• Episode 85: Practical Applications of DEFCON 32 Web Research

  • Aug 22 2024
  • Length: 1 hr and 31 mins
  • Podcast

Episode 85: Practical Applications of DEFCON 32 Web Research

  • Summary

  • Episode 85: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel talk through some of the research coming out of DEFCON, mainly from the PortSwigger team. Web timing attacks, cache exploitation, and exploits related to email protocols are all featured. Plus we also talk some fun Apache hacks from Orange Tsai

    Follow us on twitter at: @ctbbpodcast

    We're new to this podcasting thing, so feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ------ Links ------

    Find the Hackernotes: https://blog.criticalthinkingpodcast.io/

    Follow your hosts Rhynorater & Teknogeek on twitter:

    https://twitter.com/0xteknogeek

    https://twitter.com/rhynorater

    ------ Ways to Support CTBBPodcast ------

    Hop on the CTBB Discord at https://ctbb.show/discord!

    Check out our new SWAG store at https://ctbb.show/swag!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    Today’s Sponsor - ThreatLocker

    Resources

    Listen to the whispers

    https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work

    Splitting the email atom

    https://portswigger.net/research/splitting-the-email-atom

    Gotta cache 'em all

    https://portswigger.net/research/gotta-cache-em-all

    HTTP Garden

    https://github.com/narfindustries/http-garden

    Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!

    https://blog.orange.tw/2024/08/confusion-attacks-en.html#%E2%9C%94%EF%B8%8F-2-2-2-Local-Gadget-to-XSS

    Trusted API Types

    https://developer.mozilla.org/en-US/docs/Web/API/Trusted_Types_API

    Untrusted Types

    https://github.com/filedescriptor/untrusted-types

    Timestamps:

    (00:00:00) Introduction

    (00:09:45) 'Listen to the whispers'

    (00:30:03) 'Splitting the email atom'

    (00:58:42) 'Gotta cache 'em all'

    (01:21:03) 'Confusion Attacks'

    Show more Show less
activate_Holiday_promo_in_buybox_DT_T2

What listeners say about Episode 85: Practical Applications of DEFCON 32 Web Research

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.