14min chapter

Critical Thinking - Bug Bounty Podcast cover image

Ep 100 - 8 Fav Bugs of 2024, Farewell Joel, Hello Shift - Cursor of Hacking

Critical Thinking - Bug Bounty Podcast

CHAPTER

Unveiling Exploitation Techniques in Complex Applications

This chapter focuses on the analysis and exploitation of a vendor application, highlighting the challenges posed by technologies like Node.js and Java. It presents significant findings from a bug bounty challenge, revealing vulnerabilities such as pre-authentication attack vectors and SSRF leading to SQL injection. The discussion captures the intricate processes and technical maneuvers necessary for overcoming security measures in modern cybersecurity environments.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode