Critical Thinking - Bug Bounty Podcast

Episode 158: 10hr Marathon Hack-Along Recap + $300k Client-side Bugs

Jan 22, 2026
A thrilling recap of a 10-hour charity hack-along reveals unexpected challenges and insights. The hosts dive into $55,000 vulnerabilities, including injections and dangerous iframe exploits. They share techniques like postMessage race exploitation and CRLF vulnerabilities leading to XSS. Discussions on partial authentication issues and the risks of delegated permissions add a layer of complexity. With compelling tales of bug discoveries and innovative research tools, this conversation is a treasure trove for aspiring hackers.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Pair Hacking Streams With A Prepared Co-Host

  • When live-narrating hacking sessions, pair each hacker with a co-host to bounce ideas and keep flow.
  • Prepare scope and threat models ahead so handoffs can close exploits quickly.
INSIGHT

Use Popups To Avoid JS Throttling

  • window.open can throttle background tabs and break race-condition attacks with postMessage.
  • Opening a small popup (width/height) keeps both pages active and restores fast postMessage timing.
ADVICE

Probe With Partial-Auth Tokens Immediately

  • If you can reach a partial-auth state, enumerate SPA and API endpoints using those cookies/tokens immediately.
  • Fuzz endpoints with the partial auth to find access to other tenants or parent-company resources.
Get the Snipd Podcast app to discover more snips from this episode
Get the app