
Critical Thinking - Bug Bounty Podcast
Episode 61: A Hacker on Wall Street - JR0ch17
Mar 7, 2024
Guest Jasmin Landry shares stories about startup security, bug bounties, discovering OAuth-related bugs, and differences between structured learning and self-teaching. They walk through arbitrary ATO's, SSTI to RCE bugs, and emphasize the challenges and surprises in bug hunting.
01:27:00
Episode guests
AI Summary
AI Chapters
Episode notes
Podcast summary created with Snipd AI
Quick takeaways
- Exploring OAuth vulnerabilities through callback manipulation can lead to obtaining user tokens without authorization tokens.
- Deepening understanding of OAuth intricacies and attack vectors enhances bug-hunting success.
Deep dives
Exploring OAuth Weaknesses
Through experience and research, I gained an appreciation for OAuth vulnerabilities, particularly related to authentication token handling. By exploiting callback manipulation vulnerabilities in OAuth flows, I could control redirect flows to obtain user tokens. Utilizing techniques like open redirects, subdomain takeovers, and other basic OAuth vulnerabilities, I was able to extract OAuth tokens without requiring authorization or refresh tokens.
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.