
Critical Thinking - Bug Bounty Podcast
Podcast de Justin Gardner (Rhynorater) & Joseph Thacker (Rez0)
A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.
Disfruta 30 días gratis
4,99 € / mes después de la prueba.Cancela cuando quieras.
Todos los episodios
125 episodios
Episode 125: In this episode of Critical Thinking - Bug Bounty Podcast Justin shares insights on how to succeed at live hacking events. We cover pre-event preparations, challenges of collaboration, on-site strategies, and the importance of maintaining a healthy mindset throughout the entire process. Follow us on twitter at: https://x.com/ctbbpodcast [https://x.com/ctbbpodcast] Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io [info@criticalthinkingpodcast.io] Shoutout to YTCracker [https://twitter.com/realytcracker] for the awesome intro music! ====== Links ====== Follow your hosts Rhynorater and Rez0 on Twitter: https://x.com/Rhynorater [https://x.com/Rhynorater] https://x.com/rez0__ [https://x.com/rez0__] ====== Ways to Support CTBBPodcast ====== Hop on the CTBB Discord at https://ctbb.show/discord [https://ctbb.show/discord]! We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc. You can also find some hacker swag at https://ctbb.show/merch [https://ctbb.show/merch]! ====== This Week in Bug Bounty ====== Decathlon Public Bug Bounty Program on YesWeHack [https://yeswehack.com/programs/decathlon] ====== Resources ====== The Ultimate Double-Clickjacking PoC [https://jorianwoltjer.com/blog/p/hacking/ultimate-doubleclickjacking-poc] Grafana Full read SSRF and Account Takeover: CVE-2025-4123 [https://nightbloodz.github.io/grafana-CVE-2025-4123/] Grafana CVE-2025-4123 Exploit [https://github.com/NightBloodz/CVE-2025-4123] What I learned from my first 100 HackerOne Reports [https://evanconnelly.com/post/my-first-100-hackerone-reports/] Root for your friends [https://josephthacker.com/personal/2025/05/13/root-for-your-friends.html] ====== Timestamps ====== (00:00:00) Introduction (00:02:30) The Ultimate Double-Clickjacking PoC, Grafana CVE, & Evan Connelly's first 100 bugs (00:10:23) How to win at Live Hacking Events (00:11:53) Pre-event (00:11:45) Scope Call (00:33:11) Dupe window Ends (00:36:00) Onsite & and Day of Event (00:42:46) Don't define your identity on the outcome

Episode 124: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph cover some news from around the community, hitting on Joseph’s Anthropic safety testing, Justin’s guest appearance on For Crying Out Cloud, and several fascinating tweets. Then they have a quick Full-time Bug Bounty check-in. Follow us on twitter at: https://x.com/ctbbpodcast [https://x.com/ctbbpodcast] Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io [info@criticalthinkingpodcast.io] Shoutout to YTCracker [https://twitter.com/realytcracker] for the awesome intro music! ====== Links ====== Follow your hosts Rhynorater and Rez0 on Twitter: https://x.com/Rhynorater [https://x.com/Rhynorater] https://x.com/rez0__ [https://x.com/rez0__] ====== Ways to Support CTBBPodcast ====== Hop on the CTBB Discord at https://ctbb.show/discord [https://ctbb.show/discord]! We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc. You can also find some hacker swag at https://ctbb.show/merch [https://ctbb.show/merch]! Today’s Sponsor - ThreatLocker Web Control https://www.criticalthinkingpodcast.io/tl-webcontrol [https://www.criticalthinkingpodcast.io/tl-webcontrol] ====== This Week in Bug Bounty ====== Louis Vuitton Public Bug Bounty Program [https://yeswehack.com/programs/louis-vuitton-malletier-public-bug-bounty-program] CVE-2025-47934 was discovered on one of our Bug Bounty program : OpenPGP.js [https://nvd.nist.gov/vuln/detail/CVE-2025-47934] Stored XSS in File Upload Leads to Privilege Escalation and Full Workspace Takeover [https://hackerone.com/reports/3115705] ====== Resources ====== Jorian tweet [https://x.com/J0R1AN/status/1925164620886536703/photo/1] Clipjacking: Hacked by copying text - Clickjacking but better [https://blog.jaisal.dev/articles/cwazy-clipboardz] Crying out Cloud Appearance [https://www.youtube.com/watch?v=eW6kk-5Jn6k] Wiz Research takes 1st place in Pwn2Own AI category [https://x.com/wiz_io/status/1924463892111020363] New XSS vector with image tag [https://x.com/garethheyes/status/1922029698986455338] ====== Timestamps ====== (00:00:00) Introduction (00:10:50) Supabase (00:13:47) Tweet-research from Jorian and Wyatt Walls. (00:20:24) Anthropic safety testing challenge & Wiz Podcast guest appearance (00:27:44) New XSS vector, Google i/o, and coding agents (00:35:48) Full Time Bug Bounty

Episode 123: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with part 2 of Rez0’s miniseries. Today we talk about mastering Prompt Injection, taxonomy of impact, and both triggering traditional Vulns and exploiting AI-specific features. Follow us on twitter at: https://x.com/ctbbpodcast [https://x.com/ctbbpodcast] Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io [info@criticalthinkingpodcast.io] Shoutout to YTCracker [https://twitter.com/realytcracker] for the awesome intro music! ====== Links ====== Follow your hosts Rhynorater and Rez0 on Twitter: https://x.com/Rhynorater [https://x.com/Rhynorater] https://x.com/rez0__ [https://x.com/rez0__] ====== Ways to Support CTBBPodcast ====== Hop on the CTBB Discord at https://ctbb.show/discord [https://ctbb.show/discord]! We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc. You can also find some hacker swag at https://ctbb.show/merch [https://ctbb.show/merch]! Today’s Sponsor - ThreatLocker User Store https://www.criticalthinkingpodcast.io [https://www.criticalthinkingpodcast.io] /tl-userstore ====== This Week in Bug Bounty ====== Earning a HackerOne 2025 Live Hacking Invite https://www.hackerone.com/blog/earning-hackerone-2025-live-hacking-invite [https://www.hackerone.com/blog/earning-hackerone-2025-live-hacking-invite] HTTP header hacks: basic and advanced exploit techniques explored https://www.yeswehack.com/learn-bug-bounty/http-header-exploitation [https://www.yeswehack.com/learn-bug-bounty/http-header-exploitation] ====== Resources ====== Grep.app [http://Grep.app] https://vercel.com/blog/migrating-grep-from-create-react-app-to-next-js [https://vercel.com/blog/migrating-grep-from-create-react-app-to-next-js] Gemini 2.5 Pro prompt leak https://x.com/elder_plinius/status/1913734789544214841 [https://x.com/elder_plinius/status/1913734789544214841] Pliny's CL4R1T4S https://github.com/elder-plinius/CL4R1T4S [https://github.com/elder-plinius/CL4R1T4S] O3 https://x.com/pdstat/status/1913701997141803329 [https://x.com/pdstat/status/1913701997141803329] ====== Timestamps ====== (00:00:00) Introduction (00:05:25) Grep.app [http://Grep.app], O3, and Gemini 2.5 Pro prompt leak (00:11:09) Delivery and impactful action (00:20:44) Mastering Prompt Injection (00:30:36) Traditional vulns in Tool Calls, and AI Apps (00:37:32) Exploiting AI specific features

Episode 122: In this episode of Critical Thinking - Bug Bounty Podcast your boys are MVH winners! First we’re joined by Zak, to discuss the Google LHE as well as surprising us with a bug of his own! Then, we sit down with Lupin and Monke for a winners roundtable and retrospective of the event. Follow us on twitter at: https://x.com/ctbbpodcast [https://x.com/ctbbpodcast] Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io [info@criticalthinkingpodcast.io] Shoutout to YTCracker [https://twitter.com/realytcracker] for the awesome intro music! ====== Links ====== Follow your hosts Rhynorater and Rez0 on Twitter: https://x.com/Rhynorater [https://x.com/Rhynorater] https://x.com/rez0__ [https://x.com/rez0__] ====== Ways to Support CTBBPodcast ====== Hop on the CTBB Discord at https://ctbb.show/discord [https://ctbb.show/discord]! We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc. You can also find some hacker swag at https://ctbb.show/merch [https://ctbb.show/merch]! Check out the CTBB Job Board: https://jobs.ctbb.show/ [https://jobs.ctbb.show/] Today’s Guests: Zak Bennett : https://www.linkedin.com/in/zak-bennett/ [https://www.linkedin.com/in/zak-bennett/] Ciarán Cotter: https://x.com/monkehack [https://x.com/monkehack] Roni Carta: https://x.com/0xLupin [https://x.com/0xLupin] ====== Resources ====== We hacked Google’s A.I Gemini and leaked its source code https://www.landh.tech/blog/20250327-we-hacked-gemini-source-code [https://www.landh.tech/blog/20250327-we-hacked-gemini-source-code] ====== Timestamps ====== (00:00:00) Introduction (00:03:02) An RCE via memory corruption (00:07:45) Zak's role at Google and Google's AI LHE (00:15:25) Different Components of AI Vulnerabilities (00:24:58) MHV Winner Debrief (01:08:47) Technical Takeaways And Team Strategies (01:28:49) LHE Experience and Google VRP & Abuse VRP

Episode 121: In this episode of Critical Thinking - Bug Bounty Podcast we cover so much news and research that we ran out of room in the description... Follow us on X [https://x.com/ctbbpodcast] Shoutout to YTCracker [https://twitter.com/realytcracker] for the awesome intro music! ====== Links ====== Follow Rhynorater [https://x.com/Rhynorater]and Rez0 [https://x.com/rez0__]on X: ====== Ways to Support CTBBPodcast ====== Hop on the CTBB Discord! [https://ctbb.show/discord] We also have hacker swag [https://ctbb.show/merch]! ====== This Week in Bug Bounty ====== Hacker spotlight: Rhynorater [https://www.bugcrowd.com/blog/hacker-spotlight-rhynorater/] Ultra Mobile BB Program - Mobile Apps [https://bugcrowd.com/engagements/ultramobile-mbb-og2] Ultra Mobile BB Program - (Public) [https://bugcrowd.com/engagements/ultramobile] John Deere Program [https://hackerone.com/john-deere?type=team] JD's's BB Program Boosts Cybersecurity [https://www.deere.com/en/stories/featured/hacker-heroes/] Dojo #41 - Ruby treasure [https://dojo-yeswehack.com/challenge/play/5509cc2e-bd6c-4606-8cbb-f3ca1d25c732] ====== Resources ====== slonser 0-day in chrome [https://x.com/slonser_/status/1919439373986107814] CT Additional useful primitives [https://x.com/ctbbpodcast/status/1919501924862214577] How I made $64k from deleted files [https://medium.com/@sharon.brizinov/how-i-made-64k-from-deleted-files-a-bug-bounty-story-c5bd3a6f5f9b] CTBB episode with Sharon Brizinov [http://ctbb.show/98] Rez0's Subdomain Link Launcher [https://josephthacker.com/subdomain_link_launcher] Qwen3 Local Model [https://x.com/simonw/status/1918451927207325774] May Cause Pwnage [https://blog.jaisal.dev/articles/mcp] import WAF bypass [https://x.com/KN0X55/status/1916180381742551238] Caido Drop [https://github.com/caido-community/drop] Andre's tweet about encoded word [https://x.com/0xacb/status/1915334267522912742] Nahamcon [https://www.nahamcon.com/] Gemini prompt leak [https://x.com/elder_plinius/status/1913734789544214841] SVG Onload Handlers [https://x.com/garethheyes/status/1915488202405593136]
Disfruta 30 días gratis
4,99 € / mes después de la prueba.Cancela cuando quieras.
Podcasts exclusivos
Sin anuncios
Podcast gratuitos
Audiolibros
20 horas / mes