Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
Introduction
00:00 • 4min
How to Fix a Bug in Home Assistant
03:55 • 3min
Mabassically Source Code Analysis
06:35 • 2min
How to Overflow a Configuration File
08:23 • 2min
The Transition to Config File Injection
10:09 • 3min
How to Get the Most Out of Bug-Bound
12:50 • 3min
Curse and Dara on Cookie Bugs
16:00 • 2min
How to Find Crazy Bugs
18:19 • 2min
How to Find Weird Behaviors in a Bug
20:10 • 2min
How to Bypass PHP's RFCs
21:41 • 2min
The Sweet Spot of Hacking
23:42 • 2min
Chrome's New Features for Hackers
25:13 • 3min
How to Do Source Code Review in a Bug Bounty Context
27:59 • 2min
The Benefits of Using vs Code
30:09 • 4min
How to Use vs Code to Improve Your Productivity
34:12 • 3min
How to Use vs Code to Control Your Application
36:55 • 3min
How to Do Highlight in VS Code
39:58 • 3min
How to Get Access to Source Code as a Bug Bounty Hunter
42:35 • 3min
The Ethics of Security Research
45:11 • 2min
The Importance of Setting Your Own Boundaries
47:07 • 2min
How to Read Source Code in Python
48:49 • 3min
How to Decompile Python Code
51:33 • 2min
The Importance of Pulling Source Code
53:35 • 2min
How to Find Docker Containers for Rapid Deployment
55:17 • 2min
How to Audit Public Source Code Packages and Libraries
57:22 • 2min
How to Integrate Sources and Sinks Into a Report
59:05 • 4min
Working Within Constraints to Find Epic Bugs
01:03:26 • 4min