Critical Thinking - Bug Bounty Podcast cover image

Episode 74: Supply Chain Attack Primer - Popping RCE Without an HTTP Request (feat 0xLupin)

Critical Thinking - Bug Bounty Podcast

CHAPTER

Significance of Lock Files and Supply Chain Security Vulnerabilities

This chapter delves into the importance of lock files in packages for maintaining all dependencies and emphasizes the role of scanning tools in effective tool building. It discusses supply chain issues, vulnerabilities, and the significance of checking artifacts in bug bounty programs. The conversation highlights security vulnerabilities in the supply chain, focusing on subdependency mapping, attacking artifactories and registries, and the impact of cache poisoning on disrupting client pipelines.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner