Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13
Introduction
00:00 • 4min
The Gamification of Security Research
04:00 • 2min
Logic Bugs and Vulnerabilities
05:33 • 3min
How to Hunt for Logic Based Vulnerabilities
08:27 • 6min
How to Write Your Own Security Tools
14:18 • 3min
How to Hack Network Protocols
17:36 • 6min
How to Write a Quick and Dirty Tool
23:17 • 5min
The Benefits of a Different Perspective on Writing Tools
28:34 • 3min
How I Survived the Singularity of Technology
31:25 • 4min
How I Changed My Twitter Profile Picture
35:55 • 3min
The Panda Money Box
38:42 • 2min
The Importance of Having an Ashtray
41:11 • 4min
How to Be a Successful Security Researcher
45:23 • 2min