Critical Thinking - Bug Bounty Podcast cover image

Critical Thinking - Bug Bounty Podcast

Episode 61: A Hacker on Wall Street - JR0ch17

Mar 7, 2024
Guest Jasmin Landry shares stories about startup security, bug bounties, discovering OAuth-related bugs, and differences between structured learning and self-teaching. They walk through arbitrary ATO's, SSTI to RCE bugs, and emphasize the challenges and surprises in bug hunting.
01:27:00

Episode guests

Podcast summary created with Snipd AI

Quick takeaways

  • Exploring OAuth vulnerabilities through callback manipulation can lead to obtaining user tokens without authorization tokens.
  • Deepening understanding of OAuth intricacies and attack vectors enhances bug-hunting success.

Deep dives

Exploring OAuth Weaknesses

Through experience and research, I gained an appreciation for OAuth vulnerabilities, particularly related to authentication token handling. By exploiting callback manipulation vulnerabilities in OAuth flows, I could control redirect flows to obtain user tokens. Utilizing techniques like open redirects, subdomain takeovers, and other basic OAuth vulnerabilities, I was able to extract OAuth tokens without requiring authorization or refresh tokens.

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner