Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43
Introduction
00:00 • 2min
How Space Records Explored a Zero Day Bug
02:06 • 2min
How to Make a Live Hacking Event Awesome
04:23 • 2min
Hunting for Engine X Alias Traversals in the Wild
06:05 • 3min
The Off by Off by a Slash Research
08:41 • 2min
The Open Source Approach to Exploiting Vulnerabilities
10:31 • 2min
Hacker One: The Most High Paying Program
12:08 • 3min
Port Swigger Research: A New Way to Trigger XSS
14:52 • 2min
The Impact of XSS Vectors on Chrome
16:46 • 3min
How to Use Hidden Values in Web Forms
19:20 • 3min
The Magical Math Elements in Firefox
22:36 • 2min
Edge: The Next Browser for Mac and Windows
25:01 • 2min
How to Conduct Security Research
26:54 • 2min
How to Do Comments in JavaScript
29:02 • 2min
How to Patch Diffed a CBE in WooCommerce and Exploited It on a Target
31:24 • 3min
How to Exploit WordPress Core for Plugins
34:01 • 2min
How to Get Your Hands on a WordPress Plugin
35:37 • 2min
How to Find the Best WordPress Security Plugins
38:06 • 2min
The Changes in the CBS S4 Draft Spec
40:09 • 2min
CBS S4's Privilege of the Just Required Section
41:59 • 2min
Tom Nom Nom Tool
44:15 • 2min
J S Lewis: A Tool to Extract URLs From J. S Files
45:48 • 2min
How to Parse JavaScript
47:22 • 2min
ECMAScript's Import Function
49:41 • 2min
How to Use File Descriptor to Minimize JavaScript Execution
51:47 • 2min
How to Get XSS From a File
53:46 • 2min
JavaScript for Hackers: A Guide to Documenting Strange Behaviors
55:21 • 3min
How to Use an HTML Comment in JavaScript
58:06 • 2min
How to Smuggle in JavaScript Comments
59:40 • 3min
How to Inject JavaScript Into a Variable
01:02:10 • 2min
JavaScript CSP Evaluator
01:04:04 • 2min
Google's CSP Evaluator
01:05:44 • 3min
How to Scan for Prototype Pollution
01:08:40 • 2min
Prototype Pollution in JavaScript
01:10:45 • 2min
DOM Clobbering: Exploiting DOM Pollution
01:12:18 • 4min
The Edge Case of DOM Clobbering
01:16:01 • 2min
How to Use Meta and Base Tags to Exploit HTML Injection
01:17:52 • 2min
The Potential of Meta Tags in Web Browsers
01:20:13 • 2min
How to Exploit the Meta Tags in Safari
01:21:52 • 2min
How to Sniff Key Binds Using CSS
01:23:54 • 2min
CSS for Content Security
01:26:15 • 3min
The Power of Base Base Tags in HTML Injection
01:29:09 • 2min
The Base Tag in the Body Tag
01:31:03 • 2min