Critical Thinking - Bug Bounty Podcast cover image

Episode 54: White Box Formulas - Vulnerable Coding Patterns

Critical Thinking - Bug Bounty Podcast

00:00

Exploring Vulnerable Coding Patterns and Regex Practices

The chapter delves into bad code practices and vulnerable coding patterns, highlighting the misuse of regex for security and the importance of understanding regex thoroughly. It discusses the usage of red jacks and tools to identify vulnerabilities, emphasizing the significance of paying attention to edge cases and URL encoding. The conversation also delves into XSS challenges, discussing red jacks replacement, capture groups, and flags for more efficient coding and exploitation.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app