
Episode 5: AI Security, Hacking WiFi, the New XSS Hunter, and more
Critical Thinking - Bug Bounty Podcast
00:00
How to Generate an MD5 Hash Collision
Source maps are something to look deep into and I love how it's a little bit more readable when you get in there. It feels like you're looking through a source code project Yeah Cool, um, okay Next item on the list here MD5 hash collisions. We're always just trying to help you all develop the attacker mentality and give you new attack vectors to poke at Um here on a critical thinking.
Transcript
Play full episode