
Critical Thinking - Bug Bounty Podcast
A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.
Latest episodes

Oct 31, 2024 • 1h 56min
Episode 95: Attacking Chrome Extensions with MatanBer - Big Impact on the Client-Side
In this enlightening discussion, MatanBer, an expert in browser extension security, shares his insights on the intricate architecture of Chrome extensions. They dive into threat models, focusing on content scripts and service workers, highlighting vulnerabilities in isolated environments. Key topics include the nuances of message passing and the security risks posed by poorly secured implementations. MatanBer also unpacks clickjacking and phishing scenarios, stressing the critical need for robust security measures to prevent exploitation.

Oct 24, 2024 • 49min
Episode 94: Zendesk Fiasco & the CTBB Naughty List
Dive into the chaos of the Zendesk incident and its ethical implications. Discover innovative AI tools reshaping cybersecurity practices and their real-world applications. The hosts also discuss the significance of vulnerability reporting and the complexities it involves. With a focus on transparency and communication in the bug bounty community, they ponder the idea of a 'naughty list' for companies mishandling disclosures. Plus, enjoy some light-hearted moments celebrating creativity within hacker culture!

Oct 17, 2024 • 1h 41min
Episode 93: A Chat with Dr. Bouman - Life as a Hacker and a Doctor
Dr. Jonathan Bouman, a unique blend of medical doctor and hacker, shares his fascinating journey of balancing healthcare and bug bounty hunting. He discusses the ethical responsibilities that tie both fields together and reflects on the challenges faced when protecting sensitive healthcare data. The conversation highlights experiences with Amazon's bug bounty program and explores the importance of collaboration in the hacking community. Additionally, Dr. Bouman emphasizes maintaining well-being for tech professionals amid the pressures of dual careers.

Oct 10, 2024 • 48min
Episode 92 - SAML XPath Confusion, Chinese DNS Poisoning, and AI Powered 403 Bypasser
A deep dive into cybersecurity reveals startling insights about vulnerabilities like SAML exploitation and DNS poisoning linked to China's Great Firewall. Discover a groundbreaking 0-click exploit within MediaTek chipsets that could endanger Android and IoT devices. The conversation highlights innovative AI-enhanced tools for web fuzzing and discusses community efforts to navigate CSP bypass techniques. Plus, tips for budding researchers on overcoming common challenges in vulnerability assessments add an inspiring touch!

Oct 3, 2024 • 1h 23min
Episode 91: Zero to LHE in 9 Months (feat gr3pme)
Brandyn Murtagh, known as gr3pme, is a HackerNotes writer with a decade of cybersecurity experience. He shares his unique journey into bug bounty hunting, discussing the power of mentorship and the importance of emotional regulation. The conversation delves into strategies for selecting targets and the benefits of networking in the hacking community. Murtagh also highlights insights on ecosystem hacking and vulnerability discovery, particularly in fintech, making the complex world of bug hunting both approachable and engaging for listeners.

11 snips
Sep 26, 2024 • 52min
Episode 90: 5k Clickjacking, Encryption Oracles, and Cursor for PoCs
Tune in for some hilarious tales from the coding world, including food expense reports linked to an app development tool. Discover the intricacies of exploiting a major clickjacking vulnerability in Google Docs. They also dive deep into the alarming ease of hijacking Telegram accounts in seconds. Alongside debates on AI coding tools and SQL injections, the podcast highlights the gaming spirit in ethical hacking and introduces a new merch store for fans. It's a blend of tech insights and lighthearted banter that you won't want to miss!

Sep 19, 2024 • 1h 58min
Episode 89: The Untapped Bug Bounty Landscape of IoT w/ Matt Brown
Matt Brown, an expert in IoT hacking and hardware methodologies, shares his thrilling journey through the world of cybersecurity. He dives into the complexities of hardware hacking, including BGA reballing and vulnerabilities in SSL connections. The conversation unveils techniques for exploiting IoT devices and emphasizes the importance of hands-on experience. Brown also dissects the pitfalls of certificate validation, recounting his own bug stories to illustrate real-world challenges in IoT security. Prepare to be fascinated by the dynamic realm of ethical hacking!

Sep 12, 2024 • 1h 6min
Episode 88: News, Tools, and Writeups
Dive into the world of web security as the hosts explore a new cheat sheet for URL validation bypass. Learn about the innovative Sanic DNS for high-speed lookups and Dockerization strategies for Orange Confusion Attacks. Discover insights on PHP object injection exploits affecting WordPress and discuss the impact of browser tracking protections. With a blend of nostalgia and creativity, the conversation highlights the evolving landscape of cybersecurity and the importance of collaboration in tackling vulnerabilities.

Sep 5, 2024 • 1h 27min
Episode 87: 'Hacker Wife' Mariah Gardner on Bug Bounty mentality and relationships
Mariah Garder, an insightful voice in the Bug Bounty community, shares her experiences navigating relationships within this unique field. She discusses the emotional rollercoaster of live hacking events and the importance of mutual support between hackers and their partners. Mariah emphasizes balancing personal ambitions with family life, addressing the complexities of work-life dynamics. Listeners will enjoy her tips on maintaining communication and nurturing relationships while pursuing a rewarding but demanding passion.

Aug 29, 2024 • 42min
Episode 86: The X-Correlation between Frans & RCE - Research Drop
Frans Rosen, a cybersecurity expert, shares groundbreaking insights from his latest presentation. He discusses X-correlation injections and their effects on server-side vulnerabilities, emphasizing the role of request IDs. Frans delves into fuzz testing techniques, revealing how to uncover hidden software weaknesses, and highlights the complexities of managing cross-origin APIs. Additionally, he explores security challenges related to JSON Web Tokens and logging pipelines, providing practical solutions for developers and security professionals.