
Episode 132: Archive Testing Methodology with Mathias Karlsson
Critical Thinking - Bug Bounty Podcast
00:00
Navigating File Vulnerabilities
This chapter explores the complexities of file naming and path traversal vulnerabilities within software applications. It discusses the nuances of file permissions, hard links, and the differences between zip and tar archives, emphasizing their security implications. Additionally, the conversation highlights advanced techniques in archive manipulation and the importance of community collaboration in addressing these issues.
Transcript
Play full episode