
Episode 4: H1-407 Event Madness & Takeaways Part 2 w/ Special Guest Spaceraccoon
Critical Thinking - Bug Bounty Podcast
00:00
How to Find the Right Training for You
The key thing with binary exploitation is knowledge of assembly. I think reverse engineering, even a little bit in the binary space, not just, you know, in source code, it's super helpful. The NTLM hash might be useful to test network pen-testers for potential bugs as well as actual exploits. And then we'll talk about cross discipline experience and learn some new techniques.
Transcript
Play full episode