Zoom-ers, VM Escapes, and Pegaus Resurfaces
Day[0] - En podkast av dayzerosec
 
   Kategorier:
First, we talk about Facebook trying to buy some spyware, and then we feast upon a number of Zoom "vulns." Follow that up with some interesting vulnerabilities including a hyper-visor Guest-to-host escape, a complicated Safari permissions bypass, and a Gitlab Parser Differential.
- [00:09:31] Facebook tried to buy NSO Group's iOS spyware to monitor iPhone users
 
- [00:14:49] Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings
 
- [00:28:28] Security Vulnerabilities fixed in Firefox 74.0.1 and Firefox ESR 68.6.1
 
- [00:33:20] Bug bounty platforms buy researcher silence, violate labor laws, critics say
 
- [00:53:56] Zoom NTLM Hash Leak
 
- [00:59:44] The 'S' in Zoom, Stands for Security
 
- [01:05:52] Use-After-Free Vulnerability in the VMware Workstation DHCP Component [CVE-2020-3947]
 
- [01:15:38] Exploiting SMBGhost for a Local Privilege Escalation [CVE-2020-0796]
 
- [01:26:31] How to exploit parser differentials
 
- [01:37:07] Unauthorized Camera access on iOS and macOS
 
- [01:49:07] [Slack] Relative Path Vulnerability Results in Arbitrary Command Execution/Privilege Escalation
 
- [01:54:21] Physically Realizable Adversarial Examples for LiDAR Object Detection
 
- [02:01:39] Attack matrix for Kubernetes
 
- [02:03:34] Project Zero: TFW you-get-really-excited-you-patch-diffed-a-0day-used-in-the-wild-but-then-find-out-it-is-the-wrong-vuln
 
- [02:04:13] Tale of two hypervisor bugs - Escaping from FreeBSD bhyve
 
- [02:08:21] So you want to be a web security researcher?
 
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])
 
 