Chapter
Clips
A hacker can exploit a vulnerability inside the baseband processor of a phone to gain code execution and access to the nearest base station from the carrier, putting the user's phone at risk of attacks like text interception, call interruption, and location tracking.
42:06 - 43:49 (01:43)
Summary
A hacker can exploit a vulnerability inside the baseband processor of a phone to gain code execution and access to the nearest base station from the carrier, putting the user's phone at risk of attacks like text interception, call interruption, and location tracking.
ChapterExploiting Smartphones: Unlocking Deleted Content
Episode82: Master of Pwn
PodcastDarknet Diaries
A group of hackers found an exploit in the infotainment system of a Tesla Model 3, allowing them to retrieve deleted content from a paired phone.
43:49 - 47:54 (04:04)
Summary
A group of hackers found an exploit in the infotainment system of a Tesla Model 3, allowing them to retrieve deleted content from a paired phone.
ChapterExploiting Smartphones: Unlocking Deleted Content
Episode82: Master of Pwn
PodcastDarknet Diaries
Pwn2Own started with small teams and individuals participating in the program, but now has grown to include small and large organizations from around the world.
47:54 - 50:07 (02:13)
Summary
Pwn2Own started with small teams and individuals participating in the program, but now has grown to include small and large organizations from around the world. Researchers are encouraged to report bugs in specific categories and targets to win the competition.