Artwork

Content provided by Cisco Talos. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cisco Talos or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

I find your vulnerabilities offensive (and exploitable).

1:00:21
 
Share
 

Manage episode 348390398 series 1443020
Content provided by Cisco Talos. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cisco Talos or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

We are (finally) talking about the recent OpenSSL vulnerability as we had to redo this EP. In our infinite podcasting wisdom, we took a stab at it roughly 2 hours before the embargo expired and coverage was released - which is obviously is a very silly idea in hindsight.
After we cover the current issue at hand, Lurene leads us through the surface levels of how vulns can be exploited in the heap or stack, and the different perspective and processes in practice by offensive security experts. If you want to walk away with a new view of vulns and exploits, stay for the whole hour.
Here is a great write up from DataDog on OpenSSL vulnerability CVE-2022-3602.

  continue reading

153 episodes

Artwork
iconShare
 
Manage episode 348390398 series 1443020
Content provided by Cisco Talos. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cisco Talos or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

We are (finally) talking about the recent OpenSSL vulnerability as we had to redo this EP. In our infinite podcasting wisdom, we took a stab at it roughly 2 hours before the embargo expired and coverage was released - which is obviously is a very silly idea in hindsight.
After we cover the current issue at hand, Lurene leads us through the surface levels of how vulns can be exploited in the heap or stack, and the different perspective and processes in practice by offensive security experts. If you want to walk away with a new view of vulns and exploits, stay for the whole hour.
Here is a great write up from DataDog on OpenSSL vulnerability CVE-2022-3602.

  continue reading

153 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide