Nov. 15, 2022, 9 p.m. | DAY[0]

DAY[0] www.youtube.com

A Pixel Lockscreen bypass and some discussion about dupes in bug bounty, then a long RCE chain, and a look at client-side path traversals.

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/167.html

[00:00:00] Introduction
[00:00:48] Accidental $70k Google Pixel Lock Screen Bypass
[00:23:28] Discovering vendor-specific vulnerabilities in Android
[00:34:30] Checkmk: Remote Code Execution by Chaining Multiple Bugs
[00:52:13] Practical Client Side Path Traversal Attacks

The DAY[0] Podcast episodes are streamed live on Twitch twice a week:
-- …

bounty bug bug bounty bypassing checkmk lock pixel podcast rce

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Audit and Compliance Technical Analyst

@ Accenture Federal Services | Washington, DC

ICS Cyber Threat Intelligence Analyst

@ STEMBoard | Arlington, Virginia, United States

Cyber Operations Analyst

@ Peraton | Arlington, VA, United States

Cybersecurity – Information System Security Officer (ISSO)

@ Boeing | USA - Annapolis Junction, MD

Network Security Engineer I - Weekday Afternoons

@ Deepwatch | Remote