Day[0] cover image

[binary] Edge Vulns, a SHA-3 Overflow, and an io_uring Exploit

Day[0]

00:00

Getting Code Exact From the Arborite

KSLR uses the timer FD context to occupy the invalid slot, occupies the upper and lower slots with the message message SEG. After that gets into code execution, had a few different options there. It seems to use a new technique of overriding the bin format and the formats list for loading executables. And then gets the ability to get PC control with the low binary callback.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app