Cyber Crime Junkies cover image

Break in. Offensive Security. Hacker Phil Wylie.

Cyber Crime Junkies

00:00

How to Validate Vulnerabilities in Pen Testing

Most common and probably the kind of most boring is like the SSL and TLS related vulnerabilities. A lot of cases, they're not exploitable, but you have to prove that they're vulnerable. One of the things you don't see as much now is SQL injection vulnerabilities where you can actually get command on access or system control. And some of the tools that SOC teams are getting are just so dynamic and I just find them fascinating.

Play episode from 25:35
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app