Critical Thinking - Bug Bounty Podcast cover image

Episode 130: Minecraft Hacks to Google Hacking Star - Valentino

Critical Thinking - Bug Bounty Podcast

00:00

Exploiting Vulnerabilities in Tomcat and Beyond

This chapter explores the vulnerabilities of a Tomcat instance when accessed through a reverse proxy, including issues related to default credentials and path traversal. The discussion includes the exploitation of payloads to gain access to restricted areas and highlights the significance of JMX in circumventing traditional security measures. Through personal narratives, the speakers share their journeys from early hacking experiences in gaming to professional penetration testing and bug bounty hunting.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app