Critical Thinking - Bug Bounty Podcast cover image

Episode 18: Audit Code, Earn Bounties

Critical Thinking - Bug Bounty Podcast

00:00

The Transition to Config File Injection

The majority of the bug becomes like figuring out how to work within this like weird environment. The challenge is how do I use whatever's available within the config file? Whatever's available within this service or whatever that I'm hacking to Get rce or get an alify or whatever Like yeah A a classic a classic case of this that I'll just do a little self promotion here Now I'll do a little sam promotion. This is a sam earth talk I come in there for a couple minutes But this is largely sam or just doing the thing he rocks at which is looking at code and finding vulans.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app