An update on Apple v. Corellium, some 3DS vulnerabilities, and some drama on this weeks episode.
\n\n[00:00:34] Remote Chaos Experience
\n
\n[00:20:06] Apple Inc. v. Corellium, LLC
\n
\n[00:28:17] The Great Suspender - New maintainer is probably malicious
\n
\n[00:36:59] An HTML Injection Worth 600$ Dollars
\n
\n[00:44:06] Zoom Meeting Connector Post-Auth Remote Root
\n
\n[00:46:21] Hijacking Google Docs Screenshots
\n
\n[00:49:49] Nintendo 3DS - Improper certificate validation allows an attacker to perform MitM attacks
\n
\n[00:52:02] Nintendo 3DS - Unchecked number of audio channels in Mobiclip SDK leads to RCE in eShop movie player
\n
\n[00:55:45] Apple macOS 6LowPAN Vulnerability [CVE-2020-9967]
\n
\n[01:01:24] An iOS hacker tries Android
\n
\n[01:14:29] Turning Imprisonment to Advantage in the FreeBSD ftpd chroot Jail [CVE-2020-7468]
\n
\n[01:18:36] Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
\n
\n[01:27:17] Helping secure DOMPurify (part 1)
\n
\n[01:28:23] A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
\n
\n[01:30:01] PS4 7.02 WebKit + Kernel Chain Implementation
\n
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
\nOr the video archive on Youtube (@dayzerosec)