Critical Thinking - Bug Bounty Podcast cover image

Episode 5: AI Security, Hacking WiFi, the New XSS Hunter, and more

Critical Thinking - Bug Bounty Podcast

00:00

How to Generate an MD5 Hash Collision

Source maps are something to look deep into and I love how it's a little bit more readable when you get in there. It feels like you're looking through a source code project Yeah Cool, um, okay Next item on the list here MD5 hash collisions. We're always just trying to help you all develop the attacker mentality and give you new attack vectors to poke at Um here on a critical thinking.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app