Every wondering how you might fingerprint and trace exploit devs in the wild? Wondered what a backdoor in a D-Link router looks like? Want to hack Facebook (for Android)? We have all of that and more!
[00:00:43] Google: Android Partner Vulnerability Initiative)
[00:02:55] Project Zero: Announcing the Fuzzilli Research Grant Program)
[00:08:40] GitHub: Code scanning is now available)
[00:16:39] Hunting for exploits by looking for the author's fingerprints)
[00:22:26] Forcing Firefox to Execute XSS Payloads during 302 Redirects)
[00:27:10] Exploiting fine-grained AWS IAM permissions for total cloud compromise)
https://medium.com/bugbountywriteup/aws-iam-explained-for-red-and-blue-teams-2dda8b20fbf7)
[00:38:04] BLURtooth (the BLUR attacks) )
[00:44:25] Arbitrary code execution on Facebook for Android)
[00:51:44] [stripo] Public and secret api key leaked in JavaScript source)
[01:00:14] [GitLab] Unvalidated Oauth email results in accounts takeovers on 3rd parties)
[01:06:03] Hacking Grindr Accounts with Copy and Paste)
[01:16:37] Exploiting Other Remote Protocols in IBM WebSphere)
https://portswigger.net/web-security/deserialization/exploiting)
[01:25:57] The Anatomy of a Bug Door: Dissecting Two D-Link Router Authentication Bypasses )
[01:38:36] Hacking Punkbuster.)
[01:43:26] Race Condition in handling of PID by apport [CVE-2020-15702])
[01:57:24] Hardware Hacking Experiments)
[01:59:11] How I automated McDonalds mobile game to win free iPhones)
[01:59:42] Voyager - A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel))
[02:00:28] zznop/sploit: Go package that aids in binary analysis and exploitation)
Watch