Critical Thinking - Bug Bounty Podcast cover image

Episode 157: Crushing Pwn2Own & H1 with Kernel Driver Exploits

Critical Thinking - Bug Bounty Podcast

00:00

Identifying Vulnerable memcpy Patterns

Hyprdude outlines his code review heuristics: searching memcpy sites and unchecked size fields for memory corruption.

Play episode from 38:27
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app