<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">
<channel>
  <atom:link href="https://feeds.cohostpodcasting.com/y3zHW5ae" rel="self" title="MP3 Audio" type="application/atom+xml"/>
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <generator>https://cohostpodcasting.com</generator>
  <title><![CDATA[Critical Thinking - Bug Bounty Podcast]]></title>
  <description><![CDATA[<p>A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.</p>]]></description>
  <itunes:summary><![CDATA[<p>A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.</p>]]></itunes:summary>
  <language>en</language>
  <copyright><![CDATA[Critical Thinking Podcast]]></copyright>
<podcast:guid>194e9190-c8b8-49a9-a30a-6fae125dfd3f</podcast:guid>
  <pubDate>Sun, 18 Jan 2026 00:56:59 -0500</pubDate>
  <lastBuildDate>Thu, 09 Apr 2026 09:00:11 -0400</lastBuildDate>
  <image>
    <link>https://criticalthinkingpodcast.io</link>
    <title><![CDATA[Critical Thinking - Bug Bounty Podcast]]></title>
    <url>https://files.cohostpodcasting.com/quill-file-prod/8d5e4388-13f4-45c8-b82f-aff313a5ac76/shows/194e9190-c8b8-49a9-a30a-6fae125dfd3f/cover-art/original_ef591a0cfb81593cfd0c1795273d6d1f.jpg</url>
  </image>
  <link>https://criticalthinkingpodcast.io</link>
  <itunes:type>episodic</itunes:type>
  <itunes:author><![CDATA[Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme)]]></itunes:author>
  <itunes:explicit>false</itunes:explicit>
  <itunes:image href="https://files.cohostpodcasting.com/quill-file-prod/8d5e4388-13f4-45c8-b82f-aff313a5ac76/shows/194e9190-c8b8-49a9-a30a-6fae125dfd3f/cover-art/original_ef591a0cfb81593cfd0c1795273d6d1f.jpg"/>
  <itunes:new-feed-url>https://feeds.cohostpodcasting.com/y3zHW5ae</itunes:new-feed-url>
  
  <itunes:owner>
    <itunes:name><![CDATA[Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme)]]></itunes:name>
    <itunes:email>info@criticalthinkingpodcast.io</itunes:email>
  </itunes:owner>
  <itunes:category text="Technology"/>
<item>
  <guid isPermaLink="false">6bb49810-f221-409b-a664-0c56a9017d30</guid>
  <title><![CDATA[Episode 169: Attacking OAuth 2.1]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Episode 169: In this episode of Critical Thinking - Bug Bounty Podcast gr3pme goes over some of the changes from OAuth 2.0 vs 2.1 and how Hackers can capitalize.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">Intigriti is providing free Burp Pro for Hackers!</span></p><p><a href="https://www.intigriti.com/blog/news/intigriti-collaborates-with-portswigger-to-support-ethical-hacking-excellence" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.intigriti.com/blog/news/intigriti-collaborates-with-portswigger-to-support-ethical-hacking-excellence</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">Django-allauth Account Takeover (ZeroPath Audit)</span></p><p><a href="https://zeropath.com/blog/django-allauth-account-takeover-vulnerabilities" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://zeropath.com/blog/django-allauth-account-takeover-vulnerabilities</a></p><p><br></p><p><span style="background-color: transparent;">CVE-2025-4144: Cloudflare Workers PKCE Bypass</span></p><p><a href="https://github.com/cloudflare/workers-oauth-provider/security/advisories/GHSA-qgp8-v765-qxx9" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/cloudflare/workers-oauth-provider/security/advisories/GHSA-qgp8-v765-qxx9</a></p><p><br></p><p><span style="background-color: transparent;">CVE-2025-54576: OAuth2-Proxy Auth Bypass</span></p><p><a href="https://zeropath.com/blog/cve-2025-54576-oauth2-proxy-auth-bypass" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://zeropath.com/blog/cve-2025-54576-oauth2-proxy-auth-bypass</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:02:16) OAuth 2.0 Standards</span></p><p><span style="background-color: transparent;">(00:12:08) Agent to Agent Communication</span></p><p><span style="background-color: transparent;">(00:17:19) CVE Case studies</span></p><p><br></p><p><br></p>]]></description>
  <embed_id>2c382744-7d96-4f7e-9976-4a9e1f3f3116</embed_id>
  <pubDate>Thu, 09 Apr 2026 05:00:00 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))]]></author>
  <enclosure length="29057912" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/665c5fb5-4c9a-461c-98c2-8a6678a49615/episode.mp3" />
  <itunes:title><![CDATA[Episode 169: Attacking OAuth 2.1]]></itunes:title>
  <itunes:duration>30:16</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Episode 169: In this episode of Critical Thinking - Bug Bounty Podcast gr3pme goes over some of the changes from OAuth 2.0 vs 2.1 and how Hackers can capitalize.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">Intigriti is providing free Burp Pro for Hackers!</span></p><p><a href="https://www.intigriti.com/blog/news/intigriti-collaborates-with-portswigger-to-support-ethical-hacking-excellence" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.intigriti.com/blog/news/intigriti-collaborates-with-portswigger-to-support-ethical-hacking-excellence</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">Django-allauth Account Takeover (ZeroPath Audit)</span></p><p><a href="https://zeropath.com/blog/django-allauth-account-takeover-vulnerabilities" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://zeropath.com/blog/django-allauth-account-takeover-vulnerabilities</a></p><p><br></p><p><span style="background-color: transparent;">CVE-2025-4144: Cloudflare Workers PKCE Bypass</span></p><p><a href="https://github.com/cloudflare/workers-oauth-provider/security/advisories/GHSA-qgp8-v765-qxx9" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/cloudflare/workers-oauth-provider/security/advisories/GHSA-qgp8-v765-qxx9</a></p><p><br></p><p><span style="background-color: transparent;">CVE-2025-54576: OAuth2-Proxy Auth Bypass</span></p><p><a href="https://zeropath.com/blog/cve-2025-54576-oauth2-proxy-auth-bypass" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://zeropath.com/blog/cve-2025-54576-oauth2-proxy-auth-bypass</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:02:16) OAuth 2.0 Standards</span></p><p><span style="background-color: transparent;">(00:12:08) Agent to Agent Communication</span></p><p><span style="background-color: transparent;">(00:17:19) CVE Case studies</span></p><p><br></p><p><br></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Episode 169: In this episode of Critical Thinking - Bug Bounty Podcast gr3pme goes over some of the changes from OAuth 2.0 vs 2.1 and how Hackers can capitalize.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">Intigriti is providing free Burp Pro for Hackers!</span></p><p><a href="https://www.intigriti.com/blog/news/intigriti-collaborates-with-portswigger-to-support-ethical-hacking-excellence" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.intigriti.com/blog/news/intigriti-collaborates-with-portswigger-to-support-ethical-hacking-excellence</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">Django-allauth Account Takeover (ZeroPath Audit)</span></p><p><a href="https://zeropath.com/blog/django-allauth-account-takeover-vulnerabilities" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://zeropath.com/blog/django-allauth-account-takeover-vulnerabilities</a></p><p><br></p><p><span style="background-color: transparent;">CVE-2025-4144: Cloudflare Workers PKCE Bypass</span></p><p><a href="https://github.com/cloudflare/workers-oauth-provider/security/advisories/GHSA-qgp8-v765-qxx9" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/cloudflare/workers-oauth-provider/security/advisories/GHSA-qgp8-v765-qxx9</a></p><p><br></p><p><span style="background-color: transparent;">CVE-2025-54576: OAuth2-Proxy Auth Bypass</span></p><p><a href="https://zeropath.com/blog/cve-2025-54576-oauth2-proxy-auth-bypass" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://zeropath.com/blog/cve-2025-54576-oauth2-proxy-auth-bypass</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:02:16) OAuth 2.0 Standards</span></p><p><span style="background-color: transparent;">(00:12:08) Agent to Agent Communication</span></p><p><span style="background-color: transparent;">(00:17:19) CVE Case studies</span></p><p><br></p><p><br></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 169: In this episode of Critical Thinking - Bug Bounty Podcast gr3pme goes over some of the changes from OAuth 2.0 vs 2.1 and how Hackers can capitalize.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel f...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>true</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>169</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">3b7fed1c-043f-4519-bbeb-ec4b0276ac08</guid>
