Critical Thinking - Bug Bounty Podcast cover image

Episode 97: Bcrypt Hash Input Truncation & Mobile Device Threat Modeling

Critical Thinking - Bug Bounty Podcast

00:00

Vulnerabilities in Bcrypt and Mobile Security

This chapter explores a critical vulnerability in bcrypt related to username input truncation, impacting multi-factor authentication security. It discusses the transition from bcrypt to PBKDF2 as a response to identified flaws and reflects on historical security issues. Additionally, the chapter highlights mobile security vulnerabilities, particularly regarding intent URLs and inter-app communication risks, emphasizing the ongoing challenges of threat modeling in mobile environments.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app