[binary] A Timing Side-Channel for Kernel Exploitation and VR in the wake of Rust
Day[0] - A podcast by dayzerosec
Categories:
Not a lot of interesting binary exploitation topics for this week, we've got a DHCPv6 service vuln, and a fun idea to use a timing side-channel to improve exploit stability. Then we end with a discussion about Rust coming the Windows operating system, what Rust means for the future of exploit development and vulnerability research and the value of memory corruption in Windows. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/208.html [00:00:00] Introduction [00:00:17] Spot the Vuln - Organizational Issues [00:09:21] RCE in the Microsoft Windows DHCPv6 Service [CVE-2023-28231] [00:12:29] PSPRAY: Timing Side-Channel based Linux Kernel Heap Exploitation Technique [00:22:16] Rust and the future of VR The DAY[0] Podcast episodes are streamed live on Twitch twice a week: -- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities -- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits. We are also available on the usual podcast platforms: -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063 -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz -- Other audio platforms can be found at https://anchor.fm/dayzerosec You can also join our discord: https://discord.gg/daTxTK9