  <title><![CDATA[Episode 168: XSSDoctor - Client-side Path Traversal Research]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Episode 168: In this episode of Critical Thinking - Bug Bounty Podcast we’re getting a visit from the XSS Doctor. Jonathan joins us to go through his Client-side workflow, run labs, and diagnose some bugs live.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today’s Guest: https://x.com/xssdoctor</span></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="color: rgb(13, 13, 13);">The Dot-Dot-Slash That Frameworks Hand You: CSPT Across Every Major Frontend Framework</span></p><p><span style="color: rgb(13, 13, 13);">https://lab.ctbb.show/research/the-dot-dot-slash-that-frameworks-hand-you</span></p><p><br></p><p><span style="background-color: transparent;">URL validation bypass cheat sheet</span></p><p><a href="https://portswigger.net/web-security/ssrf/url-validation-bypass-cheat-sheet" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://portswigger.net/web-security/ssrf/url-validation-bypass-cheat-sheet</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:01:37) Home Automation AI Hack &amp; E-signature bug stories</span></p><p><span style="background-color: transparent;">(00:12:15) E-signature bug</span></p><p><span style="background-color: transparent;">(00:17:01) XSS DR Intro and Bug Bounty Journey</span></p><p><span style="background-color: transparent;">(00:31:51) CSPT Workflows</span></p><p><span style="background-color: transparent;">(01:07:57) Wildcard Path Parameters&nbsp;</span></p><p><span style="background-color: transparent;">(01:30:34) Custom Sinks</span></p>]]></description>
  <embed_id>60df7b74-bfa1-41e7-b6f2-5922aab7f287</embed_id>
  <pubDate>Thu, 02 Apr 2026 05:00:00 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))]]></author>
  <enclosure length="92081977" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/130ca433-aeed-4bbb-a828-0d1a024882ea/episode.mp3" />
  <itunes:title><![CDATA[Episode 168: XSSDoctor - Client-side Path Traversal Research]]></itunes:title>
  <itunes:duration>1:35:55</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Episode 168: In this episode of Critical Thinking - Bug Bounty Podcast we’re getting a visit from the XSS Doctor. Jonathan joins us to go through his Client-side workflow, run labs, and diagnose some bugs live.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today’s Guest: https://x.com/xssdoctor</span></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="color: rgb(13, 13, 13);">The Dot-Dot-Slash That Frameworks Hand You: CSPT Across Every Major Frontend Framework</span></p><p><span style="color: rgb(13, 13, 13);">https://lab.ctbb.show/research/the-dot-dot-slash-that-frameworks-hand-you</span></p><p><br></p><p><span style="background-color: transparent;">URL validation bypass cheat sheet</span></p><p><a href="https://portswigger.net/web-security/ssrf/url-validation-bypass-cheat-sheet" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://portswigger.net/web-security/ssrf/url-validation-bypass-cheat-sheet</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:01:37) Home Automation AI Hack &amp; E-signature bug stories</span></p><p><span style="background-color: transparent;">(00:12:15) E-signature bug</span></p><p><span style="background-color: transparent;">(00:17:01) XSS DR Intro and Bug Bounty Journey</span></p><p><span style="background-color: transparent;">(00:31:51) CSPT Workflows</span></p><p><span style="background-color: transparent;">(01:07:57) Wildcard Path Parameters&nbsp;</span></p><p><span style="background-color: transparent;">(01:30:34) Custom Sinks</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Episode 168: In this episode of Critical Thinking - Bug Bounty Podcast we’re getting a visit from the XSS Doctor. Jonathan joins us to go through his Client-side workflow, run labs, and diagnose some bugs live.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today’s Guest: https://x.com/xssdoctor</span></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="color: rgb(13, 13, 13);">The Dot-Dot-Slash That Frameworks Hand You: CSPT Across Every Major Frontend Framework</span></p><p><span style="color: rgb(13, 13, 13);">https://lab.ctbb.show/research/the-dot-dot-slash-that-frameworks-hand-you</span></p><p><br></p><p><span style="background-color: transparent;">URL validation bypass cheat sheet</span></p><p><a href="https://portswigger.net/web-security/ssrf/url-validation-bypass-cheat-sheet" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://portswigger.net/web-security/ssrf/url-validation-bypass-cheat-sheet</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:01:37) Home Automation AI Hack &amp; E-signature bug stories</span></p><p><span style="background-color: transparent;">(00:12:15) E-signature bug</span></p><p><span style="background-color: transparent;">(00:17:01) XSS DR Intro and Bug Bounty Journey</span></p><p><span style="background-color: transparent;">(00:31:51) CSPT Workflows</span></p><p><span style="background-color: transparent;">(01:07:57) Wildcard Path Parameters&nbsp;</span></p><p><span style="background-color: transparent;">(01:30:34) Custom Sinks</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 168: In this episode of Critical Thinking - Bug Bounty Podcast we’re getting a visit from the XSS Doctor. Jonathan joins us to go through his Client-side workflow, run labs, and diagnose some bugs live.Follow us on twitter at: https://x.com...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>true</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>168</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">df823052-6e85-42ac-9644-606bbbfb63ea</guid>
  <title><![CDATA[Episode 167: Stealing Bugs with Valeriy Shevchenko]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Episode 167: In this episode of Critical Thinking - Bug Bounty Podcast we welcome Valeriy Shevchenko to talk about program management, anchor programs, and Theft in Bug Bounty.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Check out ThreatLocker Ringfencing</span></p><p><a href="https://www.criticalthinkingpodcast.io/tl-rf" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.criticalthinkingpodcast.io/tl-rf</a></p><p><br></p><p><span style="background-color: transparent;">Today’s Guest: </span><a href="https://x.com/Krevetk0Valeriy" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Krevetk0Valeriy</a></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">HackerOne’s Bug Bounty Maturity Framework:</span></p><p><a href="https://www.hackerone.com/blog/program-maturity-framework-bug-bounty-operations" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/blog/program-maturity-framework-bug-bounty-operations</a></p><p><br></p><p><span style="background-color: transparent;">Intigriti is hiring a Product Security Analyst</span></p><p><a href="https://jobs.criticalthinkingpodcast.io/jobs/product-security-analyst-25ef4706" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://jobs.criticalthinkingpodcast.io/jobs/product-security-analyst-25ef4706</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">Valeriy’s Blog</span></p><p><a href="https://krevetk0.medium.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://krevetk0.medium.com/</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:03:15) Valeriy's Bug story</span></p><p><span style="background-color: transparent;">(00:19:48) Anchor Programs and Bug Hunting Motivation</span></p><p><span style="background-color: transparent;">(00:29:50) Stealing Bugs</span></p>]]></description>
  <embed_id>a2309d1e-e591-404c-aa8b-e339434d9230</embed_id>
  <pubDate>Thu, 26 Mar 2026 05:00:00 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))]]></author>
  <enclosure length="49602278" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/083ad298-cd34-48ab-923d-ec3929f0e6d3/episode.mp3" />
  <itunes:title><![CDATA[Episode 167: Stealing Bugs with Valeriy Shevchenko]]></itunes:title>
