
Critical Thinking - Bug Bounty Podcast
A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.
Latest episodes

Jan 9, 2025 • 2h 18min
Episode 105: Best Critical Thinking Moments from 2024
This week features Sam Curry, a renowned bug bounty hunter known for secondary context bugs, and Johan Carlson, an expert in highly CSP environments. They discuss captivating topics like Blind XSS vulnerabilities, web exploits, and debugging techniques for IoT devices. Matan Bear shares insights on client-side attacks using DevTools, while Mariah Gardner highlights the balance between bug bounty hunting and personal relationships. Together, they explore the dynamic nature of cybersecurity and the importance of continuous learning in the field.

Jan 2, 2025 • 29min
Episode 104: 2024 Hacker Stats & 2025 Goals
Reflecting on the highs and lows of 2024, the host dives into personal achievements and outlines ambitious goals for 2025. They introduce exciting community initiatives like the Bug Bounty Hunters Guild and Critical Research Lab. Insights into personal inventory reveal valuable lessons learned, emphasizing the importance of community and accountability in the bug bounty world. It's a thoughtful mix of reflection and forward-thinking that promises to inspire fellow hackers.

Dec 26, 2024 • 1h 1min
Episode 103: Getting ANSI about Unicode Normalization
Dive into the potential vulnerabilities of ANSI codes and the world of large language models as the hosts uncover innovative hacking techniques. Explore the intricacies of Unicode normalization and its impact on web security, especially concerning command injections. Delve into cookie manipulation challenges and learn about the balance between hackbots and cybersecurity. The discussion also highlights success stories within the community, showcasing the importance of collaboration and sharing knowledge in the ever-evolving tech landscape.

12 snips
Dec 19, 2024 • 1h 3min
Episode 102: Building Web Hacking Micro Agents with Jason Haddix
In this discussion, Jason Haddix, an expert in AI and offensive security, shares his insights into the innovative world of AI micro-agents in hacking. They explore how these tools can enhance web fuzzing and WAF bypass techniques. Jason emphasizes the importance of contextual knowledge and prompt engineering for optimally utilizing large language models. The dialogue also touches on ethical concerns in bug bounty programs and the significant role of automation in vulnerability assessment, shedding light on both innovations and challenges in the field.

Dec 12, 2024 • 51min
Episode 101: CTBB Hijacked: Rez0__ on AI Attack Vectors with Johann Rehberger
Johann Rehberger, a leading AI security researcher, shares his insights on AI application vulnerabilities. He discusses prompt injection and obfuscation techniques used to exploit AI systems. The conversation highlights innovative data exfiltration methods, including video generation and image rendering. They examine the reactions of major tech firms to bug bounty challenges and stress the importance of robust security measures. Rehberger also emphasizes the need for standardized guidelines to safeguard against AI vulnerabilities in an evolving landscape.

6 snips
Dec 5, 2024 • 1h 42min
Ep 100 - 8 Fav Bugs of 2024, Farewell Joel, Hello Shift - Cursor of Hacking
Join bug bounty experts Nagli, Shubs, Douglas Day, Alex Chapman, Nahamsec, and Rez0 as they share their favorite bugs of 2024. Nagli dives into a complex Azure DevOps vulnerability, while Shubs discusses pre-authentication exploits. Douglas reveals an account takeover lapse in a streaming service, and Alex describes a tricky XSS issue. Nahamsec highlights teamwork in a collaborative bug event, and Rez0 explains a server-side template injection in Shift AI. Celebrate a milestone while gaining insights into the wild world of ethical hacking!

23 snips
Nov 28, 2024 • 1h 43min
Episode 99: Back to the Basics - Web Fundamental to 100k a Year in Bug Bounty
Delve into the essentials of bug bounty hunting, where mastering web fundamentals is key. The hosts discuss critical vulnerabilities like mutation XSS and SSRF, stressing the need for a strong foundation in web security. Explore advanced methodologies in hacking and the significance of personalized solutions. Discover the importance of motivation and goal-setting on the journey to making $100k in your first year. Unique metaphors highlight the nuances of targeting companies and the evolving motivations behind bug bounty participation.

Nov 21, 2024 • 1h 44min
Episode 98: Team 82 Sharon Brizinov - The Live Hacking Polymath
Sharon Brizinov, a leading IoT/ICS security researcher at Claroty, shares his captivating journey from iOS development to cybersecurity. He dives into the contrasting worlds of Pwn2Own and HackerOne, revealing their unique exploit ecosystems. The discussion explores the challenges of SCADA protocols and hacking vulnerabilities in critical infrastructure systems. Sharon also touches on the intricacies of IoT firmware and the importance of security in device communication, all while emphasizing the creativity essential for mastering the bug bounty landscape.

Nov 14, 2024 • 53min
Episode 97: Bcrypt Hash Input Truncation & Mobile Device Threat Modeling
Dive into the world of cybersecurity as experts dissect recent vulnerabilities in bcrypt, revealing insights into multi-factor authentication risks. Explore the layered security challenges in mobile environments and learn about clever techniques for concealing payloads in URLs. The introduction of the Lightyear tool for PHP exploits highlights the importance of evolving security measures, while discussions on advanced XSS exploitation techniques underscore the need for robust web application defenses. It's a treasure trove of information for security enthusiasts!

Nov 7, 2024 • 49min
Episode 96: Cookies & Caching with MatanBer
Explore advanced cookie parsing techniques and the unique quirks of Safari's cookie handling. Dive into the complexities of cookie exploitation and how cookie order impacts security. Discover insights on Capture the Flag challenges, particularly around caching vulnerabilities. Learn about the risks of cache poisoning and the implications of XSS vulnerabilities, emphasizing the importance of effective cookie management. Uncover practical strategies for manipulating cookies and safeguarding web applications against these threats.