13:09] PwnKit: Local Privilege Escalation Vulnerability Discovered in polkit’s pkexec [CVE-2021-4034]
[00:27:20] Win32k Window Object Type Confusion [CVE-2022-21882]
[00:34:20] Linux kernel: erroneous error handling after fd_install()
[00:38:26] Question: Dealing with Imposter Syndrome
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/zoho-auth-bypass-a-bogus-bug-and-leaking-microsoft-bug-reports.html
A few unique issues this week, routing issues in ManageEngine, a Little Snitch bypass, an undecodable characters leading to a denial of service.
[00:00:37] CVE-2022-0329 and the problems with automated vulnerability management
[00:19:45] [Omise] XSS via X-Forwarded-Host header
[00:25:44] [FetLife] Specific Payload makes a Users Posts unavailable
[00:31:03] How I could have read your confidential bug reports by simple mail?
[00:36:38] Bypassing Little Snitch Firewall with Empty TCP Packets
[00:45:06] ZohOwned :: A Critical Authentication Bypass on Zoho ManageEngine Desktop Central
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/netusb-rce-a-kernel-heap-overflow-an-xnu-uaf.html
Integer overflows and underflow this week, covering vulns from desktop Zoom clients, to kernel and some routers.
[00:00:19] Spot the Vuln - One Verified JWT, Please
[00:03:27] Zooming in on Zero-click Exploits
[00:12:18] Zooming in on Zero-click Exploits
[00:26:39] XNU kernel use-after-free in mach_msg
[00:34:06] Linux kernel v5.1+ Heap buffer overflow in fs_context.c
[00:36:03] Linux kernel v5.1+ Heap buffer overflow in fs_context.c
[00:42:21] NetUSB RCE Flaw in Millions of End User Routers [CVE-2021-45608]
[00:47:54] Humble Book Bundle: Cybersecurity by Wiley
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/bypassing-box-mfa-bad-aes-key-generation.html
A new security-related humble bundle, MFA bypass in Box, and a a few older style vulnerabilities: lfi2rce, allow-list bypass with an @ sign, and insecure random number seeds.
[00:00:37] Humble Book Bundle: Cybersecurity by Wiley
[00:08:18] CWP CentOS Web Panel - preauth RCE [CVE-2021-45467]
[00:13:37] Stealing administrative JWT's through post auth SSRF [CVE-2021-22056]
[00:17:27] Telenot Complex: Insecure AES Key Generation
[00:25:12] Mixed Messages: Busting Box’s MFA Methods
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/pwning-camera-and-overflowing-your-integers.html
Short episode this week, stack smashing, integer overflowing and a more logical issue. Ending off with a discussion about what to do when you're stuck on CTFs.
[00:00:42] Spot the Vuln - One at a Time
[00:04:15] Uniview PreAuth RCE
[00:06:59] Adobe Acrobat Reader DC annotation gestures integer overflow vulnerability
[00:12:31] Chrome: Interface ID reuse leading to memory corruption in IPC::ChannelAssociatedGroupController
[00:18:31] Question: Unsuccessful getting into CTFs
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/bad-code-and-bad-urls.html
This week is a shorter episode looking at some bad code in mermaid.js and Moodle's Shibboleth plugin, and a bit of research regarding URL parsing issues.
[00:00:44] Orca Security Discovered Two AWS Vulnerabilities
[00:06:44] Cross-Site Scripting (XSS) in mermaid.js
[00:12:41] Pre-Auth RCE in Moodle Part II - Session Hijack in Moodle's Shibboleth
[00:20:24] Exploiting URL Parsing Confusion Vulnerabilities
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/rooting-ubuntu-by-accident-and-samsung-kernel-bugs.html
We are back for the first 2022 binary episode, and its all kernel. Obtaining root through an hours long exploit process on Ubuntu thanks to an invalid free, use-after-free in XNU due to bad locking, and some terrible code in Samsung S20 DSP kernel driver with multiple integer overflows.
[00:00:42] Getting root on Ubuntu through wishful thinking
[00:19:21] XNU: heap-use-after-free in inm_merge
[00:29:42] Kernel LPE in the Vision DSP Kernel Driver [CVE-2021-25467]
[00:34:34] Kernel LPE in the Vision DSP Kernel Driver's ELF Linker [CVE-2021-25475]
[00:37:16] Linux Heap Exploitation - Part 3
[00:38:37] PS4 CCP Crypto Bug
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/rocketchat-rce-flickr-and-a-critical-smart-contract-bug.html
More cases of developers make insecure assumptions and getting owned because of it. This week we've got a Flickr account takeover, escalating restricted SSRF into something more useful, and XSS to RCE in Rocket.Chat.
[00:00:34] Rocket.Chat Client-side Remote Code Execution
[00:10:14] Flickr Account Takeover
[00:24:33] Turning bad SSRF to good SSRF: Websphere Portal
[00:34:47] Polygon Lack Of Balance Check Bugfix Postmortem
[00:45:22] Fuzzing for XSS via nested parsers condition
[00:52:35] Cache Poisoning at Scale
[00:54:48] Fixing the Unfixable: Story of a Google Cloud SSRF
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/an-android-kernel-bug-a-chrome-edge-exploit.html
Hex-rays/Adobe cross-over as they move to a subscription model and we are not too happy about it, we also discuss a few interesting bugs this week from an odd optimization and a signedness bug in Chrome, to some mishandled null-bytes in runc, and a subtle object-state confusion in the Linux kernel
[00:00:21] Spot the Vuln - Revenge of the Average
[00:04:38] Hex-rays is moving to a Subscription model
[00:32:49] Understanding the Root Cause of a Chrome Bug from Pwn2Own 2021 [CVE-2021-21220]
[00:44:30] runc/libcontainer: insecure handling of null-bytes in bind mount sources
[00:49:50] refcount increment on mid-destruction file [CVE-2021-1048]
[00:56:30] Overview of V8 Exploitation
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/log4j-rce-coming-to-a-service-near-you-and-ublock-css-injection.html
Log4Shell RCE spawns a lot of discussion this episode, but we also look at a W10 RCE, Google SSRF and some CSS injection in uBlock.
[00:00:29] Apache Log4j2 jndi RCE
[00:29:50] Windows 10 RCE: The exploit is in the link
[00:46:00] SSRF vulnerability in AppSheet - Google VRP
[00:52:43] uBlock, I exfiltrate: exploiting ad blockers with CSS
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/mediatek-yet-another-chrome-bug-and-bigsig.html
A few easy issues this week, but some discussion about fuzzing campaigns and measurements and bypassing modern mitigations.
[00:00:20] Spot the Vuln - Just a Normal Walk
[00:06:10] This shouldn't have happened: A vulnerability postmortem
[00:22:52] Looking for vulnerabilities in MediaTek audio DSP
[00:35:23] Exploiting CVE-2021-43267
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/kvm-bugs-and-an-ios-iomfb-kernel-exploit.html
Starting off this week with the new humble bundle and some discussion about hacking books. Then onto the vulns, some OOB access, uninitalized memory, and iOS exploit strategy.
[00:00:17] Spot the Vuln - Counting Widgets
[00:02:36] Humble Book Bundle: Hacking by No Starch Press
[00:17:14] KVM: SVM: out-of-bounds read/write in sev_es_string_io
[00:23:42] Anker Eufy Homebase 2 home_security CMD_DEVICE_GET_SERVER_LIST_REQUEST out-of-bounds write vulnerability
[00:34:14] Apple ColorSync: use of uninitialized memory in CMMNDimLinear::Interpolate
[00:40:16] Popping iOS <=14.7 with IOMFB
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/gitlab-prototype-pollution-and-some-authentication-bypasses.html
Short but sweet episode this week, prototype pollution, crypto issues, SSRF and some weird authentication.
[00:00:46] Arbitrary command execution in Gerapy [CVE-2021-32849]
[00:06:03] [jitsi-meet] Authentication Bypass when using JWT w/ public keys
[00:07:41] [jitsi-meet] Authentication Bypass when using JWT w/ public keys
[00:10:24] [shopify] A non-privileged user may create an admin account in Stocky
[00:13:21] [#0008] URL whitelist bypass in https://cxl-services.appspot.com
[00:19:20] [GitLab] Stored XSS via Mermaid Prototype Pollution vulnerability
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/hacking-neural-nets-a-chrome-webrtc-uaf-and-pwning-windows.html
Some mroe kernel bugs this week as we look at bugs in Samsung's NPU driver (Android), Linux, and the WIndows Kernel.
[00:00:17] Spot the Vuln - Once Again - Solution
[00:03:12] Google Chrome WebRTC addIceCandidate use after free vulnerability
[00:08:53] Linux: UAF read: SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect())
[00:15:08] Fall of the machines: Exploiting the Qualcomm NPU (neural processing unit) kernel driver
[00:31:13] POC2021 – Pwning the Windows 10 Kernel with NTFS and WNF Slides
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/big-bounties-by-exploiting-webkit-s-csp-concrete-cms-bugs.html
What happens when a vendor refused to fix your bug? Well you can go claim a bunch of bounties with it. We also talk about some novel request smuggling research on this episode.
