Critical Thinking - Bug Bounty Podcast cover image

Episode 63: JHaddix Returns

Critical Thinking - Bug Bounty Podcast

CHAPTER

Evolution of Bug Bounty and Red Teaming Techniques

The chapter delves into the integration of red team techniques into bug bounty programs, highlighting topics such as implants, command and control servers, modern phishing techniques, and evading security software. It explores the challenges faced by both attackers and defenders in the cyber realm, emphasizing the importance of mimicking real adversaries. The speaker discusses the utilization of threat intel data from the dark web, credential verification, and the purchasing of stolen credentials by adversaries in the context of bug bounty and red team operations.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner