Listen "[binary] Some Browser Exploitation and a Format String Bug? "
Episode Synopsis
We've got a few interesting vulns, a blind format string attack, Windows kernel int overflow, and a browser exploit (unchecked bounds after lowering).
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/160.html
[00:00:00] Introduction
[00:00:24] Spot the Vuln - Chat Configuration
[00:02:06] CCC Cancelled
[00:07:53] Hacking TMNF: Part 2 - Exploiting a blind format string
[00:19:17] Windows Kernel integer overflows in registry subkey lists leading to memory corruption
[00:28:13] Browser Exploitation: A Case Study Of CVE-2020-6507
[00:45:48] Chat Question: Getting Into Browser Exploitation
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/160.html
[00:00:00] Introduction
[00:00:24] Spot the Vuln - Chat Configuration
[00:02:06] CCC Cancelled
[00:07:53] Hacking TMNF: Part 2 - Exploiting a blind format string
[00:19:17] Windows Kernel integer overflows in registry subkey lists leading to memory corruption
[00:28:13] Browser Exploitation: A Case Study Of CVE-2020-6507
[00:45:48] Chat Question: Getting Into Browser Exploitation
More episodes of the podcast Day[0]
Exploiting VS Code with Control Characters
12/05/2025
Pulling Gemini Secrets and Windows HVPT
16/04/2025
ESP32 Backdoor Drama and SAML Auth Bypasses
17/03/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.