Critical Thinking - Bug Bounty Podcast cover image

Episode 63: JHaddix Returns

Critical Thinking - Bug Bounty Podcast

00:00

Evolution of Bug Bounty and Red Teaming Techniques

The chapter delves into the integration of red team techniques into bug bounty programs, highlighting topics such as implants, command and control servers, modern phishing techniques, and evading security software. It explores the challenges faced by both attackers and defenders in the cyber realm, emphasizing the importance of mimicking real adversaries. The speaker discusses the utilization of threat intel data from the dark web, credential verification, and the purchasing of stolen credentials by adversaries in the context of bug bounty and red team operations.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app