CppCast

Binary Exploits

Jan 20, 2022
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
How to Avoid a Fake Coved Testing Center
01:46 • 2min
3
Welcome to the Show, Merit Tokla
04:05 • 1min
4
What Is a P T?
05:32 • 2min
5
How to Store Dates in a 32 Bit Int
07:10 • 2min
6
The Microsoft Vulnerability Scan Engine for Emales
08:50 • 2min
7
The Eunuch System Aps Still Use 32 Bit Time Stamps
10:31 • 2min
8
Java Script Engine Is Always Written in Seplespus
12:07 • 2min
9
Aste Memory's Safe Language
14:03 • 2min
10
How Did You Get Into Hacking?
16:22 • 3min
11
How Did You Meet Christian?
19:04 • 2min
12
Using Binary Exploitation in Ron 60 Fourso
21:15 • 4min
13
A Heap Overflow?
25:21 • 3min
14
Code Analyzers Detect Bugs and Security Issues
28:05 • 2min
15
How Does a Pseudo Hack Work?
30:05 • 3min
16
I've Written Almost Exact the Same Bug.
33:34 • 4min
17
How to Catch Bugs With Lid Ffuzzer
37:21 • 2min
18
Do You Know How to Find Known Vulnerabilities?
39:05 • 2min
19
Pentesting
40:47 • 3min
20
F Sharp - A Managed Language on the Dotnet?
43:37 • 3min
21
Is It a Real Challenge, or a Hacker's Challenge?
46:51 • 2min
22
Hack the Box
49:13 • 2min
23
Capture of the Flag - Is There Any Overlap in the CTF World?
51:02 • 2min
24
You Find Bugs in the Lenox Kernel?
53:00 • 3min
25
How the Police Did Take This Bug Into Account
55:40 • 2min
26
The Governor of Missouri Is Taking It Personally
57:56 • 3min