Critical Thinking - Bug Bounty Podcast cover image

Ep 100 - 8 Fav Bugs of 2024, Farewell Joel, Hello Shift - Cursor of Hacking

Critical Thinking - Bug Bounty Podcast

00:00

Unveiling Exploitation Techniques in Complex Applications

This chapter focuses on the analysis and exploitation of a vendor application, highlighting the challenges posed by technologies like Node.js and Java. It presents significant findings from a bug bounty challenge, revealing vulnerabilities such as pre-authentication attack vectors and SSRF leading to SQL injection. The discussion captures the intricate processes and technical maneuvers necessary for overcoming security measures in modern cybersecurity environments.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app