Critical Thinking - Bug Bounty Podcast cover image

Episode 52: Best Technical Content from Year 1 of CTBB Podcast

Critical Thinking - Bug Bounty Podcast

00:00

Cross Environment Authentication and Shared Secrets

Discussion on the use of authentication tokens to bypass access controls, the prevalence of this issue, and the importance of properly checking token validity and authorization. Also explored are authentication vulnerabilities in bug bounty programs, including multi-factor authentication bypasses and the vulnerability of authentication objects to IDOR attacks.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app