[bounty] DEF CON, HardwearIO, Broken Caching, and Dropping Headers

We are back, and talking about our summer with a lengthy discussion about our DEF CON experiences before getting into some favorite issues from the summer. Including a neat twist on a PHP security feature that might be using in your bug bounty chains. A look at classic crypto issue (unauthenticated encrypted blobs), and an easily missed caching issue. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/215.html [00:00:00] Introduction [00:02:15] Summer Recap - HardwearIO [00:11:51] Summer Recap - DEF CON [00:49:20] CVE-2020-19909 is everything that is wrong with CVEs [00:58:40] PHP servers drop any header if the header has "\r" [@OctagonNetworks] [01:03:10] Encrypted Doesn't Mean Authenticated: ShareFile RCE [CVE-2023-24489] [01:11:40] How Private Cache Can Lead to Mass Account Takeover [01:15:20] From Terminal Output to Arbitrary Remote Code Execution [01:16:37] Mashing Enter to bypass full disk encryption with TPM, Clevis, dracut and systemd The DAY[0] Podcast episodes are streamed live on Twitch twice a week: -- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities -- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits. We are also available on the usual podcast platforms: -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063 -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz -- Other audio platforms can be found at https://anchor.fm/dayzerosec You can also join our discord: https://discord.gg/daTxTK9 #BugBounty #BugHunting #InfoSec #CyberSec #Podcast Continue? (y/N) n 2023/09/26 00:57:09 [1] Set Start Time and Offset 2023/09/26 00:57:09 [2] Download and Convert Episode 2023/09/26 00:57:09 [3] Youtube Stuff 2023/09/26 00:57:09 [4] Print Episode 2023/09/26 00:57:09 [5] Create Blog Post Selection: 4 2023/09/26 00:57:11 215 - DEF CON, HardwearIO, Broken Caching, and Dropping Headers [Bug Bounty Podcast] [bounty] DEF CON, HardwearIO, Broken Caching, and Dropping Headers ============================================ We are back, and talking about our summer with a lengthy discussion about our DEF CON experiences before getting into some favorite issues from the summer. Including a neat twist on a PHP security feature that might be using in your bug bounty chains. A look at classic crypto issue (unauthenticated encrypted blobs), and an easily missed caching issue. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/215.html [00:00:00] Introduction [00:02:15] Summer Recap - HardwearIO [00:11:51] Summer Recap - DEF CON [00:49:20] CVE-2020-19909 is everything that is wrong with CVEs [00:58:40] PHP servers drop any header if the header has "\r" [@OctagonNetworks] [01:03:10] Encrypted Doesn't Mean Authenticated: ShareFile RCE [CVE-2023-24489] [01:11:40] How Private Cache Can Lead to Mass Account Takeover [01:15:20] From Terminal Output to Arbitrary Remote Code Execution [01:16:37] Mashing Enter to bypass full disk encryption with TPM, Clevis, dracut and systemd The DAY[0] Podcast episodes are streamed live on Twitch twice a week: -- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities -- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits. We are also available on the usual podcast platforms: -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063 -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz -- Other audio platforms can be found at https://anchor.fm/dayzerosec You can also join our discord: https://discord.gg/daTxTK9

Om Podcasten

A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.