Artwork

Amin Malekpour에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Amin Malekpour 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

Ep. 3 – One Request, One URL, One Bluetooth Hack: Three Takeovers That Shouldn’t Have Happened

21:30
 
공유
 

Manage episode 466504305 series 3643227
Amin Malekpour에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Amin Malekpour 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

How can attackers take over accounts, networks, and devices—without credentials?

In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough:

  • Account Takeover – A single request bypassed email verification, locking out store owners.
  • Internal Network Compromise – A hidden admin URL and hardcoded access key gave attackers full control.
  • Smart Device Hijack – A community-submitted finding reveals how Bluetooth vulnerabilities allowed remote command execution—without WiFi, passwords, or internet access.

These findings expose critical weaknesses in application security, network defense, and IoT device protection—problems that pentesters, developers, and security teams must identify before attackers do.

Chapters:

00:00 - INTRO

01:30 - FINDING #1 - How a Security Researcher Took Over an Entire Shopping Platform with Just One Request

07:25 - FINDING #2 - How a Security Researcher Hacked an Entire Internal Network with Just One URL

13:46 - FINDING #3 - How a Security Researcher Took Over a Smart Switch Using Just Bluetooth

20:47 - OUTRO

Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us [email protected]
🔗 Podcast Website → Website Link

  continue reading

챕터

1. INTRO (00:00:00)

2. FINDING #1 - How a Security Researcher Took Over an Entire Shopping Platform with Just One Request (00:01:30)

3. FINDING #2 - How a Security Researcher Hacked an Entire Internal Network with Just One URL (00:07:25)

4. FINDING #3 - How a Security Researcher Took Over a Smart Switch Using Just Bluetooth (00:13:46)

5. OUTRO (00:20:47)

14 에피소드

Artwork
icon공유
 
Manage episode 466504305 series 3643227
Amin Malekpour에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Amin Malekpour 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

How can attackers take over accounts, networks, and devices—without credentials?

In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough:

  • Account Takeover – A single request bypassed email verification, locking out store owners.
  • Internal Network Compromise – A hidden admin URL and hardcoded access key gave attackers full control.
  • Smart Device Hijack – A community-submitted finding reveals how Bluetooth vulnerabilities allowed remote command execution—without WiFi, passwords, or internet access.

These findings expose critical weaknesses in application security, network defense, and IoT device protection—problems that pentesters, developers, and security teams must identify before attackers do.

Chapters:

00:00 - INTRO

01:30 - FINDING #1 - How a Security Researcher Took Over an Entire Shopping Platform with Just One Request

07:25 - FINDING #2 - How a Security Researcher Hacked an Entire Internal Network with Just One URL

13:46 - FINDING #3 - How a Security Researcher Took Over a Smart Switch Using Just Bluetooth

20:47 - OUTRO

Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us [email protected]
🔗 Podcast Website → Website Link

  continue reading

챕터

1. INTRO (00:00:00)

2. FINDING #1 - How a Security Researcher Took Over an Entire Shopping Platform with Just One Request (00:01:30)

3. FINDING #2 - How a Security Researcher Hacked an Entire Internal Network with Just One URL (00:07:25)

4. FINDING #3 - How a Security Researcher Took Over a Smart Switch Using Just Bluetooth (00:13:46)

5. OUTRO (00:20:47)

14 에피소드

כל הפרקים

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생