[00:00:58] Multiple Concrete CMS vulnerabilities ( part1 - RCE )
[00:12:02] Exploiting CSP in Webkit to Break Authentication & Authorization
[00:24:57] T-Reqs: HTTP Request Smuggling with Differential Fuzzing
[00:35:30] An Illustrated Guide to Elliptic Curve Cryptography Validation
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/ddr4-rowhammer-azure-bugs-essential-0days-and-backdoored-ida.html
North Korea is at it again targeting researchers, 0day hoarding, breaching secure hardware, and fuzzing on this weeks episode.
[00:01:15] Spot the Vuln - Beyond the Grave
[00:03:50] ESET Research discovered a trojanized IDA Pro installer, distributed by the #Lazarus APT group
[00:12:39] Why Zero-Days Are Essential to Security - Randori
[00:29:32] Blacksmith - Rowhammer Returns
[00:43:04] Fuzzing Microsoft's RDP Client using Virtual Channels: Overview & Methodology
[00:57:45] Microsoft Azure Sphere Security Monitor SMSyscallCommitImageStaging stage-without-manifest denial of service vulnerability
[01:04:53] Microsoft Azure Sphere Kernel GPIO_SET_PIN_CONFIG_IOCTL information disclosure vulnerability
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/rust-in-the-web-a-special-guest-and-some-bad-crypto.html
We are joined by Bastian Gruber to start the episode with a discussion about Rust. Then we'll dive into a few interesting vulnerabilities this week including yet another ECDSA implementation issue and some header smuggling research.
[00:00:40] Rust Discussion with Bastian Gruber (Use the code poddayzero21 for 35% off Manning books)
[00:46:29] Arbitrary Signature Forgery in Stark Bank ECDSA Libraries [CVE-2021-43572, CVE-2021-43570, CVE-2021-43569, CVE-2021-43568, CVE-2021-43571]
[01:02:37] Becoming A Super Admin In Someone Elses Gsuite Organization And Taking It Over
[01:06:52] Private Blog Content Disclosed in Atom Feed
[01:08:29] Practical HTTP Header Smuggling: Sneaking Past Reverse Proxies to Attack AWS and Beyond
[01:17:01] IDOR through MongoDB Object IDs Prediction
[01:18:45] History of Cross-Site History Leaking
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-too-trusty-trustzone-and-a-few-linux-kernel-bugs.html
Some interesting vulnerability envrionments this week, some Trusted App issues, a couple Linux Kernel vulns, and a look at memory safety issues in unsafe Rust.
[00:00:19] Spot The Vuln - Extract All The Things - Solution
[00:03:43] Gerbv drill format T-code tool number out-of-bounds write vulnerability
[00:13:27] Vulnerable tzdemuxerservice TA on Samsung TVs (J-series)
[00:27:06] Remote Linux Kernel Heap Overflow | TIPC Module Allows Arbitrary Code Execution [CVE-2021-43267]
[00:33:49] SLUB overflow [CVE-2021-42327]
[00:43:50] Rudra: Finding Memory Safety Bugs in Rust at the Ecosystem Scale
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-macos-sip-bypass-an-xss-fiesta.html
A discussion heavy episode this week, starting off with the "new" Trojan Source attackers, and then talking about a handful of interesting vulnerabilities.
[00:00:18] Trojan Source Attacks
[00:24:07] [SmartStoreNET] Malicious Message leading to E-Commerce Takeover
[00:34:24] [Chrome] Cross-Site Scripting in New-Tab Page [CVE-2021-37999]
[00:39:48] [StreamLabs] Steal access_token via open redirect
[00:43:18] Microsoft finds new macOS vulnerability, Shrootless, that could bypass System Integrity Protection
[00:50:04] Android security checklist: WebView
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/type-confusion-in-android-nfc-php-fpm-local-privilege-escalation-and-callbackhell.html
This week we dive into PHP-FPM internals to look at escelating from a worker process to the root process, anotehr GDI bug, and a type confusion.
[00:00:18] Spot the Vuln - Over the Edge - Solution
[00:03:40] Trick & Treat! Paying Leets and Sweets for Linux Kernel privescs and k8s escapes
[00:10:33] Android NFC: Type confusion due to race condition during tag type change
[00:14:50] PHP-FPM local root vulnerability
[00:28:26] GitHub - ly4k/CallbackHell: Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
[00:29:54] GitHub - ly4k/CallbackHell: Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
[00:36:39] This bug doesn’t exist on x86: Exploiting an ARM-only race condition
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/discourse-sns-rce-a-stored-xss-in-gitlab-and-a-reddit-race-condition.html
A couple unique vulns this week involving getting extra coins on Reddit, and bypassing certificate checking for a Discourse RCE.
[00:00:40] Agent 007: Pre-Auth Takeover of Build Pipelines in GoCD
[00:09:50] Race condition leads to Inflation of coins when bought via Google Play Store
[00:15:11] [GitLab] Stored XSS in Mermaid when viewing Markdown files
[00:33:28] Discourse SNS webhook RCE
[00:47:28] [GitLab] Stored XSS in Mermaid when viewing Markdown files
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-kernel-race-sudump-and-a-chrome-garbage-collector-bug.html
We start off this week with a look at in-the-wild 0days from the past seven years, before diving into some pretty awesome bugs this week including a OOB access in Squirrel (programming language), a couple Linux kernel issues and a Chrome garbage collector bug.
[00:00:22] Spot The Vuln - Just Be Positive - Solution
[00:06:42] Overview of 0days seen in the wild the last 7 years
[00:18:33] Squirrel Sandbox Escape allows Code Execution in Games and Cloud Services
[00:29:15] SuDump: Exploiting suid binaries through the kernel
[00:38:09] How a simple Linux kernel memory corruption bug can lead to complete system compromise
[00:55:46] Chrome in-the-wild bug analysis [CVE-2021-37975]
[01:12:40] FuzzCon Europe 2021
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-slack-attack-and-a-mysql-scientific-notation-bug.html
Just four bugs this week, but that all are somewhat interesting, from an Instagram 2FA removal, deanonymizing Slack users, a MySQL bug, and how to get cheap reddit coins.
[00:00:31] How I was able to revoke your Instagram 2FA
[00:10:02] Abusing Slack's file-sharing functionality to de-anonymise fellow workspace members
[00:29:41] A Scientific Notation Bug in MySQL left AWS WAF Clients Vulnerable to SQL Injection
[00:35:38] Reddit disclosed on HackerOne: IDOR to pay less for coin purchases...
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/webkit-bugs-a-windows-race-and-house-of-io-improved.html
Tianfu Cup happened this week, we also got some cool windows and webkit issues, along side an improvment to the House of IO attack
[00:00:17] Spot The Vuln - Prepare To Inject - Solution
[00:03:14] Tianfu Cup 2021
[00:09:10] Six Privilege Escalations and an Info Leak in Windows [Blackswan vulnerabilities]
[00:25:16] nt!ObpCreateSymbolicLinkName Race Condition Write-Beyond-Boundary
[00:31:37] CVE-2021-30858: Use-after-free in WebKit
[00:44:53] WebKit: heap-use-after-free in DOMWindow::open
[00:50:23] House of IO - Heap Reuse
[01:02:06] Getting started in macOS security
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/websocket-hijacking-github-review-bypass-and-sqli-to-rce.html
Just a handful of traditional vulns this week: IDOR, CSRF, SQLi, a logic vuln and zi's boomer side starts to show.
[00:00:18] Remote Chaos Experience
[00:03:30] [Concrete CMS] Stored unauth XSS in calendar event via CSRF
[00:08:47] ‘Websocket Hijacking’ to steal Session_ID of victim users
[00:14:17] IDOR + Account Takeover leads to PII leakage
[00:27:27] Bypassing required reviews using GitHub Actions
[00:33:20] How I Escalated a Time-Based SQL Injection to RCE
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/hyperkit-bugs-an-open5gs-stack-overflow.html
Uninitialized variables everywhere in Hyperkit, and a Open5GS stack-based buffer overflow.
[00:00:19] Spot The Vuln - Mind the Sign - Solution
[00:00:51] Spot The Vuln - Mind the Sign - Solution
[00:03:53] In EU no contract can prevent you from decompiling software you bought, if your goal is fixing a bug.
[00:11:05] Open5GS Stack Buffer Overflow During PFCP Session Establishment on UPF [CVE-2021-41794]
[00:14:00] Open5GS Stack Buffer Overflow During PFCP Session Establishment on UPF [CVE-2021-41794]
[00:15:27] Code execution outside the virtualized guest in hyperkit
[00:19:45] Disclosure of the host memory into the virtualized guest in hyperkit [CVE-2021-32847]
[00:30:14] The Challenges of Fuzzing 5G Protocols
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/sharepoint-rce-an-apache-path-traversal.html
A simple to exploit path traversal in Apache...in 2021, a one-time-password defeat by having it be send to the attacker and victim, and more JWT issues.
