The BlueHat Podcast cover image

James Forshaw on Writing Your Own Tools

The BlueHat Podcast

00:00

How to Hunt for Logic Based Vulnerabilities

Vulnerability was discovered by looking at Microsoft's public documentation for a new feature. The vulnerability could have been used to attack computers remotely or even on the local level. In general, especially with Microsoft documentation, it's usually a post hoc representation of what was actually implemented and so I can look at that and go, huh, interesting. And this is kind of the sort of open box, closed box kind of approach to security research.

Play episode from 08:27
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app