Jan. 18, 2023, 11:50 p.m. | zi

DAY[0] dayzerosec.com

An Apple-focused episode this week, with a trivial iPod Nano BootRom exploit, and a WebKit Use-after-free. We also have a really cool XNU Virutal Memory bug, strictly a race condition and a logic differential between two alternate paths resulting in bypassing copy-on-write protection. We also handle a few questions from chat, how much reverse engineering is necessary for vuln research, how much programming knowledge is required, and a bit about AI's applicability to reverse engineering.

apple binary-podcast bug bypassing chat copy engineering exploit free hash-import-2023-02-16-04-52 knowledge logic memory podcast programming protection questions race condition research reverse reverse engineering uaf use-after-free vuln webkit

Senior Security Engineer

@ LiquidX | Singapore, Central Singapore, Singapore

Application Security Engineer

@ Solidigm | Zapopan, Mexico

Application Security Engineer

@ Yassir | worldwide

Senior Windows Threat & Detection Security Researcher (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

MDR Security Analyst

@ SentinelOne | Israel

Principal Security Research Engineer (Prisma Cloud)

@ Palo Alto Networks | Bengaluru, India