Artwork

Вміст надано Kyser Clark - Cybersecurity. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Kyser Clark - Cybersecurity або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !

#17 Unpacking Bug Bounty Strategies with RootSploit: Zero Days, Recon, and Vulnerabilities

37:18
 
Поширити
 

Manage episode 445399046 series 3583577
Вміст надано Kyser Clark - Cybersecurity. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Kyser Clark - Cybersecurity або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

Cybersecurity professionals Kyser Clark and Pranit Garud (RootSploit) discuss their experiences in the field. They cover topics such as bug bounty programs, the role of an offensive security engineer, and the differences between consulting and working for a Fortune 500 company. Pranit shares tips for getting started in bug bounty hunting and emphasizes the importance of understanding the business logic of a company. He also highlights the need for a mindset shift when transitioning from consulting to an internal security role.
Connect with Pranit on LinkedIn: https://www.linkedin.com/in/pranit-garud/
Takeaways

  • Bug bounty hunting requires a proactive and research-oriented mindset, as well as a deep understanding of the target company's technologies and business logic.
  • Working as an offensive security engineer in a Fortune 500 company offers the opportunity to see the inner workings of the organization and make a greater impact on security.
  • Transitioning from consulting to an internal security role requires a shift in focus from exploitation to securing and collaborating with developers.
  • Building a close relationship with developers and understanding their challenges can lead to more effective security measures.
  • The pace of work in a Fortune 500 company may be slower due to approval processes and the need for careful consideration of potential impacts.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention viewers/Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
The postings on this site are my own and may not represent the positions of ...

  continue reading

Розділи

1. Introductions (00:00:00)

2. Rapid Fire Questions (00:04:37)

3. Why is learning both exciting and challenging? (00:06:53)

4. CRAC Learning Community (00:09:09)

5. How to get started with Bug Bounty (00:11:43)

6. How to select a Bug Bounty Program (00:15:18)

7. How to Avoid Duplicate Findings (00:19:46)

8. What it's like being a Fortune 500 Ethical Hacker (00:25:09)

9. Final Hot Take and Wisdom (00:35:19)

18 епізодів

Artwork
iconПоширити
 
Manage episode 445399046 series 3583577
Вміст надано Kyser Clark - Cybersecurity. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Kyser Clark - Cybersecurity або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

Cybersecurity professionals Kyser Clark and Pranit Garud (RootSploit) discuss their experiences in the field. They cover topics such as bug bounty programs, the role of an offensive security engineer, and the differences between consulting and working for a Fortune 500 company. Pranit shares tips for getting started in bug bounty hunting and emphasizes the importance of understanding the business logic of a company. He also highlights the need for a mindset shift when transitioning from consulting to an internal security role.
Connect with Pranit on LinkedIn: https://www.linkedin.com/in/pranit-garud/
Takeaways

  • Bug bounty hunting requires a proactive and research-oriented mindset, as well as a deep understanding of the target company's technologies and business logic.
  • Working as an offensive security engineer in a Fortune 500 company offers the opportunity to see the inner workings of the organization and make a greater impact on security.
  • Transitioning from consulting to an internal security role requires a shift in focus from exploitation to securing and collaborating with developers.
  • Building a close relationship with developers and understanding their challenges can lead to more effective security measures.
  • The pace of work in a Fortune 500 company may be slower due to approval processes and the need for careful consideration of potential impacts.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention viewers/Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
The postings on this site are my own and may not represent the positions of ...

  continue reading

Розділи

1. Introductions (00:00:00)

2. Rapid Fire Questions (00:04:37)

3. Why is learning both exciting and challenging? (00:06:53)

4. CRAC Learning Community (00:09:09)

5. How to get started with Bug Bounty (00:11:43)

6. How to select a Bug Bounty Program (00:15:18)

7. How to Avoid Duplicate Findings (00:19:46)

8. What it's like being a Fortune 500 Ethical Hacker (00:25:09)

9. Final Hot Take and Wisdom (00:35:19)

18 епізодів

Усі епізоди

×
 
Loading …

Ласкаво просимо до Player FM!

Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.

 

Короткий довідник