Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Introduction
00:00 • 2min
How to Find a Cool Bug on Outlook
02:27 • 2min
Snapchat's Bug Bounty
04:29 • 2min
Snapchat's Security Team Is Strong
06:38 • 4min
Snapchat's Bug Bounty
10:39 • 2min
The Importance of User Enumeration in Bug Bounties
12:16 • 2min
How to Chain Bugs Together
14:11 • 3min
CVSS and the Bug Bounty Reporting Process
17:23 • 2min
How to Increase Availability as a Full-Time Hacker
19:34 • 2min
How to Score a Vulnerability With CVS
21:24 • 2min
CVSS and the OWASP Rating System
23:25 • 2min
The Impact of Attack Complexity on Vulnerability Scores
25:00 • 3min
The Role of EUU IDs in Bug-Biting
28:20 • 2min
The Threat Model Isn't Built Around Projecting IDs
30:19 • 2min
CBSS: The Highs and the Lows
32:21 • 3min
CV SS 3.1: Extended Fields
35:49 • 2min
How to Use Attack Complexity to Your Advantage
37:20 • 2min
How Fisher and I Intercepted a Payment on the Local Network
39:27 • 3min
How to Hack on a Product That You Use
42:17 • 2min
Why LFI's Should Be High?
44:18 • 2min
The Importance of Webcast Deception
46:32 • 2min
WebCached Deception: A Live Hacking Event
48:50 • 4min
How to Cache a Page in an Application
52:40 • 3min
How to Avoid Web Caching Deception
55:18 • 2min
How to Test Responsibly on Prod
57:45 • 2min
Joel and I Are Excited to Be in LA for the World Cup
59:37 • 4min