  <itunes:duration>51:40</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Episode 167: In this episode of Critical Thinking - Bug Bounty Podcast we welcome Valeriy Shevchenko to talk about program management, anchor programs, and Theft in Bug Bounty.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Check out ThreatLocker Ringfencing</span></p><p><a href="https://www.criticalthinkingpodcast.io/tl-rf" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.criticalthinkingpodcast.io/tl-rf</a></p><p><br></p><p><span style="background-color: transparent;">Today’s Guest: </span><a href="https://x.com/Krevetk0Valeriy" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Krevetk0Valeriy</a></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">HackerOne’s Bug Bounty Maturity Framework:</span></p><p><a href="https://www.hackerone.com/blog/program-maturity-framework-bug-bounty-operations" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/blog/program-maturity-framework-bug-bounty-operations</a></p><p><br></p><p><span style="background-color: transparent;">Intigriti is hiring a Product Security Analyst</span></p><p><a href="https://jobs.criticalthinkingpodcast.io/jobs/product-security-analyst-25ef4706" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://jobs.criticalthinkingpodcast.io/jobs/product-security-analyst-25ef4706</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">Valeriy’s Blog</span></p><p><a href="https://krevetk0.medium.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://krevetk0.medium.com/</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:03:15) Valeriy's Bug story</span></p><p><span style="background-color: transparent;">(00:19:48) Anchor Programs and Bug Hunting Motivation</span></p><p><span style="background-color: transparent;">(00:29:50) Stealing Bugs</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Episode 167: In this episode of Critical Thinking - Bug Bounty Podcast we welcome Valeriy Shevchenko to talk about program management, anchor programs, and Theft in Bug Bounty.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Check out ThreatLocker Ringfencing</span></p><p><a href="https://www.criticalthinkingpodcast.io/tl-rf" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.criticalthinkingpodcast.io/tl-rf</a></p><p><br></p><p><span style="background-color: transparent;">Today’s Guest: </span><a href="https://x.com/Krevetk0Valeriy" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Krevetk0Valeriy</a></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">HackerOne’s Bug Bounty Maturity Framework:</span></p><p><a href="https://www.hackerone.com/blog/program-maturity-framework-bug-bounty-operations" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/blog/program-maturity-framework-bug-bounty-operations</a></p><p><br></p><p><span style="background-color: transparent;">Intigriti is hiring a Product Security Analyst</span></p><p><a href="https://jobs.criticalthinkingpodcast.io/jobs/product-security-analyst-25ef4706" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://jobs.criticalthinkingpodcast.io/jobs/product-security-analyst-25ef4706</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">Valeriy’s Blog</span></p><p><a href="https://krevetk0.medium.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://krevetk0.medium.com/</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:03:15) Valeriy's Bug story</span></p><p><span style="background-color: transparent;">(00:19:48) Anchor Programs and Bug Hunting Motivation</span></p><p><span style="background-color: transparent;">(00:29:50) Stealing Bugs</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 167: In this episode of Critical Thinking - Bug Bounty Podcast we welcome Valeriy Shevchenko to talk about program management, anchor programs, and Theft in Bug Bounty.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and sugg...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>true</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>167</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">575e5ddf-6a8a-4d65-9e12-596e136536a2</guid>
  <title><![CDATA[Episode 166: Rez0’s Top Claude Skill Secrets ]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Episode 166: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Rez0’s Claude Skill Secrets, when AI Generated reports fall apart, and agents vs filters.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today’s Sponsor: Adobe</span></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">Intigriti launched their ambassadors program. </span><a href="https://www.intigriti.com/ambassador" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.intigriti.com/ambassador</a></p><p><br></p><p><span style="background-color: transparent;">Adobe will be at Hack The Bay</span></p><p><a href="https://www.hackthebay.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackthebay.org/</a></p><p><br></p><p><span style="background-color: transparent;">Bug Bounty Maturity Framework</span></p><p><a href="https://bugbountymaturity.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://bugbountymaturity.com/</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">h1-brain</span></p><p><a href="https://github.com/PatrikFehrenbach/h1-brain" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/PatrikFehrenbach/h1-brain</a></p><p><br></p><p><span style="background-color: transparent;">caido skills</span></p><p><a href="http://github.com/caido/skills" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">http://github.com/caido/skills</a></p><p><br></p><p><span style="background-color: transparent;">Tweet from Karpathy</span></p><p><a href="https://x.com/karpathy/status/2031767720933634100?s=20" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/karpathy/status/2031767720933634100?s=20</a></p><p><br></p><p><span style="background-color: transparent;">Find every inefficiency in your Claude workflow with one prompt</span></p><p><a href="https://x.com/shannholmberg/status/2030605364421595468" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/shannholmberg/status/2030605364421595468</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:08:28) Claude skills</span></p><p><span style="background-color: transparent;">(00:30:00) How AI Generated reports fall apart</span></p><p><span style="background-color: transparent;">(00:38:44) Orchestration</span></p><p><span style="background-color: transparent;">(00:49:10) Agents vs Folders</span></p>]]></description>
  <embed_id>c7193cb2-b21e-4a40-a1d1-00f7b73c247e</embed_id>
  <pubDate>Thu, 19 Mar 2026 05:00:00 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))]]></author>
  <enclosure length="50913842" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/724a6c34-f1a2-4a5e-a7c5-aef330ae7c27/episode.mp3?v=b7dbc57347" />
  <itunes:title><![CDATA[Episode 166: Rez0’s Top Claude Skill Secrets ]]></itunes:title>
  <itunes:duration>53:02</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Episode 166: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Rez0’s Claude Skill Secrets, when AI Generated reports fall apart, and agents vs filters.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today’s Sponsor: Adobe</span></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">Intigriti launched their ambassadors program. </span><a href="https://www.intigriti.com/ambassador" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.intigriti.com/ambassador</a></p><p><br></p><p><span style="background-color: transparent;">Adobe will be at Hack The Bay</span></p><p><a href="https://www.hackthebay.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackthebay.org/</a></p><p><br></p><p><span style="background-color: transparent;">Bug Bounty Maturity Framework</span></p><p><a href="https://bugbountymaturity.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://bugbountymaturity.com/</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">h1-brain</span></p><p><a href="https://github.com/PatrikFehrenbach/h1-brain" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/PatrikFehrenbach/h1-brain</a></p><p><br></p><p><span style="background-color: transparent;">caido skills</span></p><p><a href="http://github.com/caido/skills" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">http://github.com/caido/skills</a></p><p><br></p><p><span style="background-color: transparent;">Tweet from Karpathy</span></p><p><a href="https://x.com/karpathy/status/2031767720933634100?s=20" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/karpathy/status/2031767720933634100?s=20</a></p><p><br></p><p><span style="background-color: transparent;">Find every inefficiency in your Claude workflow with one prompt</span></p><p><a href="https://x.com/shannholmberg/status/2030605364421595468" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/shannholmberg/status/2030605364421595468</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:08:28) Claude skills</span></p><p><span style="background-color: transparent;">(00:30:00) How AI Generated reports fall apart</span></p><p><span style="background-color: transparent;">(00:38:44) Orchestration</span></p><p><span style="background-color: transparent;">(00:49:10) Agents vs Folders</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Episode 166: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Rez0’s Claude Skill Secrets, when AI Generated reports fall apart, and agents vs filters.