Couverture de Critical Thinking - Bug Bounty Podcast

Critical Thinking - Bug Bounty Podcast

Critical Thinking - Bug Bounty Podcast

De : Justin Gardner (Rhynorater) & Joseph Thacker (Rez0)
Écouter gratuitement

À propos de cette écoute

A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.

Critical Thinking Podcast
Les membres Amazon Prime bénéficient automatiquement de 2 livres audio offerts chez Audible.

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !
    Épisodes
    • Episode 137: How We Do AI-Assisted Whitebox Review, New CSPT Gadgets, and Tools from SLCyber
      Aug 28 2025

      Episode 137: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner and Joseph Thacker reunite to talk about AI Hacking Assistants, CSPT and cache deception, and a bunch of tools like ch.at, Slice, Ebka, and more.

      Follow us on twitter at: https://x.com/ctbbpodcast

      Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

      Shoutout to YTCracker for the awesome intro music!

      ====== Links ======

      Follow your hosts Rhynorater and Rez0 on Twitter:

      https://x.com/Rhynorater

      https://x.com/rez0__

      ====== Ways to Support CTBBPodcast ======

      Hop on the CTBB Discord at https://ctbb.show/discord!

      We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

      You can also find some hacker swag at https://ctbb.show/merch!

      Today’s Sponsor - ThreatLocker. Checkout ThreatLocker DAC!

      https://www.criticalthinkingpodcast.io/tl-dac

      ====== This Week in Bug Bounty ======

      Vulnerability vectors: SQL injection for Bug Bounty hunters

      Mozilla VPN Clients: RCE via file write and path traversal

      ====== Resources ======

      Cache Deception + CSPT:

      dig @ch.at

      Searchlight Cyber Tools

      Slice

      Ebka-Caido-AI

      postMessage targetOrigin bypass

      ====== Timestamps ======

      (00:00:00) Introduction

      (00:01:26) Claude, Gemini, and Hacking Assistants

      (00:11:08) AI Safety

      (00:18:09) CSPT

      (00:23:26) ch.at, Slice, Ebka, & Searchlight Cyber Tools

      (00:45:19) postMessage targetOrigin bypass

      Afficher plus Afficher moins
      49 min
    • Episode 136: Hacking Cluely, AI Prod Sec, and How To Not Get Sued with Jack Cable
      Aug 21 2025

      Episode 136: In this episode of Critical Thinking - Bug Bounty Podcast, Joseph Thacker sits down with Jack Cable to get the scoop on a significant bug in Cluely’s desktop application, as well as the resulting drama. They also talk about Jack’s background in government cybersecurity initiatives, and the legal risks faced by security researchers.

      Follow us on twitter at: https://x.com/ctbbpodcast

      Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

      Shoutout to YTCracker for the awesome intro music!

      ====== Links ======

      Follow your hosts Rhynorater and Rez0 on Twitter:

      https://x.com/Rhynorater

      https://x.com/rez0__

      ====== Ways to Support CTBBPodcast ======

      Hop on the CTBB Discord at https://ctbb.show/discord!

      We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

      You can also find some hacker swag at https://ctbb.show/merch!

      Today’s Sponsor - ThreatLocker. Checkout ThreatLocker Detect! https://www.criticalthinkingpodcast.io/tl-detect

      Today’s Guest: https://x.com/jackhcable?lang=en

      ====== This Week in Bug Bounty ======

      Nullcon Berlin

      https://www.yeswehack.com/page/yeswehack-live-hacking-nullcon-berlin-2025?utm_source=sponsor&utm_medium=blog&utm_campaign=lhe-nullcon-berlin

      BB Bulletin #15

      https://www.linkedin.com/pulse/bug-bounty-bulletin-15-yes-we-hack-dntue/

      2x Bounty on Grab

      https://hackerone.com/grab?type=team

      ====== Resources ======

      Corridor

      https://corridor.dev/

      disclose.io

      https://disclose.io/

      ====== Timestamps ======

      (00:00:00) Introduction

      (00:03:33) Cluely Bug, Government involvement, & Disclosed.io

      (00:12:33) AI in security & Corridor.dev

      (00:29:23) Cluely Bug Fallout & Ethics of hacking outside of Programs

      (00:41:20) Shift Agents

      Afficher plus Afficher moins
      51 min
    • Episode 135: Akamai's Ryan Barnett on WAFs, Unicode Confusables, and Triage Stories
      Aug 14 2025

      Episode 135: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Ryan Barnett for a deep dive on WAFs. We also recap his Exploiting Unicode Normalization talk from DEFCON, and get his perspective on bug hunting from his time at Akamai.

      Follow us on twitter at: https://x.com/ctbbpodcast

      Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

      Shoutout to YTCracker for the awesome intro music!

      ====== Links ======

      Follow your hosts Rhynorater and Rez0 on Twitter:

      https://x.com/Rhynorater

      https://x.com/rez0__

      ====== Ways to Support CTBBPodcast ======

      Hop on the CTBB Discord at https://ctbb.show/discord!

      We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

      You can also find some hacker swag at https://ctbb.show/merch!

      Today’s Sponsor - ThreatLocker. Checkout ThreatLocker Detect! https://www.criticalthinkingpodcast.io/tl-detect

      Today’s Guest: https://x.com/ryancbarnett

      ====== Resources ======

      Accidental Stored XSS Flaw in Zemanta 'Related Posts' Plugin for TypePad

      https://webappdefender.blogspot.com/2013/04/accidental-stored-xss-flaw-in-zemanta.html

      XSS Street-Fight

      https://media.blackhat.com/bh-dc-11/Barnett/BlackHat_DC_2011_Barnett_XSS%20Streetfight-Slides.pdf

      Blackhat USA 2025 - Lost in Translation: Exploiting Unicode Normalization

      https://www.blackhat.com/us-25/briefings/schedule/#lost-in-translation-exploiting-unicode-normalization-44923

      ====== Timestamps ======

      (00:00:00) Introduction

      (00:02:49) Accidental Stored XSS in Typepad Plugin

      (00:06:34) Chatscatter & Abusing third party Analytics

      (00:11:42) Ryan Barnett Introduction

      (00:21:11) Virtual Patching & WAF Challenges

      (00:40:39) AWS API Gateways & Whitelisting Bug Hunter Traffic

      (00:49:59) Lost in Translation: Exploiting Unicode Normalization

      (01:11:29) CSPs at the WAF level & 'Bounties for Bypass'

      Afficher plus Afficher moins
      1 h et 26 min
    Aucun commentaire pour le moment