Critical Thinking - Bug Bounty Podcast

Episode 16: The Hacker's Toolkit

12 snips
Apr 20, 2023
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
New Attack Vectors for AI Integrations With Web to Technology
01:45 • 2min
3
Open AI's Bug Bounty Program
03:42 • 3min
4
How to Patch a Bug in an LOM
06:48 • 2min
5
Ghost Script Bug
08:37 • 3min
6
How to Get Around the Same Site Restrictions
11:36 • 3min
7
How to Be a Better Hacker
14:19 • 2min
8
Hacker Toolkit: How to Fix a Bug
16:35 • 2min
9
Farx Buster: A Dirt Searching Tool
18:13 • 4min
10
HTTP X: The Next Big Thing for Recon
22:33 • 4min
11
How to Type Correctly
26:47 • 2min
12
How to Use a Home Server for Basic Scanning Tasks
28:17 • 2min
13
How to Use a Linux Box to Scan Your Network
29:55 • 2min
14
How to Be an Organized Hacker
31:44 • 2min
15
How to Use Zero Tier Networks to Expand Your Network
33:45 • 2min
16
How to Setup a Zero Tier VPN
35:55 • 4min
17
How to Use a Reverse Proxy for HTTP Servers
40:14 • 2min
18
The Importance of Simplicity
41:48 • 2min
19
Python 3 Dash M H2DP Server
43:59 • 5min
20
P Prettier for JS Beautification
49:16 • 3min
21
How to Select the Correct Context for JavaScript Code to Execute In
51:50 • 2min
22
How to Use JavaScript to Automate Typing
53:46 • 2min
23
How to Hack With Bash Scripts
55:55 • 3min
24
Python Command Line Tools
58:43 • 2min
25
How to Search Strings in Linux
01:00:15 • 3min
26
How to Use VIM Properly to Manipulate Input
01:03:19 • 2min
27
How to Use VIM to Improve Your Workflow
01:05:40 • 2min
28
How to Use Pseudo Sue to Edit a File
01:07:20 • 2min
29
The Importance of Understanding the Fundamentals of DNS Chef
01:09:49 • 4min
30
How to Write a DNS Reverse Shell in Python
01:13:26 • 4min