エピソード

  • Episode 125: How to Win Live Hacking Events
    2025/06/05

    Episode 125: In this episode of Critical Thinking - Bug Bounty Podcast Justin shares insights on how to succeed at live hacking events. We cover pre-event preparations, challenges of collaboration, on-site strategies, and the importance of maintaining a healthy mindset throughout the entire process.

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    ====== This Week in Bug Bounty ======

    Decathlon Public Bug Bounty Program on YesWeHack

    ====== Resources ======

    The Ultimate Double-Clickjacking PoC

    Grafana Full read SSRF and Account Takeover: CVE-2025-4123

    Grafana CVE-2025-4123 Exploit

    What I learned from my first 100 HackerOne Reports

    Root for your friends

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:02:30) The Ultimate Double-Clickjacking PoC, Grafana CVE, & Evan Connelly's first 100 bugs

    (00:10:23) How to win at Live Hacking Events

    (00:11:53) Pre-event

    (00:11:45) Scope Call

    (00:33:11) Dupe window Ends

    (00:36:00) Onsite & and Day of Event

    (00:42:46) Don't define your identity on the outcome

    続きを読む 一部表示
    47 分
  • Episode 124: Bug Bounty Lifestyle = Less Hacking Time?
    2025/05/29

    Episode 124: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph cover some news from around the community, hitting on Joseph’s Anthropic safety testing, Justin’s guest appearance on For Crying Out Cloud, and several fascinating tweets. Then they have a quick Full-time Bug Bounty check-in.

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    Today’s Sponsor - ThreatLocker Web Control

    https://www.criticalthinkingpodcast.io/tl-webcontrol

    ====== This Week in Bug Bounty ======

    Louis Vuitton Public Bug Bounty Program

    CVE-2025-47934 was discovered on one of our Bug Bounty program : OpenPGP.js

    Stored XSS in File Upload Leads to Privilege Escalation and Full Workspace Takeover

    ====== Resources ======

    Jorian tweet

    Clipjacking: Hacked by copying text - Clickjacking but better

    Crying out Cloud Appearance

    Wiz Research takes 1st place in Pwn2Own AI category

    New XSS vector with image tag

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:10:50) Supabase

    (00:13:47) Tweet-research from Jorian and Wyatt Walls.

    (00:20:24) Anthropic safety testing challenge & Wiz Podcast guest appearance

    (00:27:44) New XSS vector, Google i/o, and coding agents

    (00:35:48) Full Time Bug Bounty

    続きを読む 一部表示
    45 分
  • Episode 123: Hacking AI Series: Vulnus ex Machina - Part 2
    2025/05/22

    Episode 123: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with part 2 of Rez0’s miniseries. Today we talk about mastering Prompt Injection, taxonomy of impact, and both triggering traditional Vulns and exploiting AI-specific features.

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    Today’s Sponsor - ThreatLocker User Store

    https://www.criticalthinkingpodcast.io

    /tl-userstore

    ====== This Week in Bug Bounty ======

    Earning a HackerOne 2025 Live Hacking Invite

    https://www.hackerone.com/blog/earning-hackerone-2025-live-hacking-invite

    HTTP header hacks: basic and advanced exploit techniques explored

    https://www.yeswehack.com/learn-bug-bounty/http-header-exploitation

    ====== Resources ======

    Grep.app

    https://vercel.com/blog/migrating-grep-from-create-react-app-to-next-js

    Gemini 2.5 Pro prompt leak

    https://x.com/elder_plinius/status/1913734789544214841

    Pliny's CL4R1T4S

    https://github.com/elder-plinius/CL4R1T4S

    O3

    https://x.com/pdstat/status/1913701997141803329

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:05:25) Grep.app, O3, and Gemini 2.5 Pro prompt leak

    (00:11:09) Delivery and impactful action

    (00:20:44) Mastering Prompt Injection

    (00:30:36) Traditional vulns in Tool Calls, and AI Apps

    (00:37:32) Exploiting AI specific features

    続きを読む 一部表示
    44 分
  • Episode 122: We Won Google's AI Hacking Event in Tokyo - Main Takeaways
    2025/05/15

    Episode 122: In this episode of Critical Thinking - Bug Bounty Podcast your boys are MVH winners! First we’re joined by Zak, to discuss the Google LHE as well as surprising us with a bug of his own! Then, we sit down with Lupin and Monke for a winners roundtable and retrospective of the event.

