What if an GPC project OAUTH access token wasn’t deleted? This could expose databases to bad actors. Tal Skverer from Astrix discusses his DEF CON 31 presentation GhostToken: Exploiting Google Cloud Platform App Infrastructure to Create Unremovable Trojan Apps. Transcript here.
EP 25: Hacking Communities
EP 24: Hacking Biology
EP 23: Hacking APIs
EP 22: Hacking Social Media
EP 21: Hacking Ransomware
EP 20: MITRE ATT&CK Evaluations
EP 19: Hacking IoT
EP 18: Hacking Diversity
EP 17: Shellshock
EP 16: The Gentle Art of Lockpicking
EP 15: So You Want To Be A Pentester
EP 14: The Right To Repair
EP 13: Shall We Play A Game?
EP 12: Hacking Healthcare
EP 11: Hacking OpenWRT
EP 10: Hunting The Next Heartbleed
EP 09: Bug Bounty Hunters
EP 08: Hacking Voting Systems
EP 07: Hacking the Chrome Sandbox
EP 06: Hacking With Light And Sound
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
A Prairie Home Companion: News from Lake Wobegon