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today’s Sponsor: Adobe</span></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">Intigriti launched their ambassadors program. </span><a href="https://www.intigriti.com/ambassador" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.intigriti.com/ambassador</a></p><p><br></p><p><span style="background-color: transparent;">Adobe will be at Hack The Bay</span></p><p><a href="https://www.hackthebay.org/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackthebay.org/</a></p><p><br></p><p><span style="background-color: transparent;">Bug Bounty Maturity Framework</span></p><p><a href="https://bugbountymaturity.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://bugbountymaturity.com/</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">h1-brain</span></p><p><a href="https://github.com/PatrikFehrenbach/h1-brain" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/PatrikFehrenbach/h1-brain</a></p><p><br></p><p><span style="background-color: transparent;">caido skills</span></p><p><a href="http://github.com/caido/skills" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">http://github.com/caido/skills</a></p><p><br></p><p><span style="background-color: transparent;">Tweet from Karpathy</span></p><p><a href="https://x.com/karpathy/status/2031767720933634100?s=20" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/karpathy/status/2031767720933634100?s=20</a></p><p><br></p><p><span style="background-color: transparent;">Find every inefficiency in your Claude workflow with one prompt</span></p><p><a href="https://x.com/shannholmberg/status/2030605364421595468" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/shannholmberg/status/2030605364421595468</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:08:28) Claude skills</span></p><p><span style="background-color: transparent;">(00:30:00) How AI Generated reports fall apart</span></p><p><span style="background-color: transparent;">(00:38:44) Orchestration</span></p><p><span style="background-color: transparent;">(00:49:10) Agents vs Folders</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 166: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Rez0’s Claude Skill Secrets, when AI Generated reports fall apart, and agents vs filters.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and sugges...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>true</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>166</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">176916d3-7adf-44de-a082-c085764f9f5a</guid>
  <title><![CDATA[Episode 165: Protobuf Hacking, AI-Powered Bug Hunting, and Self-Improving Claude Workflows]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Episode 165: In this episode of Critical Thinking - Bug Bounty Podcast Justin recaps his Zero Trust World experience, before we dive into Permissions issues client-side bugs, New Hardware Hacking Classes, and using AI to hack.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Check out ThreatLocker Ringfencing</span></p><p><a href="https://www.criticalthinkingpodcast.io/tl-rf" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.criticalthinkingpodcast.io/tl-rf</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">bbscope Update</span></p><p><a href="https://x.com/sw33tLie/status/2029344643154919720" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/sw33tLie/status/2029344643154919720</a></p><p><br></p><p><span style="background-color: transparent;">Matt Brown's Youtube Channel</span></p><p><a href="https://www.youtube.com/channel/UC3VDCeZYZH7mCihtMVHqppw" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/channel/UC3VDCeZYZH7mCihtMVHqppw</a></p><p><br></p><p><span style="background-color: transparent;">Matt's Twitter:</span></p><p><a href="https://x.com/nmatt0" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/nmatt0</a></p><p><br></p><p><span style="background-color: transparent;">MCP server for HackerOne to search reports</span></p><p><a href="https://x.com/OriginalSicksec/status/2029503063095124461?s=20" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/OriginalSicksec/status/2029503063095124461?s=20</a></p><p><br></p><p><span style="background-color: transparent;">Caido Skills</span></p><p><a href="https://github.com/caido/skills" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/caido/skills</a></p><p><br></p><p><span style="background-color: transparent;">The Agentic Hacking Era: Ramblings and a Tool</span></p><p><a href="https://josephthacker.com/hacking/2026/03/06/the-agentic-hacking-era.html" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://josephthacker.com/hacking/2026/03/06/the-agentic-hacking-era.html</a></p><p><br></p><p><span style="background-color: transparent;">Announcing AI-driven Caido</span></p><p><a href="https://caido.io/blog/2026-03-06-caido-skill" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://caido.io/blog/2026-03-06-caido-skill</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:06:23) bbscope report dumping &amp; Matt Brown Training</span></p><p><span style="background-color: transparent;">(00:13:10) MCP server for HackerOne to search reports &amp; protobuff success</span></p><p><span style="background-color: transparent;">(00:24:24) Hacking Mics with Permissions issues client-side bugs</span></p><p><span style="background-color: transparent;">(00:27:26) Can AI Hack things?</span></p>]]></description>
  <embed_id>5f337568-b752-4a3a-9a57-55ed7a219f3e</embed_id>
  <pubDate>Thu, 12 Mar 2026 05:00:00 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))]]></author>
  <enclosure length="42610239" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/22b949ec-b098-41d6-b115-8374389a56a7/episode.mp3?v=198ecc54df" />
  <itunes:title><![CDATA[Episode 165: Protobuf Hacking, AI-Powered Bug Hunting, and Self-Improving Claude Workflows]]></itunes:title>
  <itunes:duration>44:23</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Episode 165: In this episode of Critical Thinking - Bug Bounty Podcast Justin recaps his Zero Trust World experience, before we dive into Permissions issues client-side bugs, New Hardware Hacking Classes, and using AI to hack.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Check out ThreatLocker Ringfencing</span></p><p><a href="https://www.criticalthinkingpodcast.io/tl-rf" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.criticalthinkingpodcast.io/tl-rf</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">bbscope Update</span></p><p><a href="https://x.com/sw33tLie/status/2029344643154919720" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/sw33tLie/status/2029344643154919720</a></p><p><br></p><p><span style="background-color: transparent;">Matt Brown's Youtube Channel</span></p><p><a href="https://www.youtube.com/channel/UC3VDCeZYZH7mCihtMVHqppw" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/channel/UC3VDCeZYZH7mCihtMVHqppw</a></p><p><br></p><p><span style="background-color: transparent;">Matt's Twitter:</span></p><p><a href="https://x.com/nmatt0" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/nmatt0</a></p><p><br></p><p><span style="background-color: transparent;">MCP server for HackerOne to search reports</span></p><p><a href="https://x.com/OriginalSicksec/status/2029503063095124461?s=20" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/OriginalSicksec/status/2029503063095124461?s=20</a></p><p><br></p><p><span style="background-color: transparent;">Caido Skills</span></p><p><a href="https://github.com/caido/skills" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/caido/skills</a></p><p><br></p><p><span style="background-color: transparent;">The Agentic Hacking Era: Ramblings and a Tool</span></p><p><a href="https://josephthacker.com/hacking/2026/03/06/the-agentic-hacking-era.html" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://josephthacker.com/hacking/2026/03/06/the-agentic-hacking-era.html</a></p><p><br></p><p><span style="background-color: transparent;">Announcing AI-driven Caido</span></p><p><a href="https://caido.io/blog/2026-03-06-caido-skill" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://caido.io/blog/2026-03-06-caido-skill</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:06:23) bbscope report dumping &amp; Matt Brown Training</span></p><p><span style="background-color: transparent;">(00:13:10) MCP server for HackerOne to search reports &amp; protobuff success</span></p><p><span style="background-color: transparent;">(00:24:24) Hacking Mics with Permissions issues client-side bugs</span></p><p><span style="background-color: transparent;">(00:27:26) Can AI Hack things?