Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Introduction
00:00 • 2min
How to Avoid a Fake Coved Testing Center
01:46 • 2min
Welcome to the Show, Merit Tokla
04:05 • 1min
What Is a P T?
05:32 • 2min
How to Store Dates in a 32 Bit Int
07:10 • 2min
The Microsoft Vulnerability Scan Engine for Emales
08:50 • 2min
The Eunuch System Aps Still Use 32 Bit Time Stamps
10:31 • 2min
Java Script Engine Is Always Written in Seplespus
12:07 • 2min
Aste Memory's Safe Language
14:03 • 2min
How Did You Get Into Hacking?
16:22 • 3min
How Did You Meet Christian?
19:04 • 2min
Using Binary Exploitation in Ron 60 Fourso
21:15 • 4min
A Heap Overflow?
25:21 • 3min
Code Analyzers Detect Bugs and Security Issues
28:05 • 2min
How Does a Pseudo Hack Work?
30:05 • 3min
I've Written Almost Exact the Same Bug.
33:34 • 4min
How to Catch Bugs With Lid Ffuzzer
37:21 • 2min
Do You Know How to Find Known Vulnerabilities?
39:05 • 2min
Pentesting
40:47 • 3min
F Sharp - A Managed Language on the Dotnet?
43:37 • 3min
Is It a Real Challenge, or a Hacker's Challenge?
46:51 • 2min
Hack the Box
49:13 • 2min
Capture of the Flag - Is There Any Overlap in the CTF World?
51:02 • 2min
You Find Bugs in the Lenox Kernel?
53:00 • 3min
How the Police Did Take This Bug Into Account
55:40 • 2min
The Governor of Missouri Is Taking It Personally
57:56 • 3min