Critical Thinking - Bug Bounty Podcast cover image

Critical Thinking - Bug Bounty Podcast

Latest episodes

undefined
Jan 9, 2025 • 2h 18min

Episode 105: Best Critical Thinking Moments from 2024

This week features Sam Curry, a renowned bug bounty hunter known for secondary context bugs, and Johan Carlson, an expert in highly CSP environments. They discuss captivating topics like Blind XSS vulnerabilities, web exploits, and debugging techniques for IoT devices. Matan Bear shares insights on client-side attacks using DevTools, while Mariah Gardner highlights the balance between bug bounty hunting and personal relationships. Together, they explore the dynamic nature of cybersecurity and the importance of continuous learning in the field.
undefined
Jan 2, 2025 • 29min

Episode 104: 2024 Hacker Stats & 2025 Goals

Reflecting on the highs and lows of 2024, the host dives into personal achievements and outlines ambitious goals for 2025. They introduce exciting community initiatives like the Bug Bounty Hunters Guild and Critical Research Lab. Insights into personal inventory reveal valuable lessons learned, emphasizing the importance of community and accountability in the bug bounty world. It's a thoughtful mix of reflection and forward-thinking that promises to inspire fellow hackers.
undefined
Dec 26, 2024 • 1h 1min

Episode 103: Getting ANSI about Unicode Normalization

Dive into the potential vulnerabilities of ANSI codes and the world of large language models as the hosts uncover innovative hacking techniques. Explore the intricacies of Unicode normalization and its impact on web security, especially concerning command injections. Delve into cookie manipulation challenges and learn about the balance between hackbots and cybersecurity. The discussion also highlights success stories within the community, showcasing the importance of collaboration and sharing knowledge in the ever-evolving tech landscape.
undefined
12 snips
Dec 19, 2024 • 1h 3min

Episode 102: Building Web Hacking Micro Agents with Jason Haddix

In this discussion, Jason Haddix, an expert in AI and offensive security, shares his insights into the innovative world of AI micro-agents in hacking. They explore how these tools can enhance web fuzzing and WAF bypass techniques. Jason emphasizes the importance of contextual knowledge and prompt engineering for optimally utilizing large language models. The dialogue also touches on ethical concerns in bug bounty programs and the significant role of automation in vulnerability assessment, shedding light on both innovations and challenges in the field.
undefined
Dec 12, 2024 • 51min

Episode 101: CTBB Hijacked: Rez0__ on AI Attack Vectors with Johann Rehberger

Johann Rehberger, a leading AI security researcher, shares his insights on AI application vulnerabilities. He discusses prompt injection and obfuscation techniques used to exploit AI systems. The conversation highlights innovative data exfiltration methods, including video generation and image rendering. They examine the reactions of major tech firms to bug bounty challenges and stress the importance of robust security measures. Rehberger also emphasizes the need for standardized guidelines to safeguard against AI vulnerabilities in an evolving landscape.
undefined
6 snips
Dec 5, 2024 • 1h 42min

Ep 100 - 8 Fav Bugs of 2024, Farewell Joel, Hello Shift - Cursor of Hacking

Join bug bounty experts Nagli, Shubs, Douglas Day, Alex Chapman, Nahamsec, and Rez0 as they share their favorite bugs of 2024. Nagli dives into a complex Azure DevOps vulnerability, while Shubs discusses pre-authentication exploits. Douglas reveals an account takeover lapse in a streaming service, and Alex describes a tricky XSS issue. Nahamsec highlights teamwork in a collaborative bug event, and Rez0 explains a server-side template injection in Shift AI. Celebrate a milestone while gaining insights into the wild world of ethical hacking!
undefined
23 snips
Nov 28, 2024 • 1h 43min

Episode 99: Back to the Basics - Web Fundamental to 100k a Year in Bug Bounty

Delve into the essentials of bug bounty hunting, where mastering web fundamentals is key. The hosts discuss critical vulnerabilities like mutation XSS and SSRF, stressing the need for a strong foundation in web security. Explore advanced methodologies in hacking and the significance of personalized solutions. Discover the importance of motivation and goal-setting on the journey to making $100k in your first year. Unique metaphors highlight the nuances of targeting companies and the evolving motivations behind bug bounty participation.
undefined
Nov 21, 2024 • 1h 44min

Episode 98: Team 82 Sharon Brizinov - The Live Hacking Polymath

Sharon Brizinov, a leading IoT/ICS security researcher at Claroty, shares his captivating journey from iOS development to cybersecurity. He dives into the contrasting worlds of Pwn2Own and HackerOne, revealing their unique exploit ecosystems. The discussion explores the challenges of SCADA protocols and hacking vulnerabilities in critical infrastructure systems. Sharon also touches on the intricacies of IoT firmware and the importance of security in device communication, all while emphasizing the creativity essential for mastering the bug bounty landscape.
undefined
Nov 14, 2024 • 53min

Episode 97: Bcrypt Hash Input Truncation & Mobile Device Threat Modeling

Dive into the world of cybersecurity as experts dissect recent vulnerabilities in bcrypt, revealing insights into multi-factor authentication risks. Explore the layered security challenges in mobile environments and learn about clever techniques for concealing payloads in URLs. The introduction of the Lightyear tool for PHP exploits highlights the importance of evolving security measures, while discussions on advanced XSS exploitation techniques underscore the need for robust web application defenses. It's a treasure trove of information for security enthusiasts!
undefined
Nov 7, 2024 • 49min

Episode 96: Cookies & Caching with MatanBer

Explore advanced cookie parsing techniques and the unique quirks of Safari's cookie handling. Dive into the complexities of cookie exploitation and how cookie order impacts security. Discover insights on Capture the Flag challenges, particularly around caching vulnerabilities. Learn about the risks of cache poisoning and the implications of XSS vulnerabilities, emphasizing the importance of effective cookie management. Uncover practical strategies for manipulating cookies and safeguarding web applications against these threats.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app