</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Episode 165: In this episode of Critical Thinking - Bug Bounty Podcast Justin recaps his Zero Trust World experience, before we dive into Permissions issues client-side bugs, New Hardware Hacking Classes, and using AI to hack.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Check out ThreatLocker Ringfencing</span></p><p><a href="https://www.criticalthinkingpodcast.io/tl-rf" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.criticalthinkingpodcast.io/tl-rf</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">bbscope Update</span></p><p><a href="https://x.com/sw33tLie/status/2029344643154919720" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/sw33tLie/status/2029344643154919720</a></p><p><br></p><p><span style="background-color: transparent;">Matt Brown's Youtube Channel</span></p><p><a href="https://www.youtube.com/channel/UC3VDCeZYZH7mCihtMVHqppw" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/channel/UC3VDCeZYZH7mCihtMVHqppw</a></p><p><br></p><p><span style="background-color: transparent;">Matt's Twitter:</span></p><p><a href="https://x.com/nmatt0" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/nmatt0</a></p><p><br></p><p><span style="background-color: transparent;">MCP server for HackerOne to search reports</span></p><p><a href="https://x.com/OriginalSicksec/status/2029503063095124461?s=20" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/OriginalSicksec/status/2029503063095124461?s=20</a></p><p><br></p><p><span style="background-color: transparent;">Caido Skills</span></p><p><a href="https://github.com/caido/skills" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/caido/skills</a></p><p><br></p><p><span style="background-color: transparent;">The Agentic Hacking Era: Ramblings and a Tool</span></p><p><a href="https://josephthacker.com/hacking/2026/03/06/the-agentic-hacking-era.html" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://josephthacker.com/hacking/2026/03/06/the-agentic-hacking-era.html</a></p><p><br></p><p><span style="background-color: transparent;">Announcing AI-driven Caido</span></p><p><a href="https://caido.io/blog/2026-03-06-caido-skill" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://caido.io/blog/2026-03-06-caido-skill</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:06:23) bbscope report dumping &amp; Matt Brown Training</span></p><p><span style="background-color: transparent;">(00:13:10) MCP server for HackerOne to search reports &amp; protobuff success</span></p><p><span style="background-color: transparent;">(00:24:24) Hacking Mics with Permissions issues client-side bugs</span></p><p><span style="background-color: transparent;">(00:27:26) Can AI Hack things?</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 165: In this episode of Critical Thinking - Bug Bounty Podcast Justin recaps his Zero Trust World experience, before we dive into Permissions issues client-side bugs, New Hardware Hacking Classes, and using AI to hack.Follow us on twitter a...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>true</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>165</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">d7e6a2a8-9cc7-45a8-b629-bda1a1ef632d</guid>
  <title><![CDATA[Episode 164: Tommy DeVoss: From Black Hat to Bug Bounty LEGEND]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Episode 164: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Tommy DeVoss to talk about his origin story, Yahoo bugs, and how Tommy first got Justin into Bug Bounty</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today’s Guest: </span><a href="https://x.com/thedawgyg" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/thedawgyg</a></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">Python pitfalls: Turning developer mistakes into vulnerabilities</span></p><p><a href="https://www.yeswehack.com/learn-bug-bounty/python-pitfalls-turning-developer-mistakes?utm_source=critical-thinking&amp;utm_medium=sponsored&amp;utm_campaign=article-research-python-pitfalls" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.yeswehack.com/learn-bug-bounty/python-pitfalls-turning-developer-mistakes?utm_source=critical-thinking&amp;utm_medium=sponsored&amp;utm_campaign=article-research-python-pitfalls</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:06:22) Yahoo SSRF</span></p><p><span style="background-color: transparent;">(00:14:56) Tommy's Origin</span></p><p><span style="background-color: transparent;">(00:44:10) Bug Bounty</span></p><p><span style="background-color: transparent;">(00:51:47) SSRF Attraction, AI implementation, &amp; Browser Hacking</span></p>]]></description>
  <embed_id>729c8928-eda7-4d4b-b0a8-aaa2aebb6743</embed_id>
  <pubDate>Thu, 05 Mar 2026 05:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))]]></author>
  <enclosure length="69058704" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/52cf935d-dedc-42f6-b0d3-5a041c1c991d/episode.mp3" />
  <itunes:title><![CDATA[Episode 164: Tommy DeVoss: From Black Hat to Bug Bounty LEGEND]]></itunes:title>
  <itunes:duration>1:11:56</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Episode 164: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Tommy DeVoss to talk about his origin story, Yahoo bugs, and how Tommy first got Justin into Bug Bounty</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today’s Guest: </span><a href="https://x.com/thedawgyg" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/thedawgyg</a></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">Python pitfalls: Turning developer mistakes into vulnerabilities</span></p><p><a href="https://www.yeswehack.com/learn-bug-bounty/python-pitfalls-turning-developer-mistakes?utm_source=critical-thinking&amp;utm_medium=sponsored&amp;utm_campaign=article-research-python-pitfalls" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.yeswehack.com/learn-bug-bounty/python-pitfalls-turning-developer-mistakes?utm_source=critical-thinking&amp;utm_medium=sponsored&amp;utm_campaign=article-research-python-pitfalls</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:06:22) Yahoo SSRF</span></p><p><span style="background-color: transparent;">(00:14:56) Tommy's Origin</span></p><p><span style="background-color: transparent;">(00:44:10) Bug Bounty</span></p><p><span style="background-color: transparent;">(00:51:47) SSRF Attraction, AI implementation, &amp; Browser Hacking</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Episode 164: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Tommy DeVoss to talk about his origin story, Yahoo bugs, and how Tommy first got Justin into Bug Bounty</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today’s Guest: </span><a href="https://x.com/thedawgyg" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/thedawgyg</a></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">Python pitfalls: Turning developer mistakes into vulnerabilities</span></p><p><a href="https://www.yeswehack.com/learn-bug-bounty/python-pitfalls-turning-developer-mistakes?utm_source=critical-thinking&amp;utm_medium=sponsored&amp;utm_campaign=article-research-python-pitfalls" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.yeswehack.com/learn-bug-bounty/python-pitfalls-turning-developer-mistakes?utm_source=critical-thinking&amp;utm_medium=sponsored&amp;utm_campaign=article-research-python-pitfalls</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:06:22) Yahoo SSRF</span></p><p><span style="background-color: transparent;">(00:14:56) Tommy's Origin</span></p><p><span style="background-color: transparent;">(00:44:10) Bug Bounty</span></p><p><span style="background-color: transparent;">(00:51:47) SSRF Attraction, AI implementation, &amp; Browser Hacking</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 164: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Tommy DeVoss to talk about his origin story, Yahoo bugs, and how Tommy first got Justin into Bug BountyFollow us on twitter at: https://x.com/ctbbpodcastGo...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>true</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>164</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">d1d17969-b3ab-474a-b7ec-c287df5aa85e</guid>