[00:00:24] critical: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49
[00:07:47] [Zomato] Improper Validation at Partners Login
[00:12:25] How did I earned 6000$ from tokens and scopes in one day
[00:22:13] Remote Code Execution in SharePoint via Workflow Compilation [CVE-2021-26420]
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/chrome-exploits-and-a-firefox-update-bug.html
This week we start off with a nice introduction to signedness issues before diving into a couple Chrome bugs (type confusion and use-after-free)
[00:00:17] Spot the Vuln - I Can't Even (Solution)
[00:03:46] Fixing a Security Bug by Changing a Function Signature
[00:11:58] Chrome in-the-wild bug analysis: CVE-2021-30632
[00:21:25] GHSL-2021-124: Use After Free (UAF) in Chrome - CVE-2021-30528
[00:26:56] Phrack - Issue 70
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/gatekeeper-bypass-opera-rce-and-prototype-pollution.html
A few interesting issues this week, ranging from a macOS Gatekeeper bypass, some oauth flow issues in Facebook, and even an RCE through the password field.
[00:00:37] The discovery of Gatekeeper bypass CVE-2021-1810
[00:08:50] Multiple bugs allowed malicious Android Applications to takeover Facebook/Workplace accounts
[00:22:50] Cisco Hyperflex: How We Got RCE Through Login Form and Other Findings
[00:30:50] XSS to RCE in the Opera Browser
[00:35:28] Prototype Pollution
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/kernel-uafs-and-a-parallels-vm-escape.html
This week we we've got a couple Linux kernel Use-After-Frees and a Parallels guest to host escape.
[00:00:18] Spot The Vuln - Solution
[00:02:53] ChaffCTF
[00:17:10] Kernel Vmalloc Use-After-Free in the ION Allocator
[00:25:31] Linux Kernel: Exploitable vulnerability in io_uring
[00:35:09] Parallels Desktop Guest to Host Escape
[00:46:35] Igor: Crash Deduplication Through Root-Cause Clustering
[00:51:10] Igor: Crash Deduplication Through Root-Cause Clustering
[00:57:57] Deus x64: A Pwning Campaign | RET2 Systems
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/ios-0days-apache-dubbo-rces-and-npm-bugs.html
Some of Apple's XPC services are leaking information, Finder has an RCE, and some CodeQL use to find many RCEs in Apache Dubbo.
[00:00:38] macOS Finder RCE
[00:06:11] AWS WorkSpaces Remote Code Execution [CVE-2021-38112]
[00:10:09] Disclosure of three 0-day iOS vulnerabilities and critique of Apple Security Bounty program
[00:26:51] 5 RCEs in npm for $15,000
[00:42:32] Apache Dubbo: All roads lead to RCE
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-curl-uaf-iphone-forcedentry-and-a-crazy-hp-omen-driver.html
We start off the week with a crazy driver that exposes some powerful primitives, a use-after-free in curl, we speculate a bit about exploiting a 2-byte information disclosure, and talk about FORCEDENTRY.
[00:00:20] Spot The Vuln - Minimax (Solution)
[00:04:30] HP OMEN Gaming Hub Privilege Escalation Bug Hits Millions of Gaming Devices [CVE-2021-3437]
[00:12:32] Nitro Pro PDF JavaScript document.flattenPages JSStackFrame stack-based use-after-free vulnerability
[00:19:31] Microsoft Azure Sphere Security Monitor SMSyscallPeripheralAcquire information disclosure vulnerability
[00:27:24] [curl] UAF and double-free in MQTT sending [CVE-2021-22945]
[00:34:41] Analyzing Pegasus Spyware's Zero-Click iPhone Exploit ForcedEntry
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-flickr-csrf-gitlab-omigod-azure-again.html
Some high impact vulnerabilities this week, CSRF in account deletion, remote code execution as root, and an apache "0day" that discloses PHP source.
[00:00:23] [Flickr] CSRF in Account Deletion feature
[00:03:38] OMIGOD: Critical Vulnerabilities in OMI Affecting Countless Azure Customers
[00:23:38] How I found my first Adobe Experience Manager related bug.
[00:27:41] [GitLab] Stored XSS in main page of a project
[00:31:01] [Mattermost] Privilege Escalation leading to post in channel without having privilege
[00:34:15] Hacking CloudKit - How I accidentally deleted your Apple Shortcuts
[00:48:52] Apache 0day bug, which still nobody knows of, and which was fixed accidentally
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/netgear-smart-switches-spookjs-parallels-desktop.html
This week we've got an awesome chain of attacks in NETGEAR smart switches, a speculative type confusion (Spook.js) and an integer overflow leading to HTTP Request Smuggling
[00:03:40] Security researchers fed up with Apple’s bug bounty program
[00:18:26] Demon's Cries vulnerability (some NETGEAR smart switches)
[00:22:21] Draconian Fear vulnerability (some NETGEAR smart switches)
[00:25:31] Seventh Inferno vulnerability (some NETGEAR smart switches)
[00:34:33] Spook.js - Speculative Type Confusion
[00:50:36] Critical vulnerability in HAProxy
[00:55:45] Ribbonsoft dxflib DL_Dxf::handleLWPolylineData Heap-Based Buffer Overflow Vulnerability
[01:03:43] Analysis of a Parallels Desktop Stack Clash Vulnerability and Variant Hunting using Binary Ninja
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/reused-vmware-exploits-escaping-azure-container-instances.html
Some drama with the VMWare bounty program, and then a few straight forward vulnerabilities and a really cool Azure Container Instances escape and takeover.
[00:01:51] Exploit Fired At VMWare leaked to Nuclei Project.
[00:14:02] Bypassed! and uploaded a sweet reverse shell
[00:18:51] Local File Read via Stored XSS in The Opera Browser
[00:27:14] NETGEAR D7000 Authentication Bypass
[00:33:34] GitHub Actions check-spelling community workflow - GITHUB_TOKEN leakage via advice.txt symlink
[00:42:25] Create free Shopify application credits
[00:47:24] Cross-Account Container Takeover in Azure Container Instances
[00:58:59] IAM Vulnerable - An AWS IAM Privilege Escalation Playground
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
A tricky to exploit WhatsApp vulnerability, but still an interesting bug, several Bhyve vulnerabilities, and a named bluetooth vuln (Braktooth)
Links and summaries are available on our website: https://dayzerosec.com/podcast/escaping-the-bhyve-whatsapp-braktooth.html
[00:00:00] Introduction + The Future
[00:02:08] Spot The Vuln Solution
[00:07:25] Replay-based attack on Honda and Acura vehicles
[00:15:54] A Heap-based Buffer Overflow Bug in the MySQL InnoDB memcached Plugin [CVE-2021-2429]
[00:25:44] Vulnerability in WhatsApp could have led to data exposure of users
[00:32:26] Code execution outside the virtualized guest in bhyve [CVE-2021-29631]
[00:40:59] Your vulnerability is in another OEM!
[01:01:36] BrakTooth
[01:09:00] HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs
The DAY[0] Podcast has two weekly episodes that are streamed live on Twitch (https://www.twitch.tv/dayzerosec)
Mondays at 3pm Eastern we focus on vulnerabilities that would be of interest to bounty hunters, and on Tuesdays at 7:00pm Eastern we focus on low-level vulnerabilities.
You can also join our discord: https://discord.gg/daTxTK9 Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Multiple account takeover vulnerabilities in this episode with three cross-origin communication vulnerabilities in Facebook, an odd OTP endpoint in SnapChat and an open redirect in JetBrains leaking your JWT.
Links and summaries are available on our website: https://dayzerosec.com/podcast/takeover-a-facebook-snapchat-or-jetbrains-account.html
[00:00:00] Introduction + The Future
[00:08:37] How MarkMonitor left 60,000 domains for the taking
[00:17:21] Eye for an eye: Unusual single click JWT token takeover
[00:25:20] How I found a primitive but critical broken access control vulnerability in YouTrack…
[00:29:02] Ghost CMS 4.3.2 - Cross-Origin Admin Takeover
[00:33:47] Tale of $126k worth of bugs that lead to Facebook Account Takeovers
[00:47:15] Improper Authentication - any user can login as other user
[00:53:35] Illogical Apps - Exploring and Exploiting Azure Logic Apps
The DAY[0] Podcast has two weekly episodes that are streamed live on Twitch (https://www.twitch.tv/dayzerosec)
Mondays at 3pm Eastern we focus on vulnerabilities that would be of interest to bounty hunters, and on Tuesdays at 7:00pm Eastern we focus on low-level vulnerabilities.
You can also join our discord: https://discord.gg/daTxTK9 Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Another short episode this week covering graphql attacks, a couple NoSQL injections, a few misconfigurations and a cool attack to reset monotonic counters on a Mifare card.
[00:01:25] From CTFs to the Real World
[00:02:50] [GitHub] Exploits and Malware Policy Updates
[00:07:37] Mobile app developers’ misconfiguration of third party services leave personal data of over 100 million exposed
[00:13:49] QNAP MusicStation/MalwareRemover Pre-Auth RCE
[00:17:45] 2FA Bypass via Forced Browsing
[00:24:22] That single GraphQL issue that you keep missing
[00:32:22] Remote code execution in squirrelly [CVE-2021-32819]
[00:44:30] NoSQL Injections in Rocket.Chat
[00:49:15] RFID: Monotonic Counter Anti-Tearing Defeated
[00:56:24] A Wormable Code Execution Bug in HTTP.sys [CVE-2021-31166]
[01:04:15] Fuzzing iOS code on macOS at native speed
[01:05:07] RuhrSec 2018: "Keynote: Weird machines, exploitability and unexploitability", Thomas Dullien
[01:07:58] Browser fuzzing at Mozilla
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
A shorter episode, but some really cool vulns none-the-less, from mitigation bypassing on D-Link routers, to a new set of WiFi protocol design flaws.
