
Episode 18: Audit Code, Earn Bounties
Critical Thinking - Bug Bounty Podcast
00:00
Introduction
Shabam: This is a it's a really good week. We got a ton of really cool stuff to talk about sweet. The first article was brought to my attention by none other than Shubs Infosec a you Shabam himself, the legend. And we'll see that they follow the same flow that I talked about even back in my um, my talk that I did on the grifana s or f years ago. In this specific post they're able to get rce by essentially pivoting a reverse proxyUm and path traversing back up and hitting Endpoints that are supposed to be a pass authentication Um, but through a a An endpoint that has authentication set
Transcript
Play full episode