Hacking Neural Nets, a Chrome WebRTC UAF and Pwning Windows [Binary Exploitation]

Published: Nov. 25, 2021, 1 a.m.

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/hacking-neural-nets-a-chrome-webrtc-uaf-and-pwning-windows.html

\n

Some mroe kernel bugs this week as we look at bugs in Samsung's NPU driver (Android), Linux, and the WIndows Kernel.

\n

[00:00:17] Spot the Vuln - Once Again - Solution

\n

[00:03:12] Google Chrome WebRTC addIceCandidate use after free vulnerability

\n

[00:08:53] Linux: UAF read: SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect())

\n

[00:15:08] Fall of the machines: Exploiting the Qualcomm NPU (neural processing unit) kernel driver

\n

[00:31:13] POC2021 \u2013 Pwning the Windows 10 Kernel with NTFS and WNF Slides

\n

The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:

\n

    \n\t
  • Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
  • \n\t
  • Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
  • \n
\n

The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec

\n

You can also join our discord: https://discord.gg/daTxTK9

\n

Or follow us on Twitter (@dayzerosec) to know when new releases are coming.