The BlueHat Podcast cover image

James Forshaw on Writing Your Own Tools

The BlueHat Podcast

00:00

How to Hunt for Logic Based Vulnerabilities

Vulnerability was discovered by looking at Microsoft's public documentation for a new feature. The vulnerability could have been used to attack computers remotely or even on the local level. In general, especially with Microsoft documentation, it's usually a post hoc representation of what was actually implemented and so I can look at that and go, huh, interesting. And this is kind of the sort of open box, closed box kind of approach to security research.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app