DiscoverSoftware Snack BitesA Peek Behind the Hacker Curtain - Douglas Day (Top Grossing Hacker, HackerOne & Sr Security Eng, Elastic)
A Peek Behind the Hacker Curtain - Douglas Day (Top Grossing Hacker, HackerOne & Sr Security Eng, Elastic)

A Peek Behind the Hacker Curtain - Douglas Day (Top Grossing Hacker, HackerOne & Sr Security Eng, Elastic)

Update: 2024-04-02
Share

Description

We hear about hackers all the time but very rarely get a glimpse into the world of what they actually do when exploiting applications. Douglas Day is a top grossing hacker on the HackerOne platform and a Senior Security Engineer at Elastic. In this episode, we dive into all things bug bounties and ethical hacking. How does Douglas find entry points, differences between defensive and offensive security, and escalating user permissions to find deep vulnerabilities are all covered. We also talk about common attack patterns for Douglas and other hackers and why WAFs are more annoying then useful.

Where to Find Douglas:

·       Twitter: https://twitter.com/ArchAngelDDay

·       LinkedIn: https://www.linkedin.com/in/douglas-day-39baa8108/

Where to Find Shomik:

·       Twitter: https://twitter.com/shomikghosh21

·       LinkedIn: https://www.linkedin.com/in/shomik-ghosh-a5a71319/

·       Podcast: Apple PodcastsSpotifyYouTube.

In this episode, we cover:

(00:40 ) – Douglas’ Journey into Ethical Hacking

(05:11 ) – Winning Most Value Hacker at HackerOne Event

(08:03 ) – Bug Bounties vs Pen-testing

(11:08 ) – Utilizing Hacking Exploits for Defensive Security

(12:34 ) – Proliferation of Open Source Attacking Tools

(14:44 ) – Flipping from Offensive to Defensive Security

(15:27 ) – Working with a Team of Hackers

(18:02 ) – Finding a Vulnerable Entry Point to an Application

(21:16 ) – Utilizing User Permissions to Hack an App

(25:48 ) – How Does Multi-Factor Auth Help Be More Secure

(27:45 ) – Leveraging an Entry Point into Escalations

(29:20 ) – Phishing As An Attack Vector (Red Teaming vs Bug Bounties)

(31:15 ) – A Hacker’s Spidey Sense for Common Vulnerabilities

(34:15 ) – Random Number Generators for Security

(36:07 ) – APIs as an Attack Vector

(37:32 ) – Why Exposed Secrets are a Common Entry Point

(41:20 ) – Why Web Application Firewalls are Not That Effective for Stopping Hackers

(43:30 ) – How Hackers are Using LLMs in Their Attack Workflows

(45:48 ) – Utilizing AI Agents in Hacking

(46:30 ) – Why Ethical Hackers are Assets to Security Teams

(50:30 ) – Wrap Up

How to Subscribe:

Available on Apple PodcastsSpotifyYouTube.



This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit shomik.substack.com
Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

A Peek Behind the Hacker Curtain - Douglas Day (Top Grossing Hacker, HackerOne & Sr Security Eng, Elastic)

A Peek Behind the Hacker Curtain - Douglas Day (Top Grossing Hacker, HackerOne & Sr Security Eng, Elastic)

Shomik Ghosh