Artwork

Content provided by Ahmad Almorabea. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ahmad Almorabea or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 3 [EN]: Juicy Exploits

9:43
 
Share
 

Manage episode 354124705 series 3428705
Content provided by Ahmad Almorabea. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ahmad Almorabea or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Exploit code are amazing, But sometimes the technique behind it
is what makes it shiny, In this episode I want you to look at exploit
codes from different perspective. not just finding vulnerabilities for
the sake of finding vulnerabilities. always change your mindset when
you do R&D from finding one vulnerability to finding one technique
that works for majority of vulnerabilities
Reference: Why You Shouldn’t Trust NTDLL from Kernel Image Load Callbacks
https://www.sentinelone.com/labs/case-study-why-you-shouldnt-trust-ntdll-from-kernel-image-load-callbacks/

  continue reading

25 episodes

Artwork
iconShare
 
Manage episode 354124705 series 3428705
Content provided by Ahmad Almorabea. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ahmad Almorabea or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Exploit code are amazing, But sometimes the technique behind it
is what makes it shiny, In this episode I want you to look at exploit
codes from different perspective. not just finding vulnerabilities for
the sake of finding vulnerabilities. always change your mindset when
you do R&D from finding one vulnerability to finding one technique
that works for majority of vulnerabilities
Reference: Why You Shouldn’t Trust NTDLL from Kernel Image Load Callbacks
https://www.sentinelone.com/labs/case-study-why-you-shouldnt-trust-ntdll-from-kernel-image-load-callbacks/

  continue reading

25 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide