Critical Thinking - Bug Bounty Podcast

Justin Gardner (Rhynorater) & Joseph Thacker (Rez0)
undefined
15 snips
Apr 17, 2025 • 34min

Episode 119: Abusing Iframes from a client-side hacker

Dive into the intriguing world of iframes and discover their hidden significance in web security. Learn about the vulnerabilities they pose and how attackers can exploit them through tactics like clickjacking. The discussion highlights essential attributes of iframes, along with fun facts that might surprise even seasoned security researchers. Join the conversation and uncover strategies for identifying and mitigating these risks in the ever-evolving landscape of cybersecurity.
undefined
8 snips
Apr 10, 2025 • 58min

Episode 118: Hacking Happy Hour: 0days on Tap and SQLi Shots

Dive into the world of cybersecurity as the hosts explore high-risk vulnerabilities in IT management software and highlight the importance of robust source code reviews. Discover the dangers of SQL injection in .NET applications, share in the excitement over a hacker reaching $1 million in bug bounties, and unravel a significant Next.js authentication bypass. The conversation extends to the complexities of AI vulnerabilities and the evolving landscape of MCP security, showcasing tech innovations and community camaraderie in the bug bounty realm.
undefined
18 snips
Apr 3, 2025 • 32min

Episode 117: Hacking AI Series: Vulnus ex Machina - Part 1

Dive into the world of AI hacking with insights on reconnaissance techniques and feature exploitation. Explore the latest AI advancements like Gemini 2.5 Pro and uncover security vulnerabilities posed by automated coding. Learn about trust issues in large language models and how they impact vulnerability detection. Discover methodologies for hacking AI chatbots and strategies for identifying potential weaknesses in AI features during bug bounty hunts.
undefined
7 snips
Mar 27, 2025 • 27min

Episode 116: Auth Bypasses and Google VRP Writeups

Explore the intricate world of cybersecurity, focusing on the latest findings in SAML attacks and a notable GitLab vulnerability. Delve into Google Forms and Sheets exploits that reveal sensitive information, and uncover OAuth misconfigurations that can leak tokens. Highlighting community engagement, the discussion encourages collaboration among bug bounty hunters while examining authentication bypass vulnerabilities and middleware exploits. A humor-infused journey through the challenges and innovations in digital security awaits!
undefined
Mar 20, 2025 • 1h 41min

Episode 115: Mentee to Career Hacker - Mokusou (So Sakaguchi)

So Sakaguchi, a full-time bug bounty hunter known for his expertise in client-side vulnerabilities, joins the conversation. The highlights include sharing insights on a recent cross-site scripting bug discovered in a Facebook project and a deeper dive into security issues found in Google products. They emphasize the transformative journey from traditional employment to the rewarding world of bug bounties, showcasing the impact of mentorship. Plus, enjoy a surprise bonus segment in Japanese that adds a unique twist!
undefined
13 snips
Mar 13, 2025 • 1h 22min

Episode 114: Single Page Application Hacking Playbook

Dive into the world of hacking Single Page Applications (SPAs) as the hosts unravel techniques and tools like Shadow Repeater. Explore security vulnerabilities, including cross-site scripting and JWT exploitation, while uncovering the importance of understanding API endpoints. Discover how the integration of AI can enhance testing processes and learn about recent cybersecurity news, such as the launch of Hackadvisor, a platform for bug bounty ratings. Tune in for insights that merge fitness with cybersecurity in a unique twist!
undefined
Mar 6, 2025 • 1h 29min

Episode 113: Best Technical Takeaways from Portswigger Top 10 2024

Explore the fascinating world of web vulnerabilities as the hosts dive into the Portswigger Top 10 for 2024! Learn about OAuth hijacking and cookie tossing exploits that compromise security. They also unravel the vulnerabilities in PDF.js and the significant role of AI in application security. Discover the latest trends in bug hunting, including SQL injection, confusion attacks, and innovative techniques like the 'worst fit' algorithm for vulnerability discovery. The mix of personal stories and technical insights keeps the discussion engaging!
undefined
4 snips
Feb 27, 2025 • 1h 8min

Episode 112: Interview with Ciarán Cotter (MonkeHack) - Critical Lab Researcher and Full-time Hunter

Ciarán Cotter, known as MonkeHack, is a dedicated bug bounty hunter and Critical Lab Researcher. He shares his insights on navigating complex vulnerabilities, particularly in WebSockets and Angular applications, revealing advanced exploitation techniques. The conversation touches on the rise of AI-related threats like prompt injection and the use of AI tools to enhance hacking strategies. Ciarán also emphasizes the importance of community collaboration in cybersecurity, making it a captivating dive into the ever-evolving world of ethical hacking.
undefined
Feb 20, 2025 • 1h 49min

Episode 111: How to Bypass DOMPurify in Bug Bounty with Kevin Mizu

Kevin Mizu, a security researcher at Bisecure specializing in web app security, discusses the critical vulnerabilities associated with DOMPurify. He explores dangerous allow-lists, improper sanitization techniques, and the significance of managing configurations. Mizu shares insights into his own bug bounty experiences, including the exploitation of misconfigured regex patterns and the nuances of Unicode normalization. The conversations emphasize creative thinking in cybersecurity and the intricate methods used to bypass HTML sanitization, underscoring the complexities in maintaining web application security.
undefined
29 snips
Feb 13, 2025 • 50min

Episode 110: Oauth Gadget Correlation and Common Attacks

This discussion dives into the intriguing world of OAuth vulnerabilities and the tactics hackers employ to exploit them. It highlights a critical bypass in DOMPurify, explores AI's role in vulnerability testing, and underscores the importance of secure API key management. The speakers examine OAuth flows and common attack vectors, sharing insights on enhancing security practices. Additionally, they reveal shocking vulnerabilities in Azure AD, demonstrating the risks of inadequate token validation. It's an engaging mix of technical insights and community-driven education.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app