
Gehen Sie mit der App Player FM offline!
ESP32 Backdoor Drama and SAML Auth Bypasses
Manage episode 471832038 series 2606557
Discussion this week starts with the ESP32 "backdoor" drama that circled the media, with some XML-based vulnerabilities in the mix. Finally, we cap off with a post on reviving modprobe_path for Linux exploitation, and some discussion around an attack chain against China that was attributed to the NSA.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/277.html
[00:00:00] Introduction
[00:00:25] The ESP32 "backdoor" that wasn't
[00:14:26] Speedrunners are vulnerability researchers
[00:27:58] Sign in as anyone: Bypassing SAML SSO authentication with parser differentials
[00:38:47] Impossible XXE in PHP
[00:52:41] Reviving the modprobe_path Technique: Overcoming search_binary_handler() Patch
[01:04:15] Trigon: developing a deterministic kernel exploit for iOS
[01:06:43] An inside look at NSA (Equation Group) TTPs from China’s lense
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
282 Episoden
Manage episode 471832038 series 2606557
Discussion this week starts with the ESP32 "backdoor" drama that circled the media, with some XML-based vulnerabilities in the mix. Finally, we cap off with a post on reviving modprobe_path for Linux exploitation, and some discussion around an attack chain against China that was attributed to the NSA.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/277.html
[00:00:00] Introduction
[00:00:25] The ESP32 "backdoor" that wasn't
[00:14:26] Speedrunners are vulnerability researchers
[00:27:58] Sign in as anyone: Bypassing SAML SSO authentication with parser differentials
[00:38:47] Impossible XXE in PHP
[00:52:41] Reviving the modprobe_path Technique: Overcoming search_binary_handler() Patch
[01:04:15] Trigon: developing a deterministic kernel exploit for iOS
[01:06:43] An inside look at NSA (Equation Group) TTPs from China’s lense
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
282 Episoden
Alle Folgen
×Willkommen auf Player FM!
Player FM scannt gerade das Web nach Podcasts mit hoher Qualität, die du genießen kannst. Es ist die beste Podcast-App und funktioniert auf Android, iPhone und im Web. Melde dich an, um Abos geräteübergreifend zu synchronisieren.