Artwork

Content provided by Ahmad Almorabea. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ahmad Almorabea or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

Episode 3 [EN]: Juicy Exploits

9:43
 
Distribuie
 

Manage episode 354124705 series 3428705
Content provided by Ahmad Almorabea. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ahmad Almorabea or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

Exploit code are amazing, But sometimes the technique behind it
is what makes it shiny, In this episode I want you to look at exploit
codes from different perspective. not just finding vulnerabilities for
the sake of finding vulnerabilities. always change your mindset when
you do R&D from finding one vulnerability to finding one technique
that works for majority of vulnerabilities
Reference: Why You Shouldn’t Trust NTDLL from Kernel Image Load Callbacks
https://www.sentinelone.com/labs/case-study-why-you-shouldnt-trust-ntdll-from-kernel-image-load-callbacks/

  continue reading

25 episoade

Artwork
iconDistribuie
 
Manage episode 354124705 series 3428705
Content provided by Ahmad Almorabea. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ahmad Almorabea or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

Exploit code are amazing, But sometimes the technique behind it
is what makes it shiny, In this episode I want you to look at exploit
codes from different perspective. not just finding vulnerabilities for
the sake of finding vulnerabilities. always change your mindset when
you do R&D from finding one vulnerability to finding one technique
that works for majority of vulnerabilities
Reference: Why You Shouldn’t Trust NTDLL from Kernel Image Load Callbacks
https://www.sentinelone.com/labs/case-study-why-you-shouldnt-trust-ntdll-from-kernel-image-load-callbacks/

  continue reading

25 episoade

Tous les épisodes

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință