52 min

A Peek Behind the Hacker Curtain - Douglas Day (Top Grossing Hacker, HackerOne & Sr Security Eng, Elastic‪)‬ Software Snack Bites

    • Entrepreneurship

We hear about hackers all the time but very rarely get a glimpse into the world of what they actually do when exploiting applications. Douglas Day is a top grossing hacker on the HackerOne platform and a Senior Security Engineer at Elastic. In this episode, we dive into all things bug bounties and ethical hacking. How does Douglas find entry points, differences between defensive and offensive security, and escalating user permissions to find deep vulnerabilities are all covered. We also talk about common attack patterns for Douglas and other hackers and why WAFs are more annoying then useful.
Where to Find Douglas:
·       Twitter: https://twitter.com/ArchAngelDDay
·       LinkedIn: https://www.linkedin.com/in/douglas-day-39baa8108/
Where to Find Shomik:
·       Twitter: https://twitter.com/shomikghosh21
·       LinkedIn: https://www.linkedin.com/in/shomik-ghosh-a5a71319/
·       Podcast: Apple Podcasts, Spotify, YouTube.
In this episode, we cover:
(00:40) – Douglas’ Journey into Ethical Hacking
(05:11) – Winning Most Value Hacker at HackerOne Event
(08:03) – Bug Bounties vs Pen-testing
(11:08) – Utilizing Hacking Exploits for Defensive Security
(12:34) – Proliferation of Open Source Attacking Tools
(14:44) – Flipping from Offensive to Defensive Security
(15:27) – Working with a Team of Hackers
(18:02) – Finding a Vulnerable Entry Point to an Application
(21:16) – Utilizing User Permissions to Hack an App
(25:48) – How Does Multi-Factor Auth Help Be More Secure
(27:45) – Leveraging an Entry Point into Escalations
(29:20) – Phishing As An Attack Vector (Red Teaming vs Bug Bounties)
(31:15) – A Hacker’s Spidey Sense for Common Vulnerabilities
(34:15) – Random Number Generators for Security
(36:07) – APIs as an Attack Vector
(37:32) – Why Exposed Secrets are a Common Entry Point
(41:20) – Why Web Application Firewalls are Not That Effective for Stopping Hackers
(43:30) – How Hackers are Using LLMs in Their Attack Workflows
(45:48) – Utilizing AI Agents in Hacking
(46:30) – Why Ethical Hackers are Assets to Security Teams
(50:30) – Wrap Up
How to Subscribe:
Available on Apple Podcasts, Spotify, YouTube.


This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit shomik.substack.com

We hear about hackers all the time but very rarely get a glimpse into the world of what they actually do when exploiting applications. Douglas Day is a top grossing hacker on the HackerOne platform and a Senior Security Engineer at Elastic. In this episode, we dive into all things bug bounties and ethical hacking. How does Douglas find entry points, differences between defensive and offensive security, and escalating user permissions to find deep vulnerabilities are all covered. We also talk about common attack patterns for Douglas and other hackers and why WAFs are more annoying then useful.
Where to Find Douglas:
·       Twitter: https://twitter.com/ArchAngelDDay
·       LinkedIn: https://www.linkedin.com/in/douglas-day-39baa8108/
Where to Find Shomik:
·       Twitter: https://twitter.com/shomikghosh21
·       LinkedIn: https://www.linkedin.com/in/shomik-ghosh-a5a71319/
·       Podcast: Apple Podcasts, Spotify, YouTube.
In this episode, we cover:
(00:40) – Douglas’ Journey into Ethical Hacking
(05:11) – Winning Most Value Hacker at HackerOne Event
(08:03) – Bug Bounties vs Pen-testing
(11:08) – Utilizing Hacking Exploits for Defensive Security
(12:34) – Proliferation of Open Source Attacking Tools
(14:44) – Flipping from Offensive to Defensive Security
(15:27) – Working with a Team of Hackers
(18:02) – Finding a Vulnerable Entry Point to an Application
(21:16) – Utilizing User Permissions to Hack an App
(25:48) – How Does Multi-Factor Auth Help Be More Secure
(27:45) – Leveraging an Entry Point into Escalations
(29:20) – Phishing As An Attack Vector (Red Teaming vs Bug Bounties)
(31:15) – A Hacker’s Spidey Sense for Common Vulnerabilities
(34:15) – Random Number Generators for Security
(36:07) – APIs as an Attack Vector
(37:32) – Why Exposed Secrets are a Common Entry Point
(41:20) – Why Web Application Firewalls are Not That Effective for Stopping Hackers
(43:30) – How Hackers are Using LLMs in Their Attack Workflows
(45:48) – Utilizing AI Agents in Hacking
(46:30) – Why Ethical Hackers are Assets to Security Teams
(50:30) – Wrap Up
How to Subscribe:
Available on Apple Podcasts, Spotify, YouTube.


This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit shomik.substack.com

52 min