• Ep. 3 – One Request, One URL, One Bluetooth Hack: Three Takeovers That Shouldn’t Have Happened

  • Feb 13 2025
  • Duración: 22 m
  • Podcast

Ep. 3 – One Request, One URL, One Bluetooth Hack: Three Takeovers That Shouldn’t Have Happened

  • Resumen

  • How can attackers take over accounts, networks, and devices—without credentials?

    In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough:

    • Account Takeover – A single request bypassed email verification, locking out store owners.
    • Internal Network Compromise – A hidden admin URL and hardcoded access key gave attackers full control.
    • Smart Device Hijack – A community-submitted finding reveals how Bluetooth vulnerabilities allowed remote command execution—without WiFi, passwords, or internet access.

    These findings expose critical weaknesses in application security, network defense, and IoT device protection—problems that pentesters, developers, and security teams must identify before attackers do.

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    Más Menos
adbl_web_global_use_to_activate_webcro805_stickypopup

Lo que los oyentes dicen sobre Ep. 3 – One Request, One URL, One Bluetooth Hack: Three Takeovers That Shouldn’t Have Happened

Calificaciones medias de los clientes

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.