This dangerous OpenSSL vulnerability can easily be triggered | CVE-2022-2274 Explained

This dangerous OpenSSL vulnerability can easi...

Up next

5 Backend Design Patterns for Managing Threads and Sockets

In this video I introduce 5 different design patterns for building backend applications. Each mode explains how a socket listener is established, a connections are established and how threads and connections are managed to read, write and process requests. 

Page Tables

Page tables provide the mapping between virtual memory and physical memory for each process. This means it needs to be as efficient and as fast as possible. I explore the inner workings of page tables in this episode.0:00 Intro2:00 Virtual Memory ⁃ ⁃ 8:00 MMU10:00 Page Tables ⁃ ⁃ ...  Show more

Recommended Episodes

JavaScript Vulnerabilities with Tim Kadlec - The State of the Web
The State of the Web

<span style="font-weight: 400;">(Originally aired on YouTube on May 30, 2018)</span>

<span style="font-weight: 400;">Rick and Tim talk about how insecure much of the web really is, the various vulnerabilities in web security that can leave you open to attack, the challe ...

  Show more

Episode 64: .NET Remoting, CDN Attack Surface, and Recon vs Main App
Critical Thinking - Bug Bounty Podcast

Episode 64: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Justin and Joel delve into .NET remoting and how it can be exploited, a recent bypass in the Dom Purify library and some interesting functionality in the Cloudflare CDN-CGI endpoint. They also tou ...  Show more

CISA Alert AA22-138A – Threat Actors Exploiting F5 BIG-IP CVE-2022-1388. [CISA Cybersecurity Alerts]
CyberWire Daily

CISA and the Multi-State Information Sharing & Analysis Center (MS-ISAC), are releasing this joint Cybersecurity Advisory in response to active exploitation of CVE-2022-1388. This vulnerability is a critical iControl REST authentication bypass vulnerability affecting multiple ver ...  Show more

Episode 73: Sandboxed IFrames and WAF Bypasses
Critical Thinking - Bug Bounty Podcast

Episode 73: In this episode of Critical Thinking - Bug Bounty Podcast we give a brief recap of Nahamcon and then touch on some topics like WAF bypass tools, sandboxed iframes, and programs redacting your reports.Follow us on twitter at: @ctbbpodcastWe're new to this podcasting th ...  Show more