
Episode 2: Exploit Writing & Automation / Do you need to know how to program to hack?
Critical Thinking - Bug Bounty Podcast
00:00
Java vs Cryptocurrency
Joel: We bypassed all the, all the crypto stuff, got down to the root level protocol. And even though we had 10, 10 tries, only 10 tries, that as many times as we want, we can just do it really, really fast and try a bunch of times with a bunch of different threads. Joel: It was like 30 seconds at one point. Uh, it took to just take over that whole device. Once you've taken over the device, um, your, your key that you're using in the crypto portion of that is stored on the machine and you won't have to reoff again to push data to that device.
Play episode from 55:57
Transcript


