Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Introduction
00:00 • 2min
New Attack Vectors for AI Integrations With Web to Technology
01:45 • 2min
Open AI's Bug Bounty Program
03:42 • 3min
How to Patch a Bug in an LOM
06:48 • 2min
Ghost Script Bug
08:37 • 3min
How to Get Around the Same Site Restrictions
11:36 • 3min
How to Be a Better Hacker
14:19 • 2min
Hacker Toolkit: How to Fix a Bug
16:35 • 2min
Farx Buster: A Dirt Searching Tool
18:13 • 4min
HTTP X: The Next Big Thing for Recon
22:33 • 4min
How to Type Correctly
26:47 • 2min
How to Use a Home Server for Basic Scanning Tasks
28:17 • 2min
How to Use a Linux Box to Scan Your Network
29:55 • 2min
How to Be an Organized Hacker
31:44 • 2min
How to Use Zero Tier Networks to Expand Your Network
33:45 • 2min
How to Setup a Zero Tier VPN
35:55 • 4min
How to Use a Reverse Proxy for HTTP Servers
40:14 • 2min
The Importance of Simplicity
41:48 • 2min
Python 3 Dash M H2DP Server
43:59 • 5min
P Prettier for JS Beautification
49:16 • 3min
How to Select the Correct Context for JavaScript Code to Execute In
51:50 • 2min
How to Use JavaScript to Automate Typing
53:46 • 2min
How to Hack With Bash Scripts
55:55 • 3min
Python Command Line Tools
58:43 • 2min
How to Search Strings in Linux
01:00:15 • 3min
How to Use VIM Properly to Manipulate Input
01:03:19 • 2min
How to Use VIM to Improve Your Workflow
01:05:40 • 2min
How to Use Pseudo Sue to Edit a File
01:07:20 • 2min
The Importance of Understanding the Fundamentals of DNS Chef
01:09:49 • 4min
How to Write a DNS Reverse Shell in Python
01:13:26 • 4min