Critical Thinking - Bug Bounty Podcast cover image

Episode 4: H1-407 Event Madness & Takeaways Part 2 w/ Special Guest Spaceraccoon

Critical Thinking - Bug Bounty Podcast

00:00

How to Find the Right Training for You

The key thing with binary exploitation is knowledge of assembly. I think reverse engineering, even a little bit in the binary space, not just, you know, in source code, it's super helpful. The NTLM hash might be useful to test network pen-testers for potential bugs as well as actual exploits. And then we'll talk about cross discipline experience and learn some new techniques.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app