
Episode 32: The Great Write-up Low-down
Critical Thinking - Bug Bounty Podcast
00:00
State Machine Flow and Exploiting Sub States
This chapter discusses the flow of a state machine in a sign-up process and explores the concept of sub states and how they can be abused to gain access to functionalities. It also delves into race conditions, the 'last last bite sink,' and the single packet attack for HTTP.
Transcript
Play full episode