Critical Thinking - Bug Bounty Podcast cover image

Episode 54: White Box Formulas - Vulnerable Coding Patterns

Critical Thinking - Bug Bounty Podcast

CHAPTER

Exploring Vulnerable Coding Patterns and Regex Practices

The chapter delves into bad code practices and vulnerable coding patterns, highlighting the misuse of regex for security and the importance of understanding regex thoroughly. It discusses the usage of red jacks and tools to identify vulnerabilities, emphasizing the significance of paying attention to edge cases and URL encoding. The conversation also delves into XSS challenges, discussing red jacks replacement, capture groups, and flags for more efficient coding and exploitation.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner