First, we talk about Facebook trying to buy some spyware, and then we feast upon a number of Zoom "vulns." Follow that up with some interesting vulnerabilities including a hyper-visor Guest-to-host escape, a complicated Safari permissions bypass, and a Gitlab Parser Differential.
[00:09:31] Facebook tried to buy NSO Group's iOS spyware to monitor iPhone users)
[00:14:49] Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings)
[00:28:28] Security Vulnerabilities fixed in Firefox 74.0.1 and Firefox ESR 68.6.1)
[00:33:20] Bug bounty platforms buy researcher silence, violate labor laws, critics say)
[00:53:56] Zoom NTLM Hash Leak)
[00:59:44] The 'S' in Zoom, Stands for Security)
[01:05:52] Use-After-Free Vulnerability in the VMware Workstation DHCP Component [CVE-2020-3947])
https://www.vmware.com/security/advisories/VMSA-2020-0004.html)
[01:15:38] Exploiting SMBGhost for a Local Privilege Escalation [CVE-2020-0796])
[01:26:31] How to exploit parser differentials)
[01:37:07] Unauthorized Camera access on iOS and macOS)
[01:49:07] [Slack] Relative Path Vulnerability Results in Arbitrary Command Execution/Privilege Escalation)
[01:54:21] Physically Realizable Adversarial Examples for LiDAR Object Detection)
[02:01:39] Attack matrix for Kubernetes)
[02:04:13] Tale of two hypervisor bugs - Escaping from FreeBSD bhyve)
[02:08:21] So you want to be a web security researcher?)
Watch the DAY[0] podcast live on Twitch (@dayzerosec)) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0]))