cover of episode Hacking Neural Nets, a Chrome WebRTC UAF and Pwning Windows [Binary Exploitation]

Hacking Neural Nets, a Chrome WebRTC UAF and Pwning Windows [Binary Exploitation]

2021/11/25
logo of podcast Day[0]

Day[0]

Frequently requested episodes will be transcribed first

Shownotes Transcript

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/hacking-neural-nets-a-chrome-webrtc-uaf-and-pwning-windows.html

Some mroe kernel bugs this week as we look at bugs in Samsung's NPU driver (Android), Linux, and the WIndows Kernel.

[00:00:17] Spot the Vuln - Once Again - Solution

[00:03:12] Google Chrome WebRTC addIceCandidate use after free vulnerability

[00:08:53] Linux: UAF read: SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect())

[00:15:08] Fall of the machines: Exploiting the Qualcomm NPU (neural processing unit) kernel driver

[00:31:13] POC2021 – Pwning the Windows 10 Kernel with NTFS and WNF Slides

The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:

- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities

- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.

The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec

You can also join our discord: https://discord.gg/daTxTK9

Or follow us on Twitter (@dayzerosec) to know when new releases are coming.