Critical Thinking - Bug Bounty Podcast cover image

Episode 92 - SAML XPath Confusion, Chinese DNS Poisoning, and AI Powered 403 Bypasser

Critical Thinking - Bug Bounty Podcast

00:00

Navigating CSP Bypass Techniques and AI Vulnerabilities

This chapter explores a newly updated GitHub tool for CSV bypass techniques to navigate Content Security Policy (CSP) restrictions, emphasizing community collaboration for improvements. It also delves into vulnerabilities within AI applications, specifically an RPC server that allows unauthorized operations, highlighting the risks of exploiting non-HTTP protocols. The speakers encourage persistence in overcoming challenges related to software setup and advocate for deeper investigation into lower-level exploitation techniques, showcasing the importance of encoding strategies in bypassing Web Application Firewalls.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app