• Hacked & Secured: Pentest Exploits & Mitigations

  • De: Amin Malekpour
  • Podcast

Hacked & Secured: Pentest Exploits & Mitigations

De: Amin Malekpour
  • Resumen

  • If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer.

    Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated.

    Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, developer, or blue teamer, you'll gain actionable insights to apply in your work.


    🎧 New episodes every month.


    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram, Website Link


    📩 Submit Your Pentest Findings https://forms.gle/7pPwjdaWnGYpQcA6A

    📧 Feedback? Email Us podcast@quailu.com.au

    © 2025 Hacked & Secured: Pentest Exploits & Mitigations
    Más Menos
Episodios
  • Ep. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go Critical
    Apr 24 2025

    A broken logout flow let attackers hijack accounts using just a user ID.
    A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution.

    This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences.

    Chapters:

    00:00 - INTRO

    01:22 - FINDING #1 - The Logout That Logged You In

    07:12 - FINDING #2 - From Signature Field to Shell Access

    14:40 - OUTRO

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    Más Menos
    16 m
  • Ep. 7 – IDOR & SSTI: From File Theft to Server-Side Secrets
    Apr 10 2025

    A predictable ID exposed private documents. A crafted name leaked backend files.
    In this episode, we break down two high-impact flaws—an IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and how to stop them.

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    Más Menos
    20 m
  • Ep. 6 – 403 Bypass & Request Smuggling: Tiny Tricks, Total Takeover
    Mar 27 2025

    A single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions.
    In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently.

    Chapters:
    00:00 - INTRO
    01:18 - FINDING #1 – The 403 Bypass That Led to Full Admin Control
    08:17 - FINDING #2 – Smuggling Requests, Hijacking Responses
    16:35 - OUTRO

    Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!

    🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
    📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
    📧 Feedback? Email Us podcast@quailu.com.au
    🔗 Podcast Website → Website Link

    Más Menos
    17 m
adbl_web_global_use_to_activate_webcro805_stickypopup

Lo que los oyentes dicen sobre Hacked & Secured: Pentest Exploits & Mitigations

Calificaciones medias de los clientes

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.