
Critical Thinking - Bug Bounty Podcast Episode 21: Chill Chat with Legendary DoD Hacker Corben Leo
Jun 1, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
Introduction
00:00 • 5min
Corbin's 100 Rules for Bug Bounty
05:13 • 2min
How to Hack a Big App
06:51 • 2min
How to Find a Good Program for Lows and Mediums
08:48 • 2min
How to Find a Bug That's Out of Scope
11:02 • 2min
Hacking Out of Scope
13:05 • 2min
The Importance of AC Access Control High to Report Back
15:22 • 2min
The Importance of Communication in Cyber Security
17:25 • 3min
The Future of Bug Bounty
20:03 • 2min
The Origin Story of a Bug Bounty Hunter
22:09 • 3min
How to Hack for Fun
25:00 • 2min
Naffy's Hacking Methodology
27:03 • 2min
How to Identify a Load Balancer With Kubernetes
28:51 • 2min
How to Map Domains to IP Addresses in Reach Con Architectures
30:46 • 2min
How I Got Started Hacking on Yahoo
33:02 • 2min
How to Write Better Reports
35:16 • 2min
The Importance of Having a Language Model for Your Podcast
37:18 • 2min
The Importance of College
39:45 • 2min
The Importance of a College Degree
41:25 • 2min
Why Comp Sigh Is Better Than a Cybersecurity Degree
43:53 • 2min
How to Write Well as a Hacker
45:48 • 2min
How to Be a Successful Copywriter
48:14 • 2min
The Value of Copywriting and Storytelling in the Context of a Technical Report
50:31 • 2min
How to Write a Critical Report
52:05 • 2min
How to Stop and Start Hacking
54:31 • 2min
How to Reinforcing JavaScript Applications
56:41 • 3min
How to Hack the Military
59:27 • 2min
Lessons Learned From Breachless AI
01:01:07 • 2min
How to Use Artificial Intelligence to Prevent Social Engineering Attacks
01:02:48 • 2min
The Barrier to Ending a Company
01:04:23 • 2min
Breech Lists: An Entrepreneurial Opportunity
01:06:02 • 2min
How to Be a Successful Hacker Entrepreneur
01:07:48 • 2min
How to Pivot a Boring Mattress Co
01:09:55 • 4min