[00:01:14] Security Vulnerability Detection Using Deep Learning Natural Language Processing
[00:08:12] Stealing secrets with Rust Macros proof-of-concept via VSCode
[00:13:21] [GitLab] RCE when removing metadata with ExifTool
[00:19:47] Terminal escape injection in AWS CloudShell
[00:23:54] Cross-browser tracking vulnerability in Tor, Safari, Chrome and Firefox
[00:34:27] Fei Protocol Flashloan Vulnerability Postmortem
[00:44:46] One-click reflected XSS on Instagram
[00:47:24] D-Link Vulnerability [CVE-2021-27342]
[00:51:52] Experimental Security Assessment of Mercedes-Benz Cars
[01:01:08] FragAttacks: Fragmentation & Aggregation Attacks
[01:10:57] Dell ‘dbutil_2_3.sys’ Kernel Exploit [CVE-2021-21551]
[01:11:45] googleprojectzero/Hyntrospect
[01:13:01] IDA Free w/ Cloud Decompiler Dropped
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
Kicking off the week with some awesome vulns, an "almost" padding oracle in Azure Functions, a race-condition in AWS Cognito, some sound engine bugs, and a Foxit Reader Use-after-free.
[00:00:52] Arbitrary Code Execution in the Universal Turing Machine [CVE-2021-32471]
[00:03:18] Detecting and annoying Burp users
[00:08:08] Enabling Hardware-enforced Stack Protection (cetcompat) in Chrome
[00:13:00] Password reset code brute-force vulnerability in AWS Cognito
[00:16:52] ASUS GT-AC2900 Authentication Bypass [CVE-2021-32030]
[00:20:10] The False Oracle - Azure Functions Padding Oracle Issue
[00:25:30] How I Hacked Google App Engine: Anatomy of a Java Bytecode Exploit
[00:38:01] Workplace by Facebook | Unauthorized access to companies environment
[00:42:39] Exploiting the Source Engine (Part 2) - Full-Chain Client RCE in Source using Frida
[00:53:11] [Valve] OOB reads in network message handlers leads to RCE
[01:01:07] Security probe of Qualcomm MSM data services
[01:05:17] Foxit Reader FileAttachment annotation use-after-free vulnerability
[01:09:45] Attack llvmpipe Graphics Driver from Chromium
[01:16:00] Privilege Escalation Via a Use After Free Vulnerability In win32k [CVE-2021-26900]
[01:26:25] 21Nails: Multiple vulnerabilities in Exim
[01:27:22] nRF52 Debug Resurrection (APPROTECT Bypass)
[01:28:56] Capture The Flag - Discussion Video
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
Big episode this week, with a lot of discussion about CTFs, kernel drama, and Github's exploit policy. Then some really interesting exploit strategies on Tesla and Netgear, along with some simple, yet deadly issues in Wordpress and Composer.
[00:00:32] An Update on the UMN Affair
[00:11:29] [GitHub] Exploits and Malware Policy Updates
[00:18:22] OOO - DEF CON CTF
[00:34:23] BadAlloc - Memory Allocation Vulnerabilities
[00:40:15] I See Dead μops: Leaking Secrets via Intel/AMDMicro-Op Caches
[00:54:43] Brave - Stealing your cookies remotely
[00:57:37] Facebook account takeover due to unsafe redirects after the OAuth flow
[01:03:11] WordPress 5.7 XXE Vulnerability
[01:05:43] PHP Supply Chain Attack on Composer
[01:10:25] Multiple Issues in Libre Wireless LS9 Modules
[01:14:50] macOS Gatekeeper Bypass
[01:19:28] Linux Kernel /proc/pid/syscall information disclosure vulnerability
[01:24:08] Remote Zero-Click Exploit in Tesla Automobiles
[01:31:00] NETGEAR Nighthawk R7000 httpd PreAuth RCE
[01:34:43] Parallels Desktop RDPMC Hypercall Interface and Vulnerabilities
[01:39:24] Exploiting Undocumented Hardware Blocks in the LPC55S69
[01:40:05] python stdlib "ipaddress" - Improper Input Validation [CVE-2021-29921]
[01:40:35] Ham Hacks: Breaking Into Software-defined Radio
[01:41:59] gand3lf/heappy: A happy heap editor to support your exploitation process
[01:43:38] LiveQL Episode II: The Rhino in the room
Some drama in the Linux Kernel and so many vulns resulting in code execution in Homebrew, GitLab, an air fryer, Source engine, Super Mario Maker, Adobe Reader and the Linux Kernel.
[00:00:32] On the Feasibility of Stealthily Introducing Vulnerabilities in Open-Source Software via Hypocrite Commits
[00:15:18] Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective
[00:22:30] [Ubuntu] OverlayFS LPE
[00:25:48] Synology DSM AppArmor synosearchagent misconfiguration
[00:28:22] [GitLab] RCE via unsafe inline Kramdown options
[00:35:25] [Homebrew] Broken parsing of Git diff allows an attacker to inject arbitrary Ruby scripts to Casks on official taps
[00:41:52] Remote code execution vulnerabilities in Cosori smart air fryer
[00:48:54] Source engine remote code execution via game invites [CVE-2021-30481]
[01:00:40] Discussion: Should programs be banned from Hackerone
[01:08:54] [Nintendo|3DS] Buffer Overflow in Super Mario Maker level decompression
[01:15:12] PrusaSlicer Obj.cpp load_obj() out-of-bounds write vulnerability
[01:20:12] Analysis of a use-after-free Vulnerability in Adobe Acrobat Reader DC
[01:31:21] Designing sockfuzzer, a network syscall fuzzer for XNU
[01:37:26] gaasedelen/tenet: A Trace Explorer for Reverse Engineers
[01:40:41] tmp.0ut
[01:44:35] Phœnix exploit / iOS 9.3.5
[01:46:02] Experiences with Apple Security Bounty
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the vide
Authentication bypasses, a Duo 2FA bypass, RCEs, a VM escape, and some reverse engineering writeups.
[00:00:26] Project Zero: Policy and Disclosure: 2021 Edition
[00:06:27] Remote exploitation of a man-in-the-disk vulnerability in WhatsApp [CVE-2021-24027]
[00:14:06] Allow arbitrary URLs, expect arbitrary code execution
[00:18:29] GHSL-2020-340: log injection in SAP/Infrabox
[00:22:21] Duo Two-factor Authentication Bypass
[00:31:22] [Grammarly] Ability to DOS any organization's SSO and open up the door to account takeovers
[00:35:50] From 0 to RCE: Cockpit CMS
[00:41:41] Big Bugs: Bitbucket Pipelines Kata Containers Build Container Escape
[00:48:52] xscreensaver: raw socket leaked
[00:51:31] Reverse-engineering tcpip.sys: mechanics of a packet of the death (CVE-2021-24086)
[00:59:49] Exploiting System Mechanic Driver
[01:03:27] Zero-day vulnerability in Desktop Window Manager used in the wild [CVE-2021-28310]
[01:08:33] Windows Defender mpengine remote code execution [CVE-2021-1647]
[01:13:55] ELECTRIC CHROME - CVE-2020-6418 on Tesla Model 3
[01:20:36] QEMU and U: Whole-system tracing with QEMU customization
[01:21:31] Learning Resource - Hexterisk Blog
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
MD5 is trending in 2021...a few kernel vulnerabilities, and some drama around pwn2own.
[00:00:26] Update on git.php.net incident
[00:06:38] Pwn2Own 2021 - Results
[00:18:53] CSGO exploit allows hackers to steal passwords, and Valve hasn't fixed it
[00:26:20] I Built a TV That Plays All of Your Private YouTube Videos
[00:33:27] Leak of all accounts mail login md5 pass
[00:37:11] What if you could deposit money into your Betting account for free?
[00:41:41] Zero click vulnerability in Apple’s macOS Mail
[00:44:54] Stored XSS on the DuckDuckGo search results page
[00:49:13] Breaking GitHub Private Pages for $35k
[00:57:03] Royal Flush: Privilege Escalation Vulnerability in Azure Functions
[01:01:38] QNAP Pre-Auth CGI_Find_Parameter RCE
[01:04:14] Domain Time II Upgrade Attack
[01:07:12] Four Bytes of Power: exploiting CVE-2021-26708 in the Linux kernel
[01:15:57] BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
[01:28:05] BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
[01:29:07] Exploiting Windows RPC to bypass CFG mitigation
[01:34:00] security things in Linux v5.9
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
One episode and several failed attempts to fix vulnerabilities, an interesting Rocket.Chat XSS and an exploitable TXT file abusing some weird features.
