42 subscribers
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 #11: From OJ Simpson Case to Best Selling Author - Marcia Clark Shares Latest Real Crime Book Release and How Resilience Is Key to Success and Reinvention 34:35
[binary] Bypassing Chromecast Secure-Boot and Exploiting Factorio
Manage episode 395916329 series 2606557
A bit of a game special this week, with a Counter-Strike: Global Offensive vulnerability and an exploit for Factorio. We also have a Linux kernel bug and a Chromecast secure-boot bypass with some hardware hacking mixed in.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/236.html
[00:00:00] Introduction
[00:00:25] Exploring Counter-Strike: Global Offensive Attack Surface
[00:26:22] Exploiting a Factorio Buffer Overflow
[00:31:46] io_uring: __io_uaddr_map() handles multi-page region dangerously
[00:39:25] Chromecast with Google TV (1080P) Secure-Boot Bypass
[00:51:58] exploits.club
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
282 episodes
Manage episode 395916329 series 2606557
A bit of a game special this week, with a Counter-Strike: Global Offensive vulnerability and an exploit for Factorio. We also have a Linux kernel bug and a Chromecast secure-boot bypass with some hardware hacking mixed in.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/236.html
[00:00:00] Introduction
[00:00:25] Exploring Counter-Strike: Global Offensive Attack Surface
[00:26:22] Exploiting a Factorio Buffer Overflow
[00:31:46] io_uring: __io_uaddr_map() handles multi-page region dangerously
[00:39:25] Chromecast with Google TV (1080P) Secure-Boot Bypass
[00:51:58] exploits.club
The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
-- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
We are also available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
282 episodes
All episodes
×![Day[0] podcast artwork](/static/images/64pixel.png)
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Mitigating Browser Hacking - Interview with John Carse (SquareX Field CISO) 1:46:57
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Pulling Gemini Secrets and Windows HVPT 1:33:22
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Session-ception and User Namespaces Strike Again 49:36
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Extracting YouTube Creator Emails and Spilling Azure Secrets 44:04
![Day[0] podcast artwork](/static/images/64pixel.png)
1 ESP32 Backdoor Drama and SAML Auth Bypasses 1:14:08
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Exploiting Xbox 360 Hypervisor and Microcode Hacking 1:19:05
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Path Confusion and Mixing Public/Private Keys 59:34
![Day[0] podcast artwork](/static/images/64pixel.png)
1 ZDI's Triaging Troubles and LibreOffice Exploits 57:02
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Recycling Exploits in MacOS and Pirating Audiobooks 1:17:06
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Top 10 Web Hacking Techniques and Windows Shadow Stacks 1:12:42
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Unicode Troubles, Bypassing CFG, and Racey Pointer Updates 41:29
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Deanonymization with CloudFlare and Subaru's Security Woes 1:07:35
![Day[0] podcast artwork](/static/images/64pixel.png)
![Day[0] podcast artwork](/static/images/64pixel.png)
![Day[0] podcast artwork](/static/images/64pixel.png)
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Machine Learning Attacks and Tricky Null Bytes 45:07
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Linux Is Still a Mess and Vaultwarden Auth Issues 52:18
![Day[0] podcast artwork](/static/images/64pixel.png)
1 FortiJump Higher, Pishi, and Breaking Control Flow Flattening 1:00:38
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Static Analysis, LLMs, and In-The-Wild Exploit Chains 1:22:02
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Attacking Browser Extensions and CyberPanel 58:18
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Hardwear.IO NL, DEF CON 32, and Filesystem Exploitation 1:11:24
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Zendesk's Email Fiasco and Rooting Linux with a Lighter 50:26
![Day[0] podcast artwork](/static/images/64pixel.png)
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Attack of the CUPS and Exploiting Web Views via HSTS 1:08:09
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Future of the Windows Kernel and Encryption Nonce Reuse 33:52
![Day[0] podcast artwork](/static/images/64pixel.png)
![Day[0] podcast artwork](/static/images/64pixel.png)
1 Memory Corruption: Best Tackled with Mitigations or Safe-Languages 58:23
![Day[0] podcast artwork](/static/images/64pixel.png)
1 [discussion] A Retrospective and Future Look Into DAY[0] 1:03:55
![Day[0] podcast artwork](/static/images/64pixel.png)
1 [binary] Bypassing KASLR and a FortiGate RCE 29:47
![Day[0] podcast artwork](/static/images/64pixel.png)
1 [bounty] RCE'ing Mailspring and a .NET CRLF Injection 43:19
![Day[0] podcast artwork](/static/images/64pixel.png)
1 [binary] Future of Exploit Development Followup 46:41
![Day[0] podcast artwork](/static/images/64pixel.png)
1 [bounty] libXPC to Root and Digital Lockpicking 45:35
![Day[0] podcast artwork](/static/images/64pixel.png)
![Day[0] podcast artwork](/static/images/64pixel.png)
1 [bounty] A PHP and Joomla Bug and some DOM Clobbering 48:30
![Day[0] podcast artwork](/static/images/64pixel.png)
1 [bounty] GhostCMS, ClamAV, and the Top Web Hacking Techniques of 2023 47:19
![Day[0] podcast artwork](/static/images/64pixel.png)
1 [binary] kCTF Changes, LogMeIn, and wlan VFS Bugs 33:53
![Day[0] podcast artwork](/static/images/64pixel.png)
1 [bounty] The End of a DEFCON Era and Flipper Zero Woes 1:16:22
![Day[0] podcast artwork](/static/images/64pixel.png)
1 [bounty] Public Private Android Keys and Docker Escapes 48:22
![Day[0] podcast artwork](/static/images/64pixel.png)
1 [binary] Busted ASLR, PixieFail, and Bypassing HVCI 46:17
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.