Critical Thinking - Bug Bounty Podcast cover image

Episode 74: Supply Chain Attack Primer - Popping RCE Without an HTTP Request (feat 0xLupin)

Critical Thinking - Bug Bounty Podcast

00:00

Significance of Lock Files and Supply Chain Security Vulnerabilities

This chapter delves into the importance of lock files in packages for maintaining all dependencies and emphasizes the role of scanning tools in effective tool building. It discusses supply chain issues, vulnerabilities, and the significance of checking artifacts in bug bounty programs. The conversation highlights security vulnerabilities in the supply chain, focusing on subdependency mapping, attacking artifactories and registries, and the impact of cache poisoning on disrupting client pipelines.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app