![Day[0] cover image](https://images.weserv.nl/?url=https%3A%2F%2Fd3t3ozftmdmh3i.cloudfront.net%2Fstaging%2Fpodcast_uploaded_episode%2F1589585%2F1589585-1731915768631-ba48855a91cf.jpg&w=320&h=320&output=jpg)
FortiJump Higher, Pishi, and Breaking Control Flow Flattening
Day[0]
00:00
Navigating Browser Exploits and Security Challenges
This chapter explores the complexities of web browser exploits in contrast to kernel exploits, focusing on the unique strategies required due to the differing allocation areas within browsers. The speakers discuss recent vulnerabilities, particularly one related to Fortinet, and delve into the intricacies of identifying and exploiting vulnerabilities in device management protocols. Additionally, they highlight the challenges faced by defensive researchers in contrast to offensive researchers, stressing the need for thorough analysis and responsible information sharing in the cybersecurity landscape.
Transcript
Play full episode