[00:00:46] nOtWASP bottom 10: vulnerabilities that make you cry
[00:07:28] Click here for free TV! - Chaining bugs to takeover Wind Vision accounts
[00:15:28] Elevate Yourself to Admin in Umbraco CMS 8.9.0 (CVE-2020-29454)
[00:23:19] "netmask" npm package vulnerable to octal input data [CVE-2021-28918]
[00:28:38] [HackerOne] Jira integration plugin Leaked JWT
[00:33:20] [Kaspersky] A vulnerability in KAVKIS 2020 products family allows full disabling of protection
[00:38:06] [Rocket.Chat] Account takeover via XSS
[00:43:18] This man thought opening a TXT file is fine, he thought wrong. macOS [CVE-2019-8761]
[00:52:41] Who Contains the Containers?
[01:06:11] Getting Code Execution on Apache Druid [CVE-2021-25646]
[01:12:59] Security Analysis of AMD Predictive Store Forwarding
[01:19:58] Pluralsight free for April
[01:21:54] Pwn2Own 2021
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
Long episode this week as we talk about Google's decision to thwart a western intelligence operation (by fixing vulns), multiple authorization and authentication issues, and of course some memory corruption.
[00:00:46] Google's unusual move to shut down an active counterterrorism operation being conducted by a Western democracy
[00:21:48] PHP Git Compromised
[00:32:24] [Google Chrome] File System Access API vulnerabilities
[00:37:58] Indexing of urls on the "External link warning" pages discloses many vulnerable endpoints from the past and unlisted videos/photos
[00:42:05] GHSL-2020-323: Template injection in a GitHub workflow of geek-cookbook
[00:47:58] H2C Smuggling in the Wild
[00:53:27] H2C Smuggling in the Wild
[00:57:18] Multiple Authorization bypass issues in Google's Richmedia Studio
[01:06:15] DD-WRT UPNP Buffer Overflow
[01:10:36] GHSL-2021-045: Integer Overflow in GLib - [CVE-2021-27219]
[01:14:12] Qualcomm IPQ40xx: Analysis of Critical QSEE Vulnerabilities
[01:22:50] One day short of a full chain: Part 3 - Chrome renderer RCE
[01:35:37] Chat Question: Where to learn about Windows Heap exploitation
[01:39:44] Adobe Reader CoolType arbitrary stack manipulation in Type 1/Multiple Master othersubrs 14-18
[01:46:26] Eliminating XSS from WebUI with Trusted Types
[01:54:19] Hidden OAuth attack vectors
[02:03:05] The Future of C Code Review
[02:15:03] Microsoft Exchange Server-Side Request Forgery [CVE-2021-26855]
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
Time to rewrite Linux in Rust? Probably not, but it has landed in linux-next which we talked about. We also look at a couple interesting GitHub vulns, and talk about fuzzing.
[00:00:28] Rust in the Linux Kernel
[00:13:40] Two Undocumented Instructions to Update Microcode Discovered
[00:19:06] DuckDuckGo Privacy Essentials vulnerabilities: Insecure communication and Universal XSS
[00:26:46] Abusing VoIPmonitor for Remote Code Execution
[00:32:18] Stealing arbitrary GitHub Actions secrets
[00:40:29] How we found and fixed a rare race condition in our session handling
[00:49:05] GitLab - Ability To Delete User(s) Account Without User Interaction
[00:52:49] New Old Bugs in the Linux Kernel
[01:00:33] Fuzzing: FastStone Image Viewer [CVE-2021-26236]
[01:06:53] A Replay-Style Deserialization Attack Against SharePoint [CVE-2021-27076]
[01:12:38] One day short of a full chain: Part 2 - Chrome sandbox escape
[01:18:58] Code execution in Wireshark via non-http(s) schemes in URL fields
[01:21:59] Attacking and Defending OAuth 2.0 (Part 2 of 2: Attacking OAuth 2.0 Authorization Servers)
[01:30:37] Fast Coverage-guided Fuzzing with Honeybee and Intel Processor Trace
[01:42:00] Pulling Bits From ROM Silicon Die Images: Unknown Architecture
[01:42:28] 0dayfans.com
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
RCE while cloning a Git repo, injecting video into network cameras, and stealing logins with HTML injection when XSS isn't possible.
[00:00:32] Critics fume after Github removes exploit code for Exchange vulnerabilities
[00:09:21] CCTV: Now You See Me, Now You Don't
[00:13:47] CSRF to RCE Chain in Zabbix [CVE-2021-27927]
[00:19:44] Stealing Froxlor login credentials using dangling markup [CVE-2020-29653]
[00:25:29] git: malicious repositories can execute remote code while cloning
[00:30:49] git: malicious repositories can execute remote code while cloning
[00:33:37] Dell OpenManage Server Administrator File Read [CVE-2020-5377]
[00:38:55] Windows Containers: ContainerUser has Elevated Privileges
[00:40:18] Windows Containers: Host Registry Virtual Registry Provider Bypass EoP
[00:42:34] F5 Big IP - ASM stack-based buffer overflow in is_hdr_criteria_matches
[00:48:59] F5 Big IP - TMM uri_normalize_host infoleak and out-of-bounds write
[00:59:37] One day short of a full chain: Part 1 - Android Kernel arbitrary code execution
[01:08:07] Exploiting a “Simple” Vulnerability, Part 2 – What If We Made Exploitation Harder?
[01:09:11] Playing in the (Windows) Sandbox
[01:09:39] Regexploit: DoS-able Regular Expressions
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
This week we get to take a look into some basic heap grooming techniques as we examine multiple heap overflows. We also briefly discuss the hand-on (by the DoD and Synack) assessment of the "unhackable" morpheus chip, and briefly discuss the new-ish paper claiming to defeat RSA.
[00:00:53] "This destroys the RSA cryptosystem." - Fast Factoring Integers by SVP Algorithms
[00:06:55] DARPA pitted 500+ hackers against this computer chip. The chip won.
[00:18:10] SaltStack API vulnerabilities
[00:22:57] An Interesting Feature in the Samsung DSP Driver
[00:30:50] Pre-Auth Remote Code Execution in VMware ESXi [CVE-2020-3992 CVE-2021-21974]
[00:39:05] Defeating the TP-Link AC1750
[00:44:52] Anatomy of an Exploit: RCE with CVE-2020-1350 SIGRed
[00:57:11] Yet another RenderFrameHostImpl UAF
[01:03:16] Webkit AudioSourceProviderGStreamer use-after-free vulnerability
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
This week we talk a bit about newly released Black Hat 2020 and NDSS 2021 presentation videos, before jumping into several pre-auth RCEs, and some interesting exploitation research to bring a PAC enforced Shadow Stack to ARM and an examination of JSON parser interoperability issues.
[00:00:41] Microsoft open sources CodeQL queries used to hunt for Solorigate activity
[00:04:16] Black Hat USA 2020
[00:13:56] Cookie poisoning leads to DOS and Privacy Violation
[00:16:37] Unauthorized RCE in VMware vCenter
[00:20:01] A Fifteen-Year-Old RCE Bug Returns in ISC BIND Server [CVE-2020-8625]
[00:25:42] Arbitrary File Write on packagecontrol.io (Sublime Text)
[00:30:31] [Uber] PreAuth RCE on Palo Alto GlobalProtect
[00:35:26] The little bug that couldn't: Securing OpenSSL
[00:41:49] PACStack: an Authenticated Call Stack
[00:56:29] An Exploration of JSON Interoperability Vulnerabilities
[01:03:59] Top 10 web hacking techniques of 2020
[01:05:50] OST 2.0 Beta Spots Open
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
A couple privacy violations, PDF exploits, and a complicated API being misused by developers.
[00:00:48] Brave browser leaks onion addresses in DNS traffic
[00:07:05] Tales of Favicons and Caches: Persistent Tracking in Modern Browsers
[00:18:12] Shadow Attacks: Hiding and Replacing Content in Signed PDFs
[00:28:20] Getting Information Disclosure in Adobe Reader Through the ID Tag
[00:32:42] Middleware everywhere and lots of misconfigurations to fix
[00:43:05] GPGme used confusion, it's super effective !
[00:51:58] Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions
[01:01:11] Hunting for bugs in Telegram's animated stickers remote attack surface
[01:08:03] Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits
[01:20:27] Model Skewing Attacks on Machine Learning Models
[01:21:37] Future of Exploit Development - 2021 and Beyond
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
"Beg Bounty" hunters, dependency confusion, iOS kernel vuln, and how not to respond to security research.
[00:00:59] Florida Water Treatment Facility Hacked
[00:09:19] Have a domain name? "Beg bounty" hunters may be on their way
[00:20:14] FootFallCam and MetaTechnology Drama
[00:28:33] Telegram privacy fails [CVE-2021-27204] [CVE-2021-27205]
[00:36:43] Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies
[00:44:33] Exploiting a Second-Order SQL Injection in LibreNMS [CVE-2020-35700]
[00:50:46] Swarm of Palo Alto PAN-OS vulnerabilities
[00:56:25] Advantech iView Missing Authentication RCE [CVE-2021-22652]
[01:02:30] Windows kernel zero-day exploit [CVE-2021-1732]
[01:08:50] Analysis and exploitation of the iOS kernel vulnerability [CVE-2021-1782]
[01:20:10] Misusing Service Workers for Privacy Leakage
[01:27:53] security things in Linux v5.8
[01:40:42] Linux Heap Exploitation - Part 2
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
A lot of discussion this week about OSS security and security processes, an iOS kernel type confusion and MediaTek Bootloader bypass impacting everything since atleast 2014.
