Critical Thinking - Bug Bounty Podcast cover image

Episode 52: Best Technical Content from Year 1 of CTBB Podcast

Critical Thinking - Bug Bounty Podcast

CHAPTER

Cross Environment Authentication and Shared Secrets

Discussion on the use of authentication tokens to bypass access controls, the prevalence of this issue, and the importance of properly checking token validity and authorization. Also explored are authentication vulnerabilities in bug bounty programs, including multi-factor authentication bypasses and the vulnerability of authentication objects to IDOR attacks.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner