Powered by RND
PodcastsTecnologiaHacked & Secured: Pentest Exploits & Mitigations
Ouça Hacked & Secured: Pentest Exploits & Mitigations na aplicação
Ouça Hacked & Secured: Pentest Exploits & Mitigations na aplicação
(1 079)(250 081)
Guardar rádio
Despertar
Sleeptimer

Hacked & Secured: Pentest Exploits & Mitigations

Podcast Hacked & Secured: Pentest Exploits & Mitigations
Amin Malekpour
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer.Hacked & Secured: ...

Episódios Disponíveis

5 de 7
  • Ep. 6 – 403 Bypass & Request Smuggling: Tiny Tricks, Total Takeover
    A single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions. In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently.Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A 📧 Feedback? Email Us → [email protected] 🔗 Podcast Website → Website Link
    --------  
    17:14
  • Ep. 5 – Stored XSS & SQL Injection: Small Flaws, Big Breaches
    A simple filename triggered stored XSS, hijacking accounts and stealing API keys. A SQL injection bypassed a web firewall, dumping an entire database in one request.Both attacks exploited basic security flaws—flaws that should have been caught.Learn how these exploits worked, why they were missed, and what should have been done differently.Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A 📧 Feedback? Email Us → [email protected] 🔗 Podcast Website → Website Link
    --------  
    16:08
  • Ep. 4 – Exposed Secrets & Silent Takeovers: How Misconfigurations Open the Door to Attackers
    Exposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach.In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what can be done to stop them?Listen now to learn how attackers exploit these mistakes—and how you can prevent them.Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A 📧 Feedback? Email Us → [email protected] 🔗 Podcast Website → Website Link
    --------  
    21:15
  • Ep. 3 – One Request, One URL, One Bluetooth Hack: Three Takeovers That Shouldn’t Have Happened
    How can attackers take over accounts, networks, and devices—without credentials?In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough:Account Takeover – A single request bypassed email verification, locking out store owners.Internal Network Compromise – A hidden admin URL and hardcoded access key gave attackers full control.Smart Device Hijack – A community-submitted finding reveals how Bluetooth vulnerabilities allowed remote command execution—without WiFi, passwords, or internet access.These findings expose critical weaknesses in application security, network defense, and IoT device protection—problems that pentesters, developers, and security teams must identify before attackers do.Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A 📧 Feedback? Email Us → [email protected] 🔗 Podcast Website → Website Link
    --------  
    21:30
  • Ep. 2 – Chaining IDORs, CSRF Account Takeovers & Token Manipulation for Privilege Escalation
    What if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges?In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world pentest findings that prove creative exploitation turns small flaws into critical security risks:Chaining IDORs for account takeover – Exploiting weak access controls.CSRF bypass to reset security questions – Turning one click into total compromise.Privilege escalation via token manipulation – How a simple change led to admin access.Learn how these vulnerabilities were discovered, exploited, and mitigated.Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram 📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A 📧 Feedback? Email Us → [email protected] 🔗 Podcast Website → Website Link
    --------  
    19:16

Mais podcasts de Tecnologia

Sobre Hacked & Secured: Pentest Exploits & Mitigations

If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer.Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated.Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, developer, or blue teamer, you'll gain actionable insights to apply in your work.🔹 Red Team Perspective – How attackers find and exploit vulnerabilities.🔹 Blue Team Defenses – How to detect, mitigate, and prevent real-world attacks.🔹 Real Case Studies – Bug bounty reports, pentest findings, and security incidents analyzed step by step.🎧 New episodes every two weeks.🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram, Website Link📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A   📧 Feedback? Email Us → [email protected]
Sítio Web de podcast

Ouve Hacked & Secured: Pentest Exploits & Mitigations, All-In with Chamath, Jason, Sacks & Friedberg e muitos outros podcasts de todo o mundo com a aplicação radio.pt

Obtenha a aplicação gratuita radio.pt

  • Guardar rádios e podcasts favoritos
  • Transmissão via Wi-Fi ou Bluetooth
  • Carplay & Android Audo compatìvel
  • E ainda mais funções
Aplicações
Social
v7.13.0 | © 2007-2025 radio.de GmbH
Generated: 4/1/2025 - 5:09:29 AM