![Day[0] cover image](https://wsrv.nl/?url=https%3A%2F%2Fd3t3ozftmdmh3i.cloudfront.net%2Fproduction%2Fpodcast_uploaded_nologo%2F1589585%2F1589585-1553556841291-2e3a293ad9c2e.jpg&w=320&h=320)
Zero-Days, Ghidra, and Questionable CVE's
Day[0]
00:00
How to Detect a Cromode Attack
It's possible some one realized they had a gold mine that a prom typically is not included in most exploit kit prit ah. A lot of time, s actual mower researchers, we'll find it being exploited against nd points,. So if you have an i d s or an ip s m, they may not always see that attack. If you're able to go and see a machine that so needs communicating out to a known molicious network, and they track it back through the actual, like a network data, they can go and sayl came from here. We notice that this traffic happened, right? That's definitely surprising to see a fool chain exploit, oda
Play episode from 02:05:51
Transcript


