Critical Thinking - Bug Bounty Podcast

Episode 21: Chill Chat with Legendary DoD Hacker Corben Leo

Jun 1, 2023
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 5min
2
Corbin's 100 Rules for Bug Bounty
05:13 • 2min
3
How to Hack a Big App
06:51 • 2min
4
How to Find a Good Program for Lows and Mediums
08:48 • 2min
5
How to Find a Bug That's Out of Scope
11:02 • 2min
6
Hacking Out of Scope
13:05 • 2min
7
The Importance of AC Access Control High to Report Back
15:22 • 2min
8
The Importance of Communication in Cyber Security
17:25 • 3min
9
The Future of Bug Bounty
20:03 • 2min
10
The Origin Story of a Bug Bounty Hunter
22:09 • 3min
11
How to Hack for Fun
25:00 • 2min
12
Naffy's Hacking Methodology
27:03 • 2min
13
How to Identify a Load Balancer With Kubernetes
28:51 • 2min
14
How to Map Domains to IP Addresses in Reach Con Architectures
30:46 • 2min
15
How I Got Started Hacking on Yahoo
33:02 • 2min
16
How to Write Better Reports
35:16 • 2min
17
The Importance of Having a Language Model for Your Podcast
37:18 • 2min
18
The Importance of College
39:45 • 2min
19
The Importance of a College Degree
41:25 • 2min
20
Why Comp Sigh Is Better Than a Cybersecurity Degree
43:53 • 2min
21
How to Write Well as a Hacker
45:48 • 2min
22
How to Be a Successful Copywriter
48:14 • 2min
23
The Value of Copywriting and Storytelling in the Context of a Technical Report
50:31 • 2min
24
How to Write a Critical Report
52:05 • 2min
25
How to Stop and Start Hacking
54:31 • 2min
26
How to Reinforcing JavaScript Applications
56:41 • 3min
27
How to Hack the Military
59:27 • 2min
28
Lessons Learned From Breachless AI
01:01:07 • 2min
29
How to Use Artificial Intelligence to Prevent Social Engineering Attacks
01:02:48 • 2min
30
The Barrier to Ending a Company
01:04:23 • 2min
31
Breech Lists: An Entrepreneurial Opportunity
01:06:02 • 2min
32
How to Be a Successful Hacker Entrepreneur
01:07:48 • 2min
33
How to Pivot a Boring Mattress Co
01:09:55 • 4min