Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Introduction
00:00 • 3min
Is There a Logo for This?
02:32 • 2min
Use After Free When Selecting Custom Icon for Web App
04:23 • 2min
Is Out of Bounds Read When Dragging a Link Over Tab Strip?
06:53 • 2min
Kiosk Escapes Are a Good Show
08:41 • 3min
Getting $30,000 Payouts for Browser Bugs
11:37 • 2min
Weirder Bugs - SHA3 Buffer Overflow
13:55 • 2min
Sha3
15:43 • 2min
Is Guthrie Really Getting Used All That Much?
17:24 • 3min
Is There a Language Exploitation in PHP?
20:09 • 3min
The Linux Kernel IO U Ring Exploit
23:03 • 2min
IO Ring Setup Pull
24:47 • 4min
Is It a Timer FD Context?
28:48 • 2min
Getting Code Exact From the Arborite
30:28 • 3min
KCTF Environment
33:03 • 4min
Exploiting Xbox Game Frogger
36:49 • 2min