Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by dayzerosec. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by dayzerosec or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Exploiting VS Code with Control Characters

30:08
 
Share
 

Manage episode 482353001 series 2606557
Content provided by dayzerosec. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by dayzerosec or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

A quick episode this week, which includes attacking VS Code with ASCII control characters, as well as a referrer leak and SCIM hunting.

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/282.html

[00:00:00] Introduction

[00:00:57] Attacking Hypervisors - Training Update

[00:06:20] Drag and Pwnd: Leverage ASCII characters to exploit VS Code

[00:12:12] Full Referer URL leak through img tag

[00:17:52] SCIM Hunting - Beyond SSO

[00:25:17] Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages

Podcast episodes are available on the usual podcast platforms:

-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063

-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt

-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz

-- Other audio platforms can be found at https://anchor.fm/dayzerosec

You can also join our discord: https://discord.gg/daTxTK9

  continue reading

282 episodes

Artwork

Exploiting VS Code with Control Characters

Day[0]

43 subscribers

published

iconShare
 
Manage episode 482353001 series 2606557
Content provided by dayzerosec. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by dayzerosec or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

A quick episode this week, which includes attacking VS Code with ASCII control characters, as well as a referrer leak and SCIM hunting.

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/282.html

[00:00:00] Introduction

[00:00:57] Attacking Hypervisors - Training Update

[00:06:20] Drag and Pwnd: Leverage ASCII characters to exploit VS Code

[00:12:12] Full Referer URL leak through img tag

[00:17:52] SCIM Hunting - Beyond SSO

[00:25:17] Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages

Podcast episodes are available on the usual podcast platforms:

-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063

-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt

-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz

-- Other audio platforms can be found at https://anchor.fm/dayzerosec

You can also join our discord: https://discord.gg/daTxTK9

  continue reading

282 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play