![Episode 3 [EN]: Juicy Exploits Artwork](https://www.buzzsprout.com/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBCTWNxTUFRPSIsImV4cCI6bnVsbCwicHVyIjoiYmxvYl9pZCJ9fQ==--d1b429fde0dcd486d90624cd40f57e0762e228e5/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaDdDVG9MWm05eWJXRjBPZ2hxY0djNkUzSmxjMmw2WlY5MGIxOW1hV3hzV3docEFsZ0NhUUpZQW5zR09nbGpjbTl3T2d0alpXNTBjbVU2Q25OaGRtVnlld1k2REhGMVlXeHBkSGxwUVRvUVkyOXNiM1Z5YzNCaFkyVkpJZ2x6Y21kaUJqb0dSVlE9IiwiZXhwIjpudWxsLCJwdXIiOiJ2YXJpYXRpb24ifX0=--1924d851274c06c8fa0acdfeffb43489fc4a7fcc/The%20Cyber%20Riddler%20Logo.jpg)
The Cyber Riddler
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
The Cyber Riddler
Episode 3 [EN]: Juicy Exploits
Exploit code are amazing, But sometimes the technique behind it
is what makes it shiny, In this episode I want you to look at exploit
codes from different perspective. not just finding vulnerabilities for
the sake of finding vulnerabilities. always change your mindset when
you do R&D from finding one vulnerability to finding one technique
that works for majority of vulnerabilities
Reference: Why You Shouldn’t Trust NTDLL from Kernel Image Load Callbacks
https://www.sentinelone.com/labs/case-study-why-you-shouldnt-trust-ntdll-from-kernel-image-load-callbacks/
- Twitter: @almorabea
- Twitter: @CyberRiddler
- Website: https://thecyberriddler.com