
Episode 18: Audit Code, Earn Bounties
Critical Thinking - Bug Bounty Podcast
00:00
The Transition to Config File Injection
The majority of the bug becomes like figuring out how to work within this like weird environment. The challenge is how do I use whatever's available within the config file? Whatever's available within this service or whatever that I'm hacking to Get rce or get an alify or whatever Like yeah A a classic a classic case of this that I'll just do a little self promotion here Now I'll do a little sam promotion. This is a sam earth talk I come in there for a couple minutes But this is largely sam or just doing the thing he rocks at which is looking at code and finding vulans.
Transcript
Play full episode