DiscoverThe Cyber RiddlerEpisode 3 [EN]: Juicy Exploits
Episode 3 [EN]: Juicy Exploits

Episode 3 [EN]: Juicy Exploits

Update: 2023-02-01
Share

Description

Exploit code are amazing, But sometimes the technique behind it
is what makes it shiny, In this episode I want you to look at exploit
codes from different perspective. not just finding vulnerabilities for
the sake of finding vulnerabilities. always change your mindset when
you do R&D from finding one vulnerability to finding one technique
that works for majority of vulnerabilities

Reference: Why You Shouldn’t Trust NTDLL from Kernel Image Load Callbacks
https://www.sentinelone.com/labs/case-study-why-you-shouldnt-trust-ntdll-from-kernel-image-load-callbacks/

  • Twitter: @almorabea
  • Twitter: @CyberRiddler
  • Website: https://thecyberriddler.com
Comments 
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Episode 3 [EN]: Juicy Exploits

Episode 3 [EN]: Juicy Exploits

Ahmad Almorabea