  <title><![CDATA[Episode 163: Best Technical Takeaways from Portswigger Top 10 2025]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Episode 163: In this episode of Critical Thinking - Bug Bounty Podcast It’s that time of year again! We’re looking at the Portswigger Research list of top 10 web hacking techniques of 2025.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">Parser Differentials: When Interpretation Becomes a Vulnerability</span></p><p><a href="https://www.youtube.com/watch?v=Dq_KVLXzxH8" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/watch?v=Dq_KVLXzxH8</a></p><p><br></p><p><span style="background-color: transparent;">XSS-Leak: Leaking Cross-Origin Redirects</span></p><p><a href="https://blog.babelo.xyz/posts/cross-site-subdomain-leak/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.babelo.xyz/posts/cross-site-subdomain-leak/</a></p><p><br></p><p><span style="background-color: transparent;">Playing with HTTP/2 CONNECT</span></p><p><a href="https://blog.flomb.net/posts/http2connect/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.flomb.net/posts/http2connect/</a></p><p><br></p><p><span style="background-color: transparent;">Next.js, cache, and chains: the stale elixir</span></p><p><a href="https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir</a></p><p><br></p><p><span style="background-color: transparent;">SOAPwn: Pwning .NET Framework Apps Through HTTP Client Proxies And WSDL</span></p><p><a href="https://watchtowr.com/wp-content/uploads/SOAPwnwatchtowr_soappwn-research-whitepaper_10-12-2025.pdf" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://watchtowr.com/wp-content/uploads/SOAPwnwatchtowr_soappwn-research-whitepaper_10-12-2025.pdf</a></p><p><br></p><p><span style="background-color: transparent;">Cross-Site ETag Length Leak</span></p><p><a href="https://blog.arkark.dev/2025/12/26/etag-length-leak" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.arkark.dev/2025/12/26/etag-length-leak</a></p><p><br></p><p><span style="background-color: transparent;">Lost in Translation: Exploiting Unicode Normalization</span></p><p><a href="https://www.youtube.com/watch?v=ETB2w-f3pM4" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/watch?v=ETB2w-f3pM4</a></p><p><br></p><p><span style="background-color: transparent;">ORM Leaking More Than You Joined For</span></p><p><a href="https://www.elttam.com/blog/leaking-more-than-you-joined-for/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.elttam.com/blog/leaking-more-than-you-joined-for/</a></p><p><br></p><p><span style="background-color: transparent;">Novel SSRF Technique Involving HTTP Redirect Loops</span></p><p><a href="https://slcyber.io/research-center/novel-ssrf-technique-involving-http-redirect-loops/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://slcyber.io/research-center/novel-ssrf-technique-involving-http-redirect-loops/</a></p><p><br></p><p><span style="background-color: transparent;">Successful Errors: New Code Injection and SSTI Techniques</span></p><p><a href="https://github.com/vladko312/Research_Successful_Errors" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/vladko312/Research_Successful_Errors</a></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:02:33) Parser Differentials: When Interpretation Becomes a Vulnerability</span></p><p><span style="background-color: transparent;">(00:11:02) XSS-Leak: Leaking Cross-Origin Redirects</span></p><p><span style="background-color: transparent;">(00:18:25) Playing with HTTP/2 CONNECT</span></p><p><span style="background-color: transparent;">(00:22:10) Next.js, cache, and chains: the stale elixir</span></p><p><span style="background-color: transparent;">(00:29:15) SOAPwn: Pwning .NET Framework Apps Through HTTP Client Proxies And WSDL</span></p><p><span style="background-color: transparent;">(00:34:27) Cross-Site ETag Length Leak</span></p><p><span style="background-color: transparent;">(00:41:47) Lost in Translation: Exploiting Unicode Normalization</span></p><p><span style="background-color: transparent;">(00:47:27) ORM Leaking More Than You Joined For</span></p><p><span style="background-color: transparent;">(00:54:07) Novel SSRF Technique Involving HTTP Redirect Loops</span></p><p><span style="background-color: transparent;">(00:58:40) Successful Errors: New Code Injection and SSTI Techniques</span></p>]]></description>
  <embed_id>bfd04cc0-5f94-4b75-8910-aa9525ce4600</embed_id>
  <pubDate>Thu, 26 Feb 2026 05:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))]]></author>
  <enclosure length="65650245" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/37070408-7a44-42f4-9513-dfc0bbf5294b/episode.mp3" />
  <itunes:title><![CDATA[Episode 163: Best Technical Takeaways from Portswigger Top 10 2025]]></itunes:title>
  <itunes:duration>1:08:23</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Episode 163: In this episode of Critical Thinking - Bug Bounty Podcast It’s that time of year again! We’re looking at the Portswigger Research list of top 10 web hacking techniques of 2025.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">Parser Differentials: When Interpretation Becomes a Vulnerability</span></p><p><a href="https://www.youtube.com/watch?v=Dq_KVLXzxH8" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/watch?v=Dq_KVLXzxH8</a></p><p><br></p><p><span style="background-color: transparent;">XSS-Leak: Leaking Cross-Origin Redirects</span></p><p><a href="https://blog.babelo.xyz/posts/cross-site-subdomain-leak/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.babelo.xyz/posts/cross-site-subdomain-leak/</a></p><p><br></p><p><span style="background-color: transparent;">Playing with HTTP/2 CONNECT</span></p><p><a href="https://blog.flomb.net/posts/http2connect/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.flomb.net/posts/http2connect/</a></p><p><br></p><p><span style="background-color: transparent;">Next.js, cache, and chains: the stale elixir</span></p><p><a href="https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir</a></p><p><br></p><p><span style="background-color: transparent;">SOAPwn: Pwning .NET Framework Apps Through HTTP Client Proxies And WSDL</span></p><p><a href="https://watchtowr.com/wp-content/uploads/SOAPwnwatchtowr_soappwn-research-whitepaper_10-12-2025.pdf" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://watchtowr.com/wp-content/uploads/SOAPwnwatchtowr_soappwn-research-whitepaper_10-12-2025.pdf</a></p><p><br></p><p><span style="background-color: transparent;">Cross-Site ETag Length Leak</span></p><p><a href="https://blog.arkark.dev/2025/12/26/etag-length-leak" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.arkark.dev/2025/12/26/etag-length-leak</a></p><p><br></p><p><span style="background-color: transparent;">Lost in Translation: Exploiting Unicode Normalization</span></p><p><a href="https://www.youtube.com/watch?v=ETB2w-f3pM4" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/watch?v=ETB2w-f3pM4</a></p><p><br></p><p><span style="background-color: transparent;">ORM Leaking More Than You Joined For</span></p><p><a href="https://www.elttam.com/blog/leaking-more-than-you-joined-for/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.elttam.com/blog/leaking-more-than-you-joined-for/</a></p><p><br></p><p><span style="background-color: transparent;">Novel SSRF Technique Involving HTTP Redirect Loops</span></p><p><a href="https://slcyber.io/research-center/novel-ssrf-technique-involving-http-redirect-loops/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://slcyber.io/research-center/novel-ssrf-technique-involving-http-redirect-loops/</a></p><p><br></p><p><span style="background-color: transparent;">Successful Errors: New Code Injection and SSTI Techniques</span></p><p><a href="https://github.com/vladko312/Research_Successful_Errors" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/vladko312/Research_Successful_Errors</a></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:02:33) Parser Differentials: When Interpretation Becomes a Vulnerability</span></p><p><span style="background-color: transparent;">(00:11:02) XSS-Leak: Leaking Cross-Origin Redirects</span></p><p><span style="background-color: transparent;">(00:18:25) Playing with HTTP/2 CONNECT</span></p><p><span style="background-color: transparent;">(00:22:10) Next.js, cache, and chains: the stale elixir</span></p><p><span style="background-color: transparent;">(00:29:15) SOAPwn: Pwning .NET Framework Apps Through HTTP Client Proxies And WSDL</span></p><p><span style="background-color: transparent;">(00:34:27) Cross-Site ETag Length Leak</span></p><p><span style="background-color: transparent;">(00:41:47) Lost in Translation: Exploiting Unicode Normalization</span></p><p><span style="background-color: transparent;">(00:47:27) ORM Leaking More Than You Joined For</span></p><p><span style="background-color: transparent;">(00:54:07) Novel SSRF Technique Involving HTTP Redirect Loops</span></p><p><span style="background-color: transparent;">(00:58:40) Successful Errors: New Code Injection and SSTI Techniques</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Episode 163: In this episode of Critical Thinking - Bug Bounty Podcast It’s that time of year again! We’re looking at the Portswigger Research list of top 10 web hacking techniques of 2025.