Critical Thinking - Bug Bounty Podcast cover image

Episode 89: The Untapped Bug Bounty Landscape of IoT w/ Matt Brown

Critical Thinking - Bug Bounty Podcast

00:00

Exploring Firmware Analysis and Post-Exploitation Techniques in IoT

This chapter explores the detailed process of extracting and analyzing firmware from Internet of Things devices, highlighting key techniques for identifying sensitive data and configurations. It also examines post-exploitation strategies, including network service assessment and data interception methods.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app