[00:04:54] Know, Prevent, Fix: A framework for shifting the discussion around vulnerabilities in open source
[00:15:18] Launching OSV - Better vulnerability triage for open source
[00:22:38] Most Common Bugs of 2021 So Far
[00:31:59] Exploiting the Nespresso smart cards for fun and coffee
[00:39:10] Spoofing and Attacking With Skype
[00:45:01] Getting root on webOS
[00:51:31] Applying Offensive Reverse Engineering to Facebook Gameroom
[00:59:36] Major Vulnerabilities Discovered in Realtek RTL8195A Wi-Fi Module
[01:06:32] MTK Bypass Universal
[01:14:13] Project Zero: iOS Kernel privesc with turnstiles [CVE-2020-27932]
[01:21:41] Why Security Defects Go Unnoticed during Code Reviews?
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
Starting with a long discussion about the North Korean hackers targeting security reseachers, and some thoughts (rants) about the newly released Windows exploit dev course from Offensive Security before getting into some real exploits including NAT Slipstreaming 2.0 and a new Sudo vuln.
[00:00:52] About the security content of iOS 14.4 and iPadOS 14.4
[00:02:42] New campaign targeting security researchers
[00:44:45] New Exploit Dev Course: EXP-301
[01:04:53] Linksys WRT160NL – Authenticated Command Injection [CVE-2021-25310]
[01:07:13] Vulnerabilities within TikTok Friend-Finder
[01:14:07] BitLocker touch-device lockscreen bypass
[01:20:53] NAT Slipstreaming v2.0
[01:26:35] [Security fix] Libgcrypt 1.9.1 released
[01:30:44] Baron Samedit: Heap-based buffer overflow in Sudo [CVE-2021-3156]
[01:44:49] Exploiting a “Simple” Vulnerability – Part 1.5 – The Info Leak
[01:50:53] Windows Kernel DoS/Privilege Escalation via a NULL Pointer Deref
[01:56:31] XS-Leaks in redirect flows
[02:02:13] Keeping your GitHub Actions and workflows secure: Untrusted input
[02:08:04] iOS Security Tutorial - Patching ASLR in the Kernel
[02:08:58] Project Zero: A Look at iMessage in iOS 14
[02:09:37] Effectively Fuzzing the IPC Layer in Firefox
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
This week is a shorter episode, but still some solid bugs to look at. From a full chain Chrome exploit, to a Kindle chain from remote to root and a eBPF incorrect calculation leading to OOB read/write.
[00:00:41] Albicla launch clusterfuck
[00:04:41] [NordVPN] RCE through Windows Custom Protocol on Windows client
[00:09:00] Chaining Multiple bugs for Unauthenticated RCE in the SolarWinds Orion Platform
[00:18:50] The Embedded YouTube Player Told Me What You Were Watching (and more)
[00:24:27] The State of State Machines
[00:34:21] KindleDrip - From Your Kindle’s Email Address to Using Your Credit Card
[00:44:00] New campaign targeting security researchers
[00:44:42] An Incorrect Calculation Bug in the Linux Kernel eBPF Verifier
[00:49:18] Chat Question: What do we think of HackTheBox
[00:53:51] Bad Pods: Kubernetes Pod Privilege Escalation
[00:53:24] [Linux Kernel Exploitation 0x2] Controlling RIP and Escalating privileges via Stack Overflow
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
Several lockscreen-related vulnerabilities this week, a cross-site leak, and the hijacking of all .cd domains.
One important thing to mention about this weeks episode that was neglected during the discussion is that the BitLocker Lockscreen Bypass is a lockscreen bypass. It does not necessarily provide access to data Bitlocker protects. If Bitlocker is being run in "transparent operation mode" where the ability to login is all that is necessary to decrypt data, then this vulnerability can grant access to encrypted data.
[00:00:00] Introduction
[00:00:59] Slayer Labs
[00:12:03] BugTraq Shutdown
[00:17:22] Data Security on Mobile Devices
[00:27:08] Running a fake power plant on the internet for a month
[00:33:43] BitLocker Lockscreen bypass
[00:39:30] [Linux Mint] Screensaver lock by-pass via the virtual keyboard
[00:43:02] [NextCloud] Bypassing Passcode/Device credentials
[00:51:02] How I hijacked the top-level domain of a sovereign state
[01:00:28] Laravel <= v8.4.2 debug mode: Remote code execution
[01:05:47] Leaking silhouettes of cross-origin images
[01:10:36] Escaping VirtualBox 6.1: Part 1
[01:17:15] Hunting for Bugs in Windows Mini-Filter Drivers
[01:18:33] Project Zero: Introducing the In-the-Wild Series
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
A new universal deserialization gadget for Ruby, a Rocket.Chat SAML auth bypass, and some heap exploitation research.
[00:00:36] Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges
[00:10:36] Universal Deserialisation Gadget for Ruby 2.x-3.x
[00:13:54] Stealing Your Private YouTube Videos, One Frame at a Time
[00:21:43] Rocket.chat - SAML authentication bypass
[00:25:49] curl is vulnerable to SSRF due to improperly parsing the host component of the URL
[00:31:02] Issue 2095: Node.js: use-after-free in TLSWrap
[00:35:28] Preventing Use-After-Free Attacks with Fast Forward Allocation
[00:49:38] Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
[00:59:50] A Samsung RKP Compendium
[01:11:32] Analyzing CVE-2020-16040
[01:13:51] HexLasso Online
[01:15:30] A Side Journey to Titan
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
An update on Apple v. Corellium, some 3DS vulnerabilities, and some drama on this weeks episode.
[00:00:34] Remote Chaos Experience
[00:20:06] Apple Inc. v. Corellium, LLC
[00:28:17] The Great Suspender - New maintainer is probably malicious
[00:36:59] An HTML Injection Worth 600$ Dollars
[00:44:06] Zoom Meeting Connector Post-Auth Remote Root
[00:46:21] Hijacking Google Docs Screenshots
[00:49:49] Nintendo 3DS - Improper certificate validation allows an attacker to perform MitM attacks
[00:52:02] Nintendo 3DS - Unchecked number of audio channels in Mobiclip SDK leads to RCE in eShop movie player
[00:55:45] Apple macOS 6LowPAN Vulnerability [CVE-2020-9967]
[01:01:24] An iOS hacker tries Android
[01:14:29] Turning Imprisonment to Advantage in the FreeBSD ftpd chroot Jail [CVE-2020-7468]
[01:18:36] Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
[01:27:17] Helping secure DOMPurify (part 1)
[01:28:23] A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
[01:30:01] PS4 7.02 WebKit + Kernel Chain Implementation
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
Big news this week as several government agencies and contractors may have been compromised. We also have a number of great writeups this week covering everything from a PS4 webkit exploit, MacOS, and Windows.
[00:00:25] CISA issues emergency directive for SolarWinds Orion products compromise
[00:26:53] Finding Critical Open Source Projects
[00:33:46] Vulnerabilities in McAfee ePolicy Orchestrator
[00:39:20] Chat Question: How to get good at exploit dev
[00:44:34] Novel Abuses On Wi-Fi Direct Mobile File Transfers
[00:47:55] PsExec Local Privilege Escalation
[00:52:31] Windows: WOF FSCTL_SET_REPARSE_POINT_EX Cached Signing Level SFB
[01:01:07] This is for the Pwners: Exploiting a WebKit 0-day in PlayStation 4
[01:08:51] Game On - Finding vulnerabilities in Valve’s "Steam Sockets"
[01:14:57] Apple macOS Kernel OOB Write Privilege Escalation Vulnerability [CVE-2020-27897]
[01:17:22] ABSTRACT SHIMMER: Host Networking is root-Equivalent, Again [CVE-2020-15257]
[01:24:41] Now you C me, now you don't, part two: exploiting the in-between
[01:36:04] Portable Data exFiltration: XSS for PDFs
[01:45:27] HackerOne's 12 Days of Hacky Holidays
[01:47:55] The 2020 SANS Holiday Hack Challenge
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
Some solid exploit development talk in this episode as we look at an iOS vuln, discuss the exploitability of a cURL buffer overflow and examine a new kernel UAF mitigation.
[00:00:43] Improving open source security during the Google summer internship program
[00:03:35] Justices seem wary of breadth of federal computer fraud statute
[00:11:37] Update regarding Snapchat SSRF
[00:12:53] A 3D Printed Shell
[00:20:19] Site Wide CSRF on Glassdoor
[00:24:24] [GitLab] Stored-XSS in error message of build-dependencies
[00:27:44] Playstation Now RCE
[00:32:29] MS Teams RCE (Important, Spoofing)
[00:38:34] An iOS zero-click radio proximity exploit odyssey
[00:54:58] [curl] heap-based buffer overrun in /lib/urlapi.c
[01:02:51] Google Duo: Race condition can cause callee to leak video packets from unanswered call
[01:05:35] Linux kernel heap quarantine versus use-after-free exploits
[01:13:23] Hey Alexa what did I just type? Decoding smartphone sounds with a voice assistant
[01:22:57] XS-Leaks Wiki
[01:27:14] Hacking 101 by No Starch Press
[01:33:40] Gamozo Labs FuzzOS
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
More SD-PWN, more Tesla hacks, potential RCE in Drupal, and a couple windows vulns.
[00:00:27] Congress unanimously passes federal IoT security law
[00:06:52] The Supreme Court will hear its first big CFAA case
[00:13:35] How much is unauthorized access sold for?
[00:20:10] Getting Banned for Security Research
[00:33:11] SD-PWN Part 3 - Cisco vManage
[00:36:10] SD-PWN Part 4 - VMware VeloCloud
[00:40:39] CVE-2020-7378: OpenCRX Unverified Password Change (FIXED)
[00:43:54] Multiple vulnerabilities through filename manipulation (CVE-2020-28948 and CVE-2020-28949)
[00:47:14] SSRFs caused by bad RegEx in "private-ip"
[00:53:13] [SnapChat] Server-Side Request Forgery using Javascript allows to exfill data from Google Metadata
[00:57:50] Serious flaws in Tesla Model X keyless entry system
[01:03:48] Windows Print Spooler Vulnerability
[01:08:30] Exploiting a “Simple” Vulnerability - In 35 Easy Steps or Less!
[01:17:55] Hitcon2020 Challenge Files + Solutions
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)
This week we talk a bit about some Black Friday deals before jumping into another SD-WAN pwn, some jailbreaks, and research into automatic exploit generation.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Some interesting tips and tricks as we look at multiple privileges escalations from XNU to Ubuntu, Bitdefender, and Dropbox (HelloSign).
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
A Facebook DOM-based XSS, Rocket.chat and Github Actions RCEs, and a Brave Browser information disclosure in this week's episode.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
This week we are joined by CTS to discuss fuzzing. We also take at PEN-300/OSEP. Before jumping into this weeks exploits, from NAT Slipstreaming to a Metasploit command injection and plenty in between.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
A lot to cover in this episode, from high performance fuzzing on GPUs, to low-cost pentesters, and APT groups. And, of course many vulns from GitHub RCEs to VMWare Workstation race conditions.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
It has been a while since we had an exploit extravaganza but here we are. Several binary-level issues from Bad Neighbor on Windows to BleedingTooth on Linux, and several vulns in Qualcomm SoCs, even a Discord RCE.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Its a web-exploit heavy episode impacing Apple, Hasicorp, Azure, Google, and even a DOMPurify Bypass. Then we end-off with a look into benchmarking fuzzers, and a look at the House of Muney heap exploitation technique.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Every wondering how you might fingerprint and trace exploit devs in the wild? Wondered what a backdoor in a D-Link router looks like? Want to hack Facebook (for Android)? We have all of that and more!
Watch
Lets go back in time to look at the leaked WinXP source, and a Half-Life 1 exploit. And, while we are at it a couple Instagram vulns and a cheap hardware attack against Android.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
A "trivial" Bhyve VM escape, a BitWarden "RCE", a ModSecurity "Denial of Service" and more scare quotes for your enjoyment in this week's episode.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Leading off this week's discussion is the news about the now remote CCC and Offensive Security's plans to retire OSCE. On the exploit side of things, this week we have a few recent bug bounties including a Google Maps XSS, a FreeBSD TOCTOU, and a couple of Linux kernel vulnerabilities.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
The DAY[0] podcast will be on break until September 14, 2020
A quick chat about E2E Crypto and Zoom, followed by a few noteworth exploits including Bluetooth impersonation, a 15-year old qmail CVE, NordVPN, and an RCE in Google
DAY[0] will be on break until September but you can find the video archive on on Youtube (@DAY[0])
Are iOS 0days now worthless? Can you hack a satellite...or hackerone? Are WAFs worthwhile? And more on a fairly discussion heavy episode of DAY[0].
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Update: While we talk about Huawei Kernel Self Protection (HKSP) I make mention of the authors statement that he is unrelated to Huawei. Turns out this statement, despite a commit date of Friday wasn't pushed until Monday morning so it was not original. Further information has also come out showing that the author is a Huawei employee, so the relationship is much closer than I believe it to be. ~zi
It was a busy week, Microsofts Github account was hacked, Centurylink Routers have no security, and multiple interactionless RCEs in Samsung phones.
Authentication bypasses, SQL injection, command injection, and more in this web-exploit heavy episode.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Since we forgot to cover it when it came out, we look at Relyze's new decompiler that is available on the free version. There is also some sandbox escaping, some crypto issues (AMD's SME/SEV) and even some IBM 0days.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Zoom vuln worth $500k? Probably not... What is worth $500k? Binary Ninja's new decompiler...okay probably not but it is exciting.We've also got some stupid issues and some interesting LPEs this episode.
Starting off the week with a discussion about the disappointing IDA Home, before moving into a few easy command injections, code-reuse attacks applied to XSS, detecting trojaned hardware and ending with a subtle crypto-bug.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
First, we talk about Facebook trying to buy some spyware, and then we feast upon a number of Zoom "vulns." Follow that up with some interesting vulnerabilities including a hyper-visor Guest-to-host escape, a complicated Safari permissions bypass, and a Gitlab Parser Differential.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Is there a shortcut to RCE? Well, on Windows .LNK files could be just that. We also talk about a few others vulnerabilities impacting Windows, Pi-Hole and Netflix. And end by looking at Window's new hardware enforced Shadow Stack and a proof-of-concept for fine-grained kASLR on Linux.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
More discussion about election hacking with Voatz undergoing a more complete security assessment, we also discuss a few interesting web attacks and end with a good discussion about a new code-reuse mitigation: Hurdle.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Start off by looking at a few Google Cloud attacks, a couple named vulns (LVI: Load Value Injection, and TRRespass) and then into some web-focused exploits including how to hack a CTF.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
A New AMD sidechannel, and an old intel CSME attack, a couple deserialization attacks, and a few clever but not terribly useful attacks, and some discussion about memory tagging on this weeks episode of DAY[0].
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Join Specter and zi at they discuss several named vulns (kr00k, Forgot2kEyXCHANGE, GhostCat), the benefits of DNS-over-HTTPS, and a a few vulns in some of our regular targets: Samsung drivers, NordVPN, OpenSMTPd.
Watch Live on Twitch (@dayzerosec) at 3PM EST
Keeping up our streak, we talk about some vulnerabilities in Cisco, NordVPN and Tesla, and about SlickWraps being hacked by a very dark, white-hat.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Is the new OSCP worth-it? Can election apps be made secure? We'll talk about those questions and several kernel exploits and a few cool fuzzing innovations.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Android, Bluetooth, Microsoft, NordVPN, Twitter, WhatsApp, Cisco, vulns for days impacting several big names and a couple new attack ideas, blind regex injection and GhostKnight a technique to breach data integrity using speculative execution.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Ok Google! Bypass authentication..and while we're at it, lets explot sudo and OpenSMPTD for root access. This week we dive into various code bases to explore several recent exploits that take advantage of some common yet subtle issues.
Correction: During the segment about the sudo (pwfeedback) exploit I incorrectly described the issue as a stack-based buffer overflow, however the buf variable is declared as static so it ends up in .bss and not on the stack. ~zi
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
This week we look at 15 CVEs this week including the new MDS Attacks/Zombieload and GhostImage a cool attack against vision-based classification systems. We also have discussion about mobile vs desktop security.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Start off with some discussions about Google, privacy, Rust, and entitlement within open-source software. Then we look at some of the big vulns of the past week including CurveBall, CabelHaunt, and an RDP RCE.
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube
This will be our last episode until the fall, but once we are back you can catch the DAY[0] podcast on Twitch every Monday afternoon at 12:00pm PST (3:00pm EST) -- https://www.twitch.tv/dayzerosec
[00:00:50] This will be our last episode until the fall.
[00:32:05] r/AskNetsec - New windows LPE from non-admin :) - From SandboxEscaper
[00:45:20] First American Financial Corp. compromise
[00:53:48] Google admits storing G Suite user passwords in plain text for 14 years
[01:02:27] Safety vs. Security: Attacking Avionic Systems with Humans in the Loop
[01:17:30] Malware Guard Extension: Using SGX to Conceal Cache Attacks
[01:25:04] Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updates
[01:36:45] MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows
[02:03:35] MAC OSX Gatekeeper Bypass
[02:10:47] RCE Without Native Code: Exploitation of a Write-What-Where in Internet Explorer
Watch the DAY[0] podcast live on Twitch every Monday afternoon at 12:00pm PST (3:00pm EST) -- https://www.twitch.tv/dayzerosec
[00:01:55] Frida 12.5 Released
[00:08:17] Damn Vulnerable Crypto Wallet
[00:16:40] Thangry Cat: https://😾😾😾.fm/
[00:23:11] Micro-Architectural Data Sampling Attacks
[00:56:24] Update to Security Incident [May 17, 2019] - Stack Overflow Blog
[01:04:00] Global Takedown Shows the Anatomy of a Modern Cybercriminal Supply Chain
[01:15:12] How Hackers Broke WhatsApp With Just a Phone Call
[01:26:53] Over 25,000 Linksys Smart Wi-Fi Routers Vulnerable to Sensitive Information Disclosure
[01:34:01] Prevent a worm by updating Remote Desktop Services (CVE-2019-0708)
Watch the DAY[0] podcast live on Twitch every Monday afternoon at 12:00pm PST (3:00pm EST) -- https://www.twitch.tv/dayzerosec
[00:00:30] Unhackable: New chip stops attacks before they start
[00:15:00] DeepCheck: A Non-intrusive Control-flow Integrity Checking based...
[00:25:54] Queue the Hardening Enhancements
[00:50:18] For Cybersecurity, Computer Science Must Rely on Strong Types
[00:57:43] A Novel Side-Channel in Real-Time Schedulers
[01:04:55] MAVSec: Securing the MAVLink Protocol
[01:10:39] Domain Specific Code Smells in Smart Contracts
[01:18:56] Over 275 Million Records Exposed by Unsecured MongoDB Database
[01:38:02] Applied Risk :: Advisories
[01:53:50] Alpine Linux Dockerimage contains a NULL root password
[01:59:01] Linux Kernel Race Condition and UAF
Watch the DAY[0] podcast live on Twitch every Monday afternoon at 12:00pm PST (3:00pm EST) -- https://www.twitch.tv/dayzerosec
[00:00:30]r/GlobalOffensive: PSA: Security issue regarding lobbies and games
[00:11:30]Vita Exploit
[00:20:05]Indie Game Removed From Switch eShop
[00:34:40]Eight Devices, One Exploit
[00:47:30]Remote Code Execution on most Dell computers
[00:56:35]All Firefox extensions disabled due to expiration of intermediate signing cert
[01:15:10]A hacker is wiping Git repositories and asking for a ransom | ZDNet
[01:38:25]Typer vs. CAPTCHA: Private information based CAPTCHA to defend against crowdsourcing human cheating
[01:50:50]36 Year old Kernel stack disclosure bug in UFS/FFS
[02:00:52]You Only Propagate Once: Painless Adversarial Training
[02:05:55]The Risks of WebGL: Analysis, Evaluation and Detection
[02:18:55]InternalBlue: Bluetooth Binary Patching and Experimentation Framework
Extra Links:
- h-encore exploit (old Vita exploit)
- InternalBlue CCC talk
Watch the DAY[0] podcast live on Twitch every Monday afternoon at 12:00pm PST (3:00pm EST) -- https://www.twitch.tv/dayzerosec
[00:00:30] - Physical Adversarial Textures that Fool Visual Object Tracking
[00:04:30] - DPatch: An Adversarial Patch Attack on Object Detectors
[00:11:45] - Side-Channel Attack to Extract ECDSA Private Keys from Qualcom Hardware-Based Keystore
[00:19:40] - For PayPal security team,“get user balances and transaction details" is not a vulnerability
[00:26:05] - "CI Knew There Would Be Bugs Here" - Exploring Continuous Integration
[00:40:10] - Hacker Finds They Can Kill Car Engines After Breaking Into GPS Tracking Device
[00:50:25] - Security baseline (DRAFT) for Windows 10 v1903
[00:58:25] - Security Analysis of Near-Field Communication (NFC) Payments
[01:12:10] - Docker Hub Hacked – 190k accounts, GitHub tokens revoked, Builds disabled
[01:18:50] - eGobbler - malvertising campaign exploits zero-day Chrome bug
[01:32:15] - New backdoor inspired by leaked NSA malware
[01:39:60] - Mueller report: Russia hacked state databases and voting machines
[01:54:10] - New Technique Uses Power Anomalies to ID Malware in Embedded Systems
[00:00:31] - https://blogs.grammatech.com/open-source-tools-for-binary-analysis-and-rewriting
[00:05:31] - https://arxiv.org/abs/1904.07280
[00:13:51] - https://www.zdnet.com/article/security-researcher-malwaretech-pleads-guilty/
[00:21:12] - https://www.zdnet.com/article/facebook-admits-to-storing-plaintext-passwords-for-millions-of-instagram-users/
[00:25:34] - https://security.googleblog.com/2019/04/better-protection-against-man-in-middle.html
[00:31:36] - https://pdfpiw.uspto.gov/.piw?docid=10262138&SectionNum=1&IDKey=0229F1C38B5D
[00:39:02] - https://arxiv.org/abs/1904.07370
[00:53:05] - https://github.com/vusec/kmvx
[01:04:45] - Discussion on valuation of an exploit
[01:08:05] - https://arxiv.org/abs/1904.07550
[01:16:02] - https://arxiv.org/abs/1904.08653
[01:24:36] - https://blog.underdogsecurity.com/rce_in_origin_client/
[01:35:14] - https://threatpost.com/windows-zero-day-active-exploits/143820/
[01:40:18] - https://www.ghacks.net/2019/04/16/adblock-plus-filter-exploit-to-run-arbitrary-code-discovered/
[01:47:26] - https://krbtgt.pw/dacl-permissions-overwrite-privilege-escalation-cve-2019-0841/
[01:50:47] - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-asr9k-exr
Watch the DAY[0] podcast live on Twitch every Monday afternoon at 12:00pm PST (3:00pm EST) -- https://www.twitch.tv/dayzerosec
[00:00:37] - Huawei Cyber Security Evaluation Report
[00:14:22] - Assange Arrest
[00:24:55] - Matrix Compromise
[00:32:20] - Outlook Compromise
[00:43:39] - Ghidra Source Release
[00:49:18] - Relyze 3 Beta (Another Free Decompiler)
[00:56:30] - Fracker (New PHP Tool)
[01:01:11] - Discussion about EncryptCTF and challenge design
[01:25:24] - Dragonblood/WPA3 Vulnerabilities
[01:32:21] - CVE-2019-0211 Apache Root Privilege Escalation
[01:41:27] - Detailing of CVE-2019-1636 and CVE-2019-6739 in QT
[01:49:47] - Splitting Atoms in XNU
[02:06:39] - PostgreSQL is it a CVE?
[02:11:41] - RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks
[02:26:45] - The ROP Needle: Hiding Trigger-based Injection Vectors via Code Reuse
[02:29:30] - Assessing Unikernel Security
00:01:10 Sunshine CTF
00:10:27 Question Discussion: Opinions regarding CTF's vs. Real World Exploits
00:24:15 ENCRYPT CTF Discussion
00:31:25 Pwn2Own 2019 (P2O) and Tesla Hacking
00:41:25 Tricking Tesla Autopilot
00:56:45 Ghidra 9.0.1 Release
00:59:30 Commando VM
01:06:50 PoC||GTFO 0x19
01:13:20 ASUS Update Tool Backdoor
01:19:05 Windows Defender APC Code Injection Sensors
01:22:55 BSEA-1 - A Stream Cipher Backdooring Technique
01:32:40 LockerGoga Randomware Vaccination
01:37:40 Hearing your touch: A new acoustic side channel on smartphones
01:43:05 Keybase is not softer than TOFU
01:48:30 Exploitation Techniques and Defenses for Data-Oriented Attacks
01:56:00 Restricting Control Flow During Speculative Execution with Venkman
Additional Links:
00:00:50 Ghidra from XXE to RCE
00:08:50 Cutter (Radare2) Release
00:15:00 Daenerys IDA Pro and Ghidra Interoperability Framework
00:22:00 IDA Educational Release
00:39:35 Windows Defender on MacOS
00:59:20 A new Windows 10 KASLR Bypass
01:11:07 EVMFuzz Fuzzing Ethereum Virtual Machines
01:30:10 Researchers find 36 new security flaws in LTE Protocol
01:45:50 Facebook logging plaintext passwords
Other Interesting Links: SecurityInnovation Blockchain CTF Analysis of a Chrome Zero-Day (CVE-2019-5786) Writeup00:00:30 Steam Client (CSGO) RCE
00:04:44 CS 1.6 Trojan.Belonard Malware Campaign
00:11:55 WebKit Structure ID Randomness Mitigation
00:20:48 Reuse Gadget Counts Whitepaper (ROP)
00:31:50 DTrace on Windows
00:38:20 Backdoor Attack in CNN's
00:00:00 Intro / General Discussion
00:00:55 Ghidra Overview (Pros, Cons)
00:30:20 Ghidra JDWP Debug Port 'Backdoor' Discussion
00:38:05 Ghidra and National Security
00:52:15 "Finding Unicorns: When The C++ Compiler Writes the Vuln" Discussion
01:06:15 "Windows 7 may insecurely load Dynamic Link Libraries" Discussion
01:21:40 "Exploiting Car Alarms" Discussion
01:45:05 XNU (Mac OS) Copy-on-Write Behavior Bypass Zero-Day Discussion
02:03:15 Chrome Zero-Day Discussion
En liten tjänst av I'm With Friends. Finns även på engelska.