Day[0] cover image

FortiJump Higher, Pishi, and Breaking Control Flow Flattening

Day[0]

00:00

Navigating Browser Exploits and Security Challenges

This chapter explores the complexities of web browser exploits in contrast to kernel exploits, focusing on the unique strategies required due to the differing allocation areas within browsers. The speakers discuss recent vulnerabilities, particularly one related to Fortinet, and delve into the intricacies of identifying and exploiting vulnerabilities in device management protocols. Additionally, they highlight the challenges faced by defensive researchers in contrast to offensive researchers, stressing the need for thorough analysis and responsible information sharing in the cybersecurity landscape.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app