Critical Thinking - Bug Bounty Podcast cover image

Episode 27: Top 7 Esoteric Web Vulnerabilities

Critical Thinking - Bug Bounty Podcast

00:00

Config Injection File Injection: What You Should Know

These are Volm's that are at the top of my list and in Joel's as well. Some of them are more common than others. I personally have seen it significantly more often in like routers and smart devices and IOT, whatever is right. And typically it's really just understanding what sort of weird functionality is built in and exists that you can then exploit to your advantage.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app