
Episode 27: Top 7 Esoteric Web Vulnerabilities
Critical Thinking - Bug Bounty Podcast
00:00
How to Inject a Configuration File Into a System
It's very dependent on getting a good grip on where you're at in the system, which is why you see people like Orange and the asset node team. Oftentimes it's pretty easy to inject into that configuration file your own malicious input. And that can result in some crazy vulnerabilities, but it's also going to result in somecrazy exploitation scenarios.
Transcript
Play full episode