

Episode 12: JHaddix on Hacker->Hacker CISO, OG Hacking Techniques, and Crazy Reports
Mar 23, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
Introduction
00:00 • 2min
OG Hacker Interview With Jason Haddox
01:34 • 3min
How Did You Get Started in the Offense Security Scene?
04:12 • 3min
Bug Crowd - What Year Was This?
07:27 • 3min
The Bug Bounty, You Know?
10:53 • 3min
What's Going Through Your Head at This Point?
13:47 • 3min
Bug Crowd
16:38 • 2min
How Did You Start Working on the Bug Hunters Methodology?
18:19 • 3min
How to Shoot Web? Yeah, That's Awesome.
21:29 • 2min
DoD Security Contracting - Butteau Bot, Inc.
23:05 • 3min
What Is a Premium Product?
26:12 • 2min
Bug Bounty
28:14 • 2min
Bug Bounty Hunting - Is There a Trade Off?
30:34 • 2min
Is Bug Bounty the End All Be All?
32:28 • 3min
Building a Security Team That Has Trust With the Engineers
35:57 • 2min
Application Security - Is There an Opportunity for a Consultancy?
37:47 • 6min
Is There a Space for Hackers?
43:43 • 3min
Cloud Leaks
46:55 • 2min
How to Hire a Full Time Bug Bounty?
48:48 • 4min
I'm Repping the Hacker One Hoodie Right Now
52:52 • 5min
Full Time Bug Bounty Hunter - What's the Value Add?
57:29 • 2min
How Much Does Your Personal Strategy Shift Away From the Recon Methodology?
59:08 • 5min
Is There a Word List for All?
01:03:44 • 1min
SVN Digger, Shubs, Asset Notes - Yeah. Yeah.
01:05:14 • 4min
Hackers - Do You Have a Checklist?
01:08:54 • 3min
Using Burp's Dynamic Scanner With Cross-Site Scripting
01:12:00 • 2min
Is Burp a Game Changer?
01:13:55 • 5min
The World Cup Hacker's Guide to Fuzz Testing
01:18:28 • 2min
Do You Have a Favorite Bug Type?
01:20:47 • 5min
Using the API Key for a Text Message Service
01:25:27 • 5min
Getting Access to Source Code Review
01:30:08 • 2min
Is There a Recursive Recursion?
01:31:58 • 5min
Gofish - Is That a Finding?
01:36:53 • 3min
Web Testing
01:39:29 • 6min
Is There Anything You Want Us to Shout Out About?
01:45:04 • 2min