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">Parser Differentials: When Interpretation Becomes a Vulnerability</span></p><p><a href="https://www.youtube.com/watch?v=Dq_KVLXzxH8" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/watch?v=Dq_KVLXzxH8</a></p><p><br></p><p><span style="background-color: transparent;">XSS-Leak: Leaking Cross-Origin Redirects</span></p><p><a href="https://blog.babelo.xyz/posts/cross-site-subdomain-leak/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.babelo.xyz/posts/cross-site-subdomain-leak/</a></p><p><br></p><p><span style="background-color: transparent;">Playing with HTTP/2 CONNECT</span></p><p><a href="https://blog.flomb.net/posts/http2connect/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.flomb.net/posts/http2connect/</a></p><p><br></p><p><span style="background-color: transparent;">Next.js, cache, and chains: the stale elixir</span></p><p><a href="https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir</a></p><p><br></p><p><span style="background-color: transparent;">SOAPwn: Pwning .NET Framework Apps Through HTTP Client Proxies And WSDL</span></p><p><a href="https://watchtowr.com/wp-content/uploads/SOAPwnwatchtowr_soappwn-research-whitepaper_10-12-2025.pdf" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://watchtowr.com/wp-content/uploads/SOAPwnwatchtowr_soappwn-research-whitepaper_10-12-2025.pdf</a></p><p><br></p><p><span style="background-color: transparent;">Cross-Site ETag Length Leak</span></p><p><a href="https://blog.arkark.dev/2025/12/26/etag-length-leak" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.arkark.dev/2025/12/26/etag-length-leak</a></p><p><br></p><p><span style="background-color: transparent;">Lost in Translation: Exploiting Unicode Normalization</span></p><p><a href="https://www.youtube.com/watch?v=ETB2w-f3pM4" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/watch?v=ETB2w-f3pM4</a></p><p><br></p><p><span style="background-color: transparent;">ORM Leaking More Than You Joined For</span></p><p><a href="https://www.elttam.com/blog/leaking-more-than-you-joined-for/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.elttam.com/blog/leaking-more-than-you-joined-for/</a></p><p><br></p><p><span style="background-color: transparent;">Novel SSRF Technique Involving HTTP Redirect Loops</span></p><p><a href="https://slcyber.io/research-center/novel-ssrf-technique-involving-http-redirect-loops/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://slcyber.io/research-center/novel-ssrf-technique-involving-http-redirect-loops/</a></p><p><br></p><p><span style="background-color: transparent;">Successful Errors: New Code Injection and SSTI Techniques</span></p><p><a href="https://github.com/vladko312/Research_Successful_Errors" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/vladko312/Research_Successful_Errors</a></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:02:33) Parser Differentials: When Interpretation Becomes a Vulnerability</span></p><p><span style="background-color: transparent;">(00:11:02) XSS-Leak: Leaking Cross-Origin Redirects</span></p><p><span style="background-color: transparent;">(00:18:25) Playing with HTTP/2 CONNECT</span></p><p><span style="background-color: transparent;">(00:22:10) Next.js, cache, and chains: the stale elixir</span></p><p><span style="background-color: transparent;">(00:29:15) SOAPwn: Pwning .NET Framework Apps Through HTTP Client Proxies And WSDL</span></p><p><span style="background-color: transparent;">(00:34:27) Cross-Site ETag Length Leak</span></p><p><span style="background-color: transparent;">(00:41:47) Lost in Translation: Exploiting Unicode Normalization</span></p><p><span style="background-color: transparent;">(00:47:27) ORM Leaking More Than You Joined For</span></p><p><span style="background-color: transparent;">(00:54:07) Novel SSRF Technique Involving HTTP Redirect Loops</span></p><p><span style="background-color: transparent;">(00:58:40) Successful Errors: New Code Injection and SSTI Techniques</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 163: In this episode of Critical Thinking - Bug Bounty Podcast It’s that time of year again! We’re looking at the Portswigger Research list of top 10 web hacking techniques of 2025.Follow us on twitter at: https://x.com/ctbbpodcastGot any i...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>true</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>163</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">66ee646b-0f50-40d5-96e5-34684ca56e5b</guid>
  <title><![CDATA[Episode 162: HackerOne Training AI on Bug Bounty Data?]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Episode 162: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph sit down with HackerOne </span>Founder &amp; CTO Alex Rice to discuss concerns of Using Hacker Data for AI and decreasing bounties.</p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code </span><strong style="background-color: transparent;">ZTWCTBB26</strong></p><p><a href="https://ztw.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ztw.com/</a></p><p><br></p><p><span style="background-color: transparent;">Today’s Guest: </span><a href="https://x.com/senorarroz" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/senorarroz</a></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">XML external entity: The ultimate Bug Bounty guide to exploiting XXE vulnerabilities</span></p><p><a href="https://www.yeswehack.com/learn-bug-bounty/xml-external-entity-guide-xxe?utm_source=Critical_Thinking&amp;utm_medium=Youtube&amp;utm_campaign=XXE_Critical_Thinking&amp;utm_id=XXE_CT" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.yeswehack.com/learn-bug-bounty/xml-external-entity-guide-xxe?utm_source=Critical_Thinking&amp;utm_medium=Youtube&amp;utm_campaign=XXE_Critical_Thinking&amp;utm_id=XXE_CT</a></p><p><br></p><p><span style="background-color: transparent;">Bug Bounty Maturity Framework</span></p><p><a href="https://bugbountymaturity.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://bugbountymaturity.com/</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">Confidential Information and Confidentiality Obligations</span></p><p><a href="https://www.hackerone.com/terms/general#:~:text=HackerOne%20may%20use%20Confidential%20Information%20to%20develop%20and/or%20improve%20its%20Services%20(for%20example%2C%20to%20identify%20trends%2C%20and%20to%20train%20AI%20models)%20provided%20such%20use%20does%20not%20result%20in%20disclosure%20of%20Confidential%20Information%20to%20unauthorized%20third%20parties" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/terms/general#:~:text=HackerOne%20may%20use%20Confidential%20Information%20to%20develop%20and/or%20improve%20its%20Services%20(for%20example%2C%20to%20identify%20trends%2C%20and%20to%20train%20AI%20models)%20provided%20such%20use%20does%20not%20result%20in%20disclosure%20of%20Confidential%20Information%20to%20unauthorized%20third%20parties</a></p><p><br></p><p><span style="background-color: transparent;">Ownership and Licenses</span></p><p><a href="https://www.hackerone.com/terms/community#:~:text=8.%20Ownership%20and%20Licenses" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/terms/community#:~:text=8.%20Ownership%20and%20Licenses</a></p><p><br></p><p><span style="background-color: transparent;">I argued with an AI regarding HackerOne using Hacker reports to train PtaaS</span></p><p><a href="https://bugbounty.forum/post/183ff0fc-eb9e-47f8-991d-c0aa5b0bba71" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://bugbounty.forum/post/183ff0fc-eb9e-47f8-991d-c0aa5b0bba71</a></p><p><br></p><p><span style="background-color: transparent;">HackerOne PTaaS (likely training their AI on private reports data)</span></p><p><a href="https://www.reddit.com/r/bugbounty/comments/1r5hixk/hackerone_ptaas_likely_training_their_ai_on/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.reddit.com/r/bugbounty/comments/1r5hixk/hackerone_ptaas_likely_training_their_ai_on/</a></p><p><br></p><p><span style="background-color: transparent;">What Makes Agentic PTaaS Different in Real Environments</span></p><p><a href="https://www.hackerone.com/blog/agentic-penetration-testing-as-a-service#:~:text=Our%20agents%20are,real%20enterprise%20constraints" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/blog/agentic-penetration-testing-as-a-service#:~:text=Our%20agents%20are,real%20enterprise%20constraints</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:08:44) HackerOne AI Terms of Service&nbsp;</span></p><p><span style="background-color: transparent;">(00:24:56) Agentic PTaaS</span></p><p><span style="background-color: transparent;">(00:38:09) Selling data</span></p><p><span style="background-color: transparent;">(00:43:49) Decrease in Bounties</span></p>]]></description>
