Critical Thinking - Bug Bounty Podcast cover image

Episode 27: Top 7 Esoteric Web Vulnerabilities

Critical Thinking - Bug Bounty Podcast

00:00

How to Exploit NTLM Hashes

This is one of those things that's a little bit outside of my realm of like familiar knowledge. It's like network pen testing stuff. And typically the type of hacking that we're doing is like web hacking or like mobile hacking, maybe hardware hacking,. But generally not like internal pen test type stuff where the NTLM hashes are going to be leaked. So I think it's very important to have this sort of cross discipline.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app