Some solid exploit development talk in this episode as we look at an iOS vuln, discuss the exploitability of a cURL buffer overflow and examine a new kernel UAF mitigation.
\n\n[00:00:43] Improving open source security during the Google summer internship program
\n
\n[00:03:35] Justices seem wary of breadth of federal computer fraud statute
\n
\n[00:11:37] Update regarding Snapchat SSRF
\n
\n[00:12:53] A 3D Printed Shell
\n
\n[00:20:19] Site Wide CSRF on Glassdoor
\n
\n[00:24:24] [GitLab] Stored-XSS in error message of build-dependencies
\n
\n[00:27:44] Playstation Now RCE
\n
\n[00:32:29] MS Teams RCE (Important, Spoofing)
\n
\n[00:38:34] An iOS zero-click radio proximity exploit odyssey
\n
\n[00:54:58] [curl] heap-based buffer overrun in /lib/urlapi.c
\n
\n[01:02:51] Google Duo: Race condition can cause callee to leak video packets from unanswered call
\n
\n[01:05:35] Linux kernel heap quarantine versus use-after-free exploits
\n
\n[01:13:23] Hey Alexa what did I just type? Decoding smartphone sounds with a voice assistant
\n
\n[01:22:57] XS-Leaks Wiki
\n
\n[01:27:14] Hacking 101 by No Starch Press
\n
\n[01:33:40] Gamozo Labs FuzzOS
\n
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
\nOr the video archive on Youtube (@dayzerosec)