  <embed_id>324f9f69-21e3-4d27-bec4-0cd7ed699a42</embed_id>
  <pubDate>Thu, 19 Feb 2026 05:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))]]></author>
  <enclosure length="51233991" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/587bd69a-4e67-4d03-84fc-f5bda13a3c9f/episode.mp3" />
  <itunes:title><![CDATA[Episode 162: HackerOne Training AI on Bug Bounty Data?]]></itunes:title>
  <itunes:duration>53:22</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Episode 162: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph sit down with HackerOne </span>Founder &amp; CTO Alex Rice to discuss concerns of Using Hacker Data for AI and decreasing bounties.</p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code </span><strong style="background-color: transparent;">ZTWCTBB26</strong></p><p><a href="https://ztw.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ztw.com/</a></p><p><br></p><p><span style="background-color: transparent;">Today’s Guest: </span><a href="https://x.com/senorarroz" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/senorarroz</a></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">XML external entity: The ultimate Bug Bounty guide to exploiting XXE vulnerabilities</span></p><p><a href="https://www.yeswehack.com/learn-bug-bounty/xml-external-entity-guide-xxe?utm_source=Critical_Thinking&amp;utm_medium=Youtube&amp;utm_campaign=XXE_Critical_Thinking&amp;utm_id=XXE_CT" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.yeswehack.com/learn-bug-bounty/xml-external-entity-guide-xxe?utm_source=Critical_Thinking&amp;utm_medium=Youtube&amp;utm_campaign=XXE_Critical_Thinking&amp;utm_id=XXE_CT</a></p><p><br></p><p><span style="background-color: transparent;">Bug Bounty Maturity Framework</span></p><p><a href="https://bugbountymaturity.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://bugbountymaturity.com/</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">Confidential Information and Confidentiality Obligations</span></p><p><a href="https://www.hackerone.com/terms/general#:~:text=HackerOne%20may%20use%20Confidential%20Information%20to%20develop%20and/or%20improve%20its%20Services%20(for%20example%2C%20to%20identify%20trends%2C%20and%20to%20train%20AI%20models)%20provided%20such%20use%20does%20not%20result%20in%20disclosure%20of%20Confidential%20Information%20to%20unauthorized%20third%20parties" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/terms/general#:~:text=HackerOne%20may%20use%20Confidential%20Information%20to%20develop%20and/or%20improve%20its%20Services%20(for%20example%2C%20to%20identify%20trends%2C%20and%20to%20train%20AI%20models)%20provided%20such%20use%20does%20not%20result%20in%20disclosure%20of%20Confidential%20Information%20to%20unauthorized%20third%20parties</a></p><p><br></p><p><span style="background-color: transparent;">Ownership and Licenses</span></p><p><a href="https://www.hackerone.com/terms/community#:~:text=8.%20Ownership%20and%20Licenses" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/terms/community#:~:text=8.%20Ownership%20and%20Licenses</a></p><p><br></p><p><span style="background-color: transparent;">I argued with an AI regarding HackerOne using Hacker reports to train PtaaS</span></p><p><a href="https://bugbounty.forum/post/183ff0fc-eb9e-47f8-991d-c0aa5b0bba71" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://bugbounty.forum/post/183ff0fc-eb9e-47f8-991d-c0aa5b0bba71</a></p><p><br></p><p><span style="background-color: transparent;">HackerOne PTaaS (likely training their AI on private reports data)</span></p><p><a href="https://www.reddit.com/r/bugbounty/comments/1r5hixk/hackerone_ptaas_likely_training_their_ai_on/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.reddit.com/r/bugbounty/comments/1r5hixk/hackerone_ptaas_likely_training_their_ai_on/</a></p><p><br></p><p><span style="background-color: transparent;">What Makes Agentic PTaaS Different in Real Environments</span></p><p><a href="https://www.hackerone.com/blog/agentic-penetration-testing-as-a-service#:~:text=Our%20agents%20are,real%20enterprise%20constraints" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/blog/agentic-penetration-testing-as-a-service#:~:text=Our%20agents%20are,real%20enterprise%20constraints</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:08:44) HackerOne AI Terms of Service&nbsp;</span></p><p><span style="background-color: transparent;">(00:24:56) Agentic PTaaS</span></p><p><span style="background-color: transparent;">(00:38:09) Selling data</span></p><p><span style="background-color: transparent;">(00:43:49) Decrease in Bounties</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Episode 162: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph sit down with HackerOne </span>Founder &amp; CTO Alex Rice to discuss concerns of Using Hacker Data for AI and decreasing bounties.</p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code </span><strong style="background-color: transparent;">ZTWCTBB26</strong></p><p><a href="https://ztw.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ztw.com/</a></p><p><br></p><p><span style="background-color: transparent;">Today’s Guest: </span><a href="https://x.com/senorarroz" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/senorarroz</a></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">XML external entity: The ultimate Bug Bounty guide to exploiting XXE vulnerabilities</span></p><p><a href="https://www.yeswehack.com/learn-bug-bounty/xml-external-entity-guide-xxe?utm_source=Critical_Thinking&amp;utm_medium=Youtube&amp;utm_campaign=XXE_Critical_Thinking&amp;utm_id=XXE_CT" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.yeswehack.com/learn-bug-bounty/xml-external-entity-guide-xxe?utm_source=Critical_Thinking&amp;utm_medium=Youtube&amp;utm_campaign=XXE_Critical_Thinking&amp;utm_id=XXE_CT</a></p><p><br></p><p><span style="background-color: transparent;">Bug Bounty Maturity Framework</span></p><p><a href="https://bugbountymaturity.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://bugbountymaturity.com/</a></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">Confidential Information and Confidentiality Obligations</span></p><p><a href="https://www.hackerone.com/terms/general#:~:text=HackerOne%20may%20use%20Confidential%20Information%20to%20develop%20and/or%20improve%20its%20Services%20(for%20example%2C%20to%20identify%20trends%2C%20and%20to%20train%20AI%20models)%20provided%20such%20use%20does%20not%20result%20in%20disclosure%20of%20Confidential%20Information%20to%20unauthorized%20third%20parties" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/terms/general#:~:text=HackerOne%20may%20use%20Confidential%20Information%20to%20develop%20and/or%20improve%20its%20Services%20(for%20example%2C%20to%20identify%20trends%2C%20and%20to%20train%20AI%20models)%20provided%20such%20use%20does%20not%20result%20in%20disclosure%20of%20Confidential%20Information%20to%20unauthorized%20third%20parties</a></p><p><br></p><p><span style="background-color: transparent;">Ownership and Licenses</span></p><p><a href="https://www.hackerone.com/terms/community#:~:text=8.%20Ownership%20and%20Licenses" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/terms/community#:~:text=8.%20Ownership%20and%20Licenses</a></p><p><br></p><p><span style="background-color: transparent;">I argued with an AI regarding HackerOne using Hacker reports to train PtaaS</span></p><p><a href="https://bugbounty.forum/post/183ff0fc-eb9e-47f8-991d-c0aa5b0bba71" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://bugbounty.forum/post/183ff0fc-eb9e-47f8-991d-c0aa5b0bba71</a></p><p><br></p><p><span style="background-color: transparent;">HackerOne PTaaS (likely training their AI on private reports data)</span></p><p><a href="https://www.reddit.com/r/bugbounty/comments/1r5hixk/hackerone_ptaas_likely_training_their_ai_on/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.reddit.com/r/bugbounty/comments/1r5hixk/hackerone_ptaas_likely_training_their_ai_on/</a></p><p><br></p><p><span style="background-color: transparent;">What Makes Agentic PTaaS Different in Real Environments</span></p><p><a href="https://www.hackerone.com/blog/agentic-penetration-testing-as-a-service#:~:text=Our%20agents%20are,real%20enterprise%20constraints" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/blog/agentic-penetration-testing