Remove Applications Remove IBM Remove LAN Remove Load Balancer
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer. And after that, I invested almost all my waking hours into learning web application pen testing, because coming from the infrastructure side. Understand the logic between how our web application functions. So I did that.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer. And after that, I invested almost all my waking hours into learning web application pen testing, because coming from the infrastructure side. Understand the logic between how our web application functions. So I did that.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer. And after that, I invested almost all my waking hours into learning web application pen testing, because coming from the infrastructure side. Understand the logic between how our web application functions. So I did that.