Critical Thinking - Bug Bounty Podcast cover image

Episode 2: Exploit Writing & Automation / Do you need to know how to program to hack?

Critical Thinking - Bug Bounty Podcast

00:00

Java vs Cryptocurrency

Joel: We bypassed all the, all the crypto stuff, got down to the root level protocol. And even though we had 10, 10 tries, only 10 tries, that as many times as we want, we can just do it really, really fast and try a bunch of times with a bunch of different threads. Joel: It was like 30 seconds at one point. Uh, it took to just take over that whole device. Once you've taken over the device, um, your, your key that you're using in the crypto portion of that is stored on the machine and you won't have to reoff again to push data to that device.

Play episode from 55:57
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app