
ep2023-09 Vulnerable Data Gathering for AI with Arturo Buanzo Busleiman
The OWASP Podcast Series
00:00
Analyzing Vulnerabilities and Risks in Access Logs
The chapter explores the concept of vulnerability in pen testing and the potential risk of access logs being published. It discusses the importance of analyzing logs and highlights vulnerabilities that can be discovered through log analysis, including logging injection and minor misconfigurations. The chapter also addresses the risks associated with sharing financial data between countries and emphasizes the need for context when assessing the severity of vulnerabilities.
Play episode from 13:08
Transcript


