
Finding criticals in mobile apps - Joel Margolis (0xteknogeek) from the Critical Thinking Bug Bounty podcast
Bug Bounty Reports Discussed
Navigating Mobile Hacking: Risks and Techniques
This chapter explores the speaker's transition from mobile hacking to web hacking, emphasizing their commitment to identifying high-severity vulnerabilities. It discusses the complexities of assessing risks associated with mobile app vulnerabilities and highlights practical techniques for exploiting these weaknesses. The conversation also underscores the importance of a robust vulnerability scoring system tailored specifically for mobile applications.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.