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    Check out the CTBB Job Board: https://jobs.ctbb.show/

    Today’s Guests:

    Zak Bennett : https://www.linkedin.com/in/zak-bennett/

    Ciarán Cotter: https://x.com/monkehack

    Roni Carta: https://x.com/0xLupin

    ====== Resources ======

    We hacked Google’s A.I Gemini and leaked its source code

    https://www.landh.tech/blog/20250327-we-hacked-gemini-source-code

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:03:02) An RCE via memory corruption

    (00:07:45) Zak's role at Google and Google's AI LHE

    (00:15:25) Different Components of AI Vulnerabilities

    (00:24:58) MHV Winner Debrief

    (01:08:47) Technical Takeaways And Team Strategies

    (01:28:49) LHE Experience and Google VRP & Abuse VRP

    続きを読む 一部表示
    1 時間 46 分
  • Episode 121: Slonser’s Image Injection 0-day -> ATO & New Caido Collab Plugin
    2025/05/08
    Episode 121: In this episode of Critical Thinking - Bug Bounty Podcast we cover so much news and research that we ran out of room in the description...Follow us on XShoutout to YTCracker for the awesome intro music!====== Links ======Follow Rhynorater and Rez0 on X:====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord!We also have hacker swag!====== This Week in Bug Bounty ======Hacker spotlight: RhynoraterUltra Mobile BB Program - Mobile AppsUltra Mobile BB Program - (Public)John Deere ProgramJD's's BB Program Boosts CybersecurityDojo #41 - Ruby treasure====== Resources ======slonser 0-day in chromeCT Additional useful primitivesHow I made $64k from deleted filesCTBB episode with Sharon BrizinovRez0's Subdomain Link LauncherQwen3 Local ModelMay Cause Pwnageimport WAF bypassCaido DropAndre's tweet about encoded wordNahamconGemini prompt leakSVG Onload Handlers
    続きを読む 一部表示
    57 分
  • Episode 120: SpaceRaccoon - From Day Zero to Zero Day
    2025/05/01

    Episode 120: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner welcomes Eugene to talk (aka fanboy) about his new book, 'From Day Zero to Zero Day.' We walk through what to expect in each chapter, including Binary Analysis, Source and Sink Discovery, and Fuzzing everything.Then we give listeners a special deal on the book.

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    Today’s Sponsor - ThreatLocker User Store

    https://www.criticalthinkingpodcast.io

    /tl-userstore

    Today’s guest: https://x.com/spaceraccoonsec

    ====== Resources ======

    Buy SpaceRaccoon's Book: From Day Zero to Zero Day

    https://nostarch.com/zero-day

    USE CODE 'ZERODAYDEAL' for 30% OFF

    Pwning Millions of Smart Weighing Machines with API and Hardware Hacking

    https://spaceraccoon.dev/pwning-millions-smart-weighing-machines-api-hardware-hacking/

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:04:58) From Day Zero to Zero Day

    (00:12:06) Mapping Code to Attack Surface

    (00:17:59) Day Zero and Taint Analysis

    (00:22:43) Automated Variant Analysis & Binary Taxonomy

    (00:31:35) Source and Sink Discovery

    (00:40:22) Hybrid Binary Analysis & Quick and Dirty Fuzzing

    (00:56:00) Coverage-Guided Fuzzing, Fuzzing Everything, & Beyond Day Zero

    (01:02:16) Bug bounty, Vuln research, & Governmental work

    (01:10:23) Source Code Review & Pwning Millions of Smart Weighing Machines

    続きを読む 一部表示
    1 時間 37 分
  • Episode 119: Abusing Iframes from a client-side hacker
    2025/04/17

    Episode 119: In this episode of Critical Thinking - Bug Bounty Podcast Justin does a mini deep dive into the world of iframes, starting with why they’re significant, their attributes, and how to attack them.

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    ====== Resources ======

    Episode with JR0ch17

    ctbb.show/61

    Exacerbating Cross-Site Scripting: The Iframe Sandwich

    https://coopergyoung.com/exacerbating-cross-site-scripting-the-iframe-sandwich/

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:01:20) Why are Iframes useful

    (00:05:11) Attributes of Iframes

    (00:21:39) Iframe Attacks

    (00:29:53) Iframe Fun Facts

    続きを読む 一部表示
    34 分
  • Episode 118: Hacking Happy Hour: 0days on Tap and SQLi Shots
    2025/04/10

    Episode 118: In this episode of Critical Thinking - Bug Bounty Podcast we cover a host of news, including clientside tidbits, “Credentialless” iframes, prototype pollution, and what constitutes a polyglot in llms.txt.

    Follow us on X

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow Rhynorater and Rez0 on X

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    You can also find some hacker swag!

    ====== Resources ======

    p4fg passed 1 Million!

    /reports/:id.json - $25K Crit

    Hacking Crypto pt1

    The art of payload obfuscation

    Analyzing the Next.js Middleware Bypass

    Nahamsec's Merch store

    llms.txt polyglot prompt injection

    React Router and the Remix’ed path

    Pre-Authentication SQL Injection in Halo ITSM

    Pwning Millions of Smart Weighing Machines

    MCP Server Oauth

    Cline

    “Credentialless” iframes

    Tiny XSS Payloads

    Types of Pollution

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:05:56) Next.js Middleware bypass & Polyglots in llms.txt

    (00:16:35) CPDoS on React Router

    (00:24:26) Loose Types Sink Ships & Pwning Smart Scales

    (00:32:30) MCP Server Oauth & Cline

    (00:39:40) Clientside Tidbits & Prototype Pollutions

    続きを読む 一部表示
    58 分