Ok Google, sudo ./hacktheplanet
Ok Google! Bypass authentication..and while we're at it, lets explot sudo and OpenSMPTD for root access. This week we dive into various code bases to explore several recent exploits that take advantage of some common yet subtle issues.
Correction: During the segment about the sudo (pwfeedback) exploit I incorrectly described the issue as a stack-based buffer overflow, however the buf variable is declared as static so it ends up in .bss and not on the stack. ~zi
- [00:00:30] Charges Dismissed Against Coalfire Employees
- [00:06:28] Avast to Commence Wind Down of Subsidiary Jumpshot
- [00:21:49] Say hello to OpenSK: a fully open-source security key implementation
- [00:28:04] Kraken Identifies Critical Flaw in Trezor Hardware Wallets
- [00:33:34] Zoom-Zoom: We Are Watching You
- [00:38:47] TeamViewer using encrypted passwords
- [00:47:22] Buffer overflow [in sudo] when pwfeedback is set in sudoers (CVE-2019-18634)
- [01:01:02] Opkg susceptible to MITM (CVE-2020-7982)
- [01:06:57] LPE and RCE in OpenSMTPD (CVE-2020-7247)
- [01:13:52] PHP 7.0-7.4 disable_functions bypass 0day PoC
- [01:28:32] Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure (Part I)
- [01:40:01] OK Google: bypass the authentication!
Watch the DAY podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)