Critical Thinking - Bug Bounty Podcast

Justin Gardner (Rhynorater) & Joseph Thacker (Rez0)
undefined
10 snips
Jul 24, 2025 • 1h 50min

Episode 132: Archive Testing Methodology with Mathias Karlsson

Mathias Karlsson, a seasoned bug bounty hunter and the mind behind Archive Alchemist, joins in to discuss the complexities of archive-based vulnerabilities. He dives into the significance of Unicode paths, revealing how they can lead to security flaws. The conversation highlights automation in testing methodologies and the risks associated with symbolic link and path traversal attacks. Karlsson also shares insights on file handling intricacies, showcasing techniques for enhancing security assessments that are crucial for developers and researchers alike.
undefined
Jul 17, 2025 • 51min

Episode 131: SL Cyber Writeups, Bug Bounty Metastrategy, and Orphaned Github Commits

Dive into the world of collaborative hacking as experts discuss the thrill of teamwork in uncovering software vulnerabilities. Uncover the shocking scale of data exposed by a McDonald's chatbot flaw. Explore how to exploit .NET Nuke vulnerabilities and the nuances in prompt engineering for AI interactions. Learn about making the most of GitHub scans and the implications of orphan commits. Plus, discover new tools like Raycast for Windows and enhancements in Google Docs that can elevate bug bounty hunting!
undefined
Jul 10, 2025 • 1h 8min

Episode 130: Minecraft Hacks to Google Hacking Star - Valentino

Dive into the intriguing world of hacking as Valentino shares his transition from Minecraft exploits to tackling Google vulnerabilities. Discover creative approaches like bypassing HTML sanitizers and exploiting .NET deserialization. Learn about the challenges of reverse proxy vulnerabilities and the importance of innovative thinking in uncovering security flaws. The discussion highlights personal journeys, community engagement in hacking, and advanced methodologies for identifying bugs in cutting-edge technologies like AI.
undefined
32 snips
Jul 3, 2025 • 36min

Episode 129: Is this how Bug Bounty Ends?

Dive into the future of bug bounties as human hackers collaborate with AI, revolutionizing vulnerability discovery. Explore the intricate challenges of tokenization and its implications for effective hacking mentorship. Unpack the complexities of language models and the intriguing phenomenon of AI 'hallucinations.' Discover the vital role of context engineering in ensuring accurate validations, making sense of how AI is reshaping the cybersecurity landscape. It's an engaging discussion on the evolution of hacking in the age of artificial intelligence!
undefined
Jun 26, 2025 • 58min

Episode 128: New Research in Blind SSRF and Self-XSS, and How to Architect Source-code Review AI Bots

Delve into the vulnerabilities of self-XSS and the complexities of blind SSRF attacks, unveiling the latest research on HTTP redirect techniques. Explore the innovative applications of AI in reversing minified JavaScript and improving code security. Hear about exciting new tools like Lumintus for better bug bounty documentation and the implications of URL spoofing linked to Google font ligatures. This engaging discussion combines technical insights with the evolving landscape of web security.
undefined
19 snips
Jun 19, 2025 • 1h 7min

Episode 127: Drama, PDF as JS Chaos, Bounty Profile Apps, And More

The discussion kicks off with recent controversies in the bug bounty world and the advocacy for hackers. Key highlights include innovative hacking techniques around file formats and insights into compensation for zero-click vulnerabilities. There's a deep dive into the role of AI in cybersecurity, including novel exploits like 'Echo Leak.' The hosts celebrate community achievements while introducing tools like Newtowner for cloud security. Finally, they explore advanced tactics, including monetizing social media interactions and enhancing strategies with Chrome's dev tools.
undefined
8 snips
Jun 12, 2025 • 39min

Episode 126: Hacking AI Series: Vulnus ex Machina - Part 3

Dive into the fascinating world of AI vulnerabilities, where personal experiences illuminate the challenges of hacking AI systems. Discover unique exploits like prompt injection that can manipulate AI interactions, exposing sensitive data. Hear about innovative tactics for uncovering AI flaws, including how hidden text can influence AI behavior. The conversation also emphasizes the necessity for creative approaches in identifying vulnerabilities and the importance of corporate support for AI bug bounty programs.
undefined
10 snips
Jun 5, 2025 • 47min

Episode 125: How to Win Live Hacking Events

Discover strategies for succeeding at live hacking events! Learn about vital pre-event preparations and techniques for focus during the event. The discussion goes into post-event collaboration and maintaining a positive mindset throughout the process. Plus, hear about personal experiences and the importance of engaging with the bug bounty community. Get ready to optimize your approach and connect with fellow hackers.
undefined
26 snips
May 29, 2025 • 45min

Episode 124: Bug Bounty Lifestyle = Less Hacking Time?

Join the hosts as they tackle the latest in bug bounty news, including Louis Vuitton's new program and a serious OpenPGP.js vulnerability. They share insights on balancing the flexibility of bug hunting with structured approaches for success. Discover the art of mentoring novices, advanced exploitation techniques, and the significance of automating cybersecurity efforts. Plus, hear about the transition to full-time bug bounty hunting and the joys it brings, along with reflections on personal achievements in the hacking journey.
undefined
May 22, 2025 • 44min

Episode 123: Hacking AI Series: Vulnus ex Machina - Part 2

The discussion dives into mastering prompt injection, showcasing how emotional tactics can manipulate AI models. Key AI vulnerabilities are explored, with insights into bug hunting tools and recent leaks. The comparison between Google's AI technologies highlights advanced exploitation techniques. Emphasizing meticulous testing, the hosts share strategies for recognizing and categorizing vulnerabilities. The episode wraps up with a sneak peek into future content on emerging risks within AI exploitation, encouraging listeners to engage on social media.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app