Critical Thinking - Bug Bounty Podcast cover image

Episode 27: Top 7 Esoteric Web Vulnerabilities

Critical Thinking - Bug Bounty Podcast

00:00

How to Inject a Configuration File Into a System

It's very dependent on getting a good grip on where you're at in the system, which is why you see people like Orange and the asset node team. Oftentimes it's pretty easy to inject into that configuration file your own malicious input. And that can result in some crazy vulnerabilities, but it's also going to result in somecrazy exploitation scenarios.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app