Day[0]

dayzerosec
undefined
Oct 7, 2019 • 1h 51min

Exploits-galore iOS (checkm8), Android, Signal, Whatsapp, PHP and more

Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST) Or the video archive on Youtube [00:00:40] What happened while we were gone. ft. Defcon and Blackhat discussion [00:20:10] Checkm8 - iPhone bootROM exploit [00:28:52] iPhone A11 debug registers allow full-featured kernel debugging [00:32:52] Android: Use-After-Free in Binder driver https://groups.google.com/forum/#!msg/syzkaller-bugs/QyXdgUhAF50/g-FXVo1OAwAJ [00:39:36] PHP 7.0-7.3 disable_functions bypass https://bugs.php.net/bug.php?id=72530 [00:51:49] An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples https://cwe.mitre.org/data/definitions/20.html [01:03:18] Signal RTP is processed before call is answered https://bugs.chromium.org/p/project-zero/issues/detail?id=1943 [01:08:47] Whatsapp RCE [01:14:58] Attacking CNN-based anti-spoofing face authentication in the physical domain [01:22:52] The Kernel Concurrency Sanitizer (KCSAN) [01:30:36] Eradicating Attacks on the Internal Network with Internal Network Policy [01:39:22] Analyzing Control Flow Integrity with LLVM-CFI
undefined
May 27, 2019 • 2h 16min

Offensive Security's OSWE/AWAE, Massive Security failures, and a handful of cool attacks

This will be our last episode until the fall, but once we are back you can catch the DAY[0] podcast on Twitch every Monday afternoon at 12:00pm PST (3:00pm EST) -- https://www.twitch.tv/dayzerosec [00:00:50] This will be our last episode until the fall. [00:02:50] Thoughts on the Advanced Web Attacks and Exploitation (AWAE) Course, and the Offensive Security Web Expert (OSWE) certification [00:32:05] r/AskNetsec - New windows LPE from non-admin :) - From SandboxEscaper [00:45:20] First American Financial Corp. compromise [00:53:48] Google admits storing G Suite user passwords in plain text for 14 years [01:02:27] Safety vs. Security: Attacking Avionic Systems with Humans in the Loop [01:17:30] Malware Guard Extension: Using SGX to Conceal Cache Attacks [01:25:04] Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updates [01:36:45] MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows [01:46:59] Hey Google, What Exactly Do Your Security Patches Tell Us?A Large-Scale Empirical Study on Android Patched Vulnerabilities [02:03:35] MAC OSX Gatekeeper Bypass [02:10:47] RCE Without Native Code: Exploitation of a Write-What-Where in Internet Explorer
undefined
May 20, 2019 • 1h 45min

Intel has done it again, ft. Zombies, Cats, and Windows exploits

Watch the DAY[0] podcast live on Twitch every Monday afternoon at 12:00pm PST (3:00pm EST) -- https://www.twitch.tv/dayzerosec [00:01:55] Frida 12.5 Released [00:08:17] Damn Vulnerable Crypto Wallet [00:16:40] Thangry Cat: https://😾😾😾.fm/ [00:23:11] Micro-Architectural Data Sampling Attacks ZombieLoad RIDL paper Fallout paper Red Hat Overview Video [00:56:24] Update to Security Incident [May 17, 2019] - Stack Overflow Blog [01:04:00] Global Takedown Shows the Anatomy of a Modern Cybercriminal Supply Chain [01:15:12] How Hackers Broke WhatsApp With Just a Phone Call CVE-2019-3568 [01:26:53] Over 25,000 Linksys Smart Wi-Fi Routers Vulnerable to Sensitive Information Disclosure [01:34:01] Prevent a worm by updating Remote Desktop Services (CVE-2019-0708)
undefined
May 13, 2019 • 2h 18min

The Unhackable Morpheus chip and other exploit mitigations

Watch the DAY[0] podcast live on Twitch every Monday afternoon at 12:00pm PST (3:00pm EST) -- https://www.twitch.tv/dayzerosec [00:00:30] Unhackable: New chip stops attacks before they start [00:15:00] DeepCheck: A Non-intrusive Control-flow Integrity Checking based... [00:25:54] Queue the Hardening Enhancements [00:50:18] For Cybersecurity, Computer Science Must Rely on Strong Types [00:57:43] A Novel Side-Channel in Real-Time Schedulers [01:04:55] MAVSec: Securing the MAVLink Protocol [01:10:39] Domain Specific Code Smells in Smart Contracts [01:18:56] Over 275 Million Records Exposed by Unsecured MongoDB Database [01:38:02] Applied Risk :: Advisories [01:53:50] Alpine Linux Dockerimage contains a NULL root password [01:59:01] Linux Kernel Race Condition and UAF [02:05:44] Arbitrary file read vulnerability in HackerRank
undefined
May 6, 2019 • 2h 37min

Another CSG0-day, Ransomware? and a 36 year old vuln

Watch the DAY[0] podcast live on Twitch every Monday afternoon at 12:00pm PST (3:00pm EST) -- https://www.twitch.tv/dayzerosec [00:00:30]r/GlobalOffensive: PSA: Security issue regarding lobbies and games [00:11:30]Vita Exploit [00:20:05]Indie Game Removed From Switch eShop [00:34:40]Eight Devices, One Exploit [00:47:30]Remote Code Execution on most Dell computers [00:56:35]All Firefox extensions disabled due to expiration of intermediate signing cert [01:15:10]A hacker is wiping Git repositories and asking for a ransom | ZDNet [01:38:25]Typer vs. CAPTCHA: Private information based CAPTCHA to defend against crowdsourcing human cheating [01:50:50]36 Year old Kernel stack disclosure bug in UFS/FFS [02:00:52]You Only Propagate Once: Painless Adversarial Training [02:05:55]The Risks of WebGL: Analysis, Evaluation and Detection [02:18:55]InternalBlue: Bluetooth Binary Patching and Experimentation Framework [02:27:30]IRONHIDE: A Secure Multicore Architecture that Leverages Hardware Isolation Against Microarchitecture State Attacks Extra Links: - h-encore exploit (old Vita exploit) - InternalBlue CCC talk
undefined
Apr 29, 2019 • 2h 3min

Docker, Government Attacks, and Best Practices

Watch the DAY[0] podcast live on Twitch every Monday afternoon at 12:00pm PST (3:00pm EST) -- https://www.twitch.tv/dayzerosec [00:00:30] - Physical Adversarial Textures that Fool Visual Object Tracking [00:04:30] - DPatch: An Adversarial Patch Attack on Object Detectors [00:11:45] - Side-Channel Attack to Extract ECDSA Private Keys from Qualcom Hardware-Based Keystore [00:19:40] - For PayPal security team,“get user balances and transaction details" is not a vulnerability [00:26:05] - "CI Knew There Would Be Bugs Here" - Exploring Continuous Integration [00:40:10] - Hacker Finds They Can Kill Car Engines After Breaking Into GPS Tracking Device [00:50:25] - Security baseline (DRAFT) for Windows 10 v1903 [00:58:25] - Security Analysis of Near-Field Communication (NFC) Payments [01:12:10] - Docker Hub Hacked – 190k accounts, GitHub tokens revoked, Builds disabled [01:18:50] - eGobbler - malvertising campaign exploits zero-day Chrome bug [01:32:15] - New backdoor inspired by leaked NSA malware [01:39:60] - Mueller report: Russia hacked state databases and voting machines [01:54:10] - New Technique Uses Power Anomalies to ID Malware in Embedded Systems
undefined
Apr 22, 2019 • 1h 54min

Fun Malware, Fun AI Tricks, and General Fun

[00:00:31] - https://blogs.grammatech.com/open-source-tools-for-binary-analysis-and-rewriting [00:05:31] - https://arxiv.org/abs/1904.07280 [00:13:51] - https://www.zdnet.com/article/security-researcher-malwaretech-pleads-guilty/ [00:21:12] - https://www.zdnet.com/article/facebook-admits-to-storing-plaintext-passwords-for-millions-of-instagram-users/ [00:25:34] - https://security.googleblog.com/2019/04/better-protection-against-man-in-middle.html [00:31:36] - https://pdfpiw.uspto.gov/.piw?docid=10262138&SectionNum=1&IDKey=0229F1C38B5D [00:39:02] - https://arxiv.org/abs/1904.07370 [00:53:05] - https://github.com/vusec/kmvx [01:04:45] - Discussion on valuation of an exploit [01:08:05] - https://arxiv.org/abs/1904.07550 [01:16:02] - https://arxiv.org/abs/1904.08653 [01:24:36] - https://blog.underdogsecurity.com/rce_in_origin_client/ [01:35:14] - https://threatpost.com/windows-zero-day-active-exploits/143820/ [01:40:18] - https://www.ghacks.net/2019/04/16/adblock-plus-filter-exploit-to-run-arbitrary-code-discovered/ [01:47:26] - https://krbtgt.pw/dacl-permissions-overwrite-privilege-escalation-cve-2019-0841/ [01:50:47] - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-asr9k-exr
undefined
Apr 16, 2019 • 2h 40min

Compromises, Challenge Design, and 0days

Watch the DAY[0] podcast live on Twitch every Monday afternoon at 12:00pm PST (3:00pm EST) -- https://www.twitch.tv/dayzerosec [00:00:37] - Huawei Cyber Security Evaluation Report [00:14:22] - Assange Arrest [00:24:55] - Matrix Compromise [00:32:20] - Outlook Compromise [00:43:39] - Ghidra Source Release [00:49:18] - Relyze 3 Beta (Another Free Decompiler) [00:56:30] - Fracker (New PHP Tool) [01:01:11] - Discussion about EncryptCTF and challenge design [01:25:24] - Dragonblood/WPA3 Vulnerabilities [01:32:21] - CVE-2019-0211 Apache Root Privilege Escalation [01:41:27] - Detailing of CVE-2019-1636 and CVE-2019-6739 in QT [01:49:47] - Splitting Atoms in XNU [02:06:39] - PostgreSQL is it a CVE? [02:11:41] - RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks [02:26:45] - The ROP Needle: Hiding Trigger-based Injection Vectors via Code Reuse [02:29:30] - Assessing Unikernel Security
undefined
Apr 2, 2019 • 2h 9min

CTFs, Backdoors, and Control Flow Integrity

00:01:10 Sunshine CTF 00:10:27 Question Discussion: Opinions regarding CTF's vs. Real World Exploits 00:24:15 ENCRYPT CTF Discussion 00:31:25 Pwn2Own 2019 (P2O) and Tesla Hacking 00:41:25 Tricking Tesla Autopilot 00:56:45 Ghidra 9.0.1 Release 00:59:30 Commando VM 01:06:50 PoC||GTFO 0x19 01:13:20 ASUS Update Tool Backdoor 01:19:05 Windows Defender APC Code Injection Sensors 01:22:55 BSEA-1 - A Stream Cipher Backdooring Technique 01:32:40 LockerGoga Randomware Vaccination 01:37:40 Hearing your touch: A new acoustic side channel on smartphones 01:43:05 Keybase is not softer than TOFU 01:48:30 Exploitation Techniques and Defenses for Data-Oriented Attacks 01:56:00 Restricting Control Flow During Speculative Execution with Venkman Additional Links: Sunshine CTF Writeups Attacking Javascript Engines Phrack Article
undefined
Mar 26, 2019 • 2h 1min

RE Tools, Ethereum, and Plaintext Passwords

00:00:50 Ghidra from XXE to RCE 00:08:50 Cutter (Radare2) Release 00:15:00 Daenerys IDA Pro and Ghidra Interoperability Framework 00:22:00 IDA Educational Release 00:39:35 Windows Defender on MacOS 00:59:20 A new Windows 10 KASLR Bypass 01:11:07 EVMFuzz Fuzzing Ethereum Virtual Machines 01:30:10 Researchers find 36 new security flaws in LTE Protocol 01:45:50 Facebook logging plaintext passwords Other Interesting Links: SecurityInnovation Blockchain CTF Analysis of a Chrome Zero-Day (CVE-2019-5786) Writeup

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app