Critical Thinking - Bug Bounty Podcast cover image

Episode 113: Best Technical Takeaways from Portswigger Top 10 2024

Critical Thinking - Bug Bounty Podcast

CHAPTER

Navigating Security Vulnerabilities

This chapter explores various security vulnerabilities, focusing on SQL injection, confusion attacks, and the implications of rewrite rules in server configurations. The discussion includes techniques for identifying path truncation issues and the exploitation of symbolic links for remote code execution. Ultimately, the speakers highlight the significance of bug bounty programs in enhancing internet security and share personal experiences that emphasize the thrill of discovering vulnerabilities.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner