{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/64ac54ede55ebb0011cb41b1/681d1fc75acb8b715f37b808?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"Hacking at the Weeds with Felix Boulet ","description":"<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href=\"https://www.linkedin.com/in/nicfill/\" rel=\"noopener noreferrer\" target=\"_blank\">Nic Fillingham</a>&nbsp;and&nbsp;<a href=\"https://www.linkedin.com/in/wendyzenone/\" rel=\"noopener noreferrer\" target=\"_blank\">Wendy Zenone</a>&nbsp;are joined by&nbsp;<a href=\"https://www.linkedin.com/in/felix-boulet/?originalSubdomain=ca\" rel=\"noopener noreferrer\" target=\"_blank\">Felix Boulet</a>&nbsp;fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to becoming a full-time vulnerability researcher, and how that background fuels his passion for hacking and bug bounty work. He explains his method for finding bugs in Microsoft products—particularly in identity systems—and why identity is such a valuable target for attackers. Felix also shares highlights from the Zero Day Quest event, where he focused on building connections, learning from Microsoft engineers, and experiencing the collaborative side of the security community.</p><p>&nbsp;&nbsp;</p><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:</p><p>&nbsp;</p><ul><li>Why identity-based bugs are especially valuable and dangerous in the security world</li><li>When breaking identity controls can be the key to pivoting through an entire system</li><li>How SharePoint's concept of \"virtual files\" impacts vulnerability validation</li></ul><p>&nbsp;</p><p><strong>Some Questions We&nbsp;Ask:</strong></p><p>&nbsp;</p><ul><li>What was your first bug bounty experience?</li><li>Can you explain what the flash challenges were and what your experience was like?</li><li>Do you think sharing bug ideas could cost you a bounty?</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong></p><p><a href=\"https://www.linkedin.com/in/felix-boulet/?originalSubdomain=ca\" rel=\"noopener noreferrer\" target=\"_blank\">View Felix Boulet on LinkedIn</a></p><p><a href=\"https://www.linkedin.com/in/wendyzenone/\" rel=\"noopener noreferrer\" target=\"_blank\">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href=\"https://www.linkedin.com/in/nicfill/\" rel=\"noopener noreferrer\" target=\"_blank\">View Nic Fillingham on LinkedIn</a></p><p>&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong></p><p>&nbsp;&nbsp;</p><ul><li><a href=\"https://msthreatintelpodcast.com/\" rel=\"noopener noreferrer\" target=\"_blank\">Microsoft Threat Intelligence Podcast</a>&nbsp;</li><li><a href=\"https://afternooncybertea.com/\" rel=\"noopener noreferrer\" target=\"_blank\">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;</li><li><a href=\"https://uncoveringhiddenrisks.com/\" rel=\"noopener noreferrer\" target=\"_blank\">Uncovering Hidden Risks</a>&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href=\"https://news.microsoft.com/podcasts/\" rel=\"noopener noreferrer\" target=\"_blank\">&nbsp;microsoft.com/podcasts</a></p>","author_name":"Microsoft"}