
Episode 27: Top 7 Esoteric Web Vulnerabilities
Critical Thinking - Bug Bounty Podcast
00:00
Config Injection File Injection: What You Should Know
These are Volm's that are at the top of my list and in Joel's as well. Some of them are more common than others. I personally have seen it significantly more often in like routers and smart devices and IOT, whatever is right. And typically it's really just understanding what sort of weird functionality is built in and exists that you can then exploit to your advantage.
Transcript
Play full episode