Episode 35 — Ports, Services, Applications, Race Conditions, and Malicious Updates (2.4)

This episode covers several common sources of technical exposure, including open ports, unnecessary services, vulnerable applications, race conditions, time-of-check/time-of-use weaknesses, and malicious updates. Students should understand that attackers look for services that should not be exposed, applications that are poorly maintained, and timing flaws that allow an action to change between validation and execution. Malicious updates can also compromise systems when software supply chains, update channels, or trusted installers are abused. For exam scenarios, students should focus on reducing exposure through service hardening, application patching, secure update validation, least functionality, code review, monitoring, and careful testing of timing-sensitive processes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!
Episode 35 — Ports, Services, Applications, Race Conditions, and Malicious Updates (2.4)
Broadcast by