A very technical episode this week, featuring some posts on hacking the xbox 360 hypervisor as well as AMD microcode hacking.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/276.html
[00:00:00] Introduction
[00:00:15] Reversing Samsung's H-Arx Hypervisor Framework - Part 1
[00:10:34] Hacking the Xbox 360 Hypervisor Part 1: System Overview
[00:21:18] Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit
[00:30:48] Zen and the Art of Microcode Hacking
[00:41:51] A very fancy way to obtain RCE on a Solr server
[01:03:49] Cellebrite zero-day exploit used to target phone of Serbian student activist
[01:16:03] When NULL isn't null: mapping memory at 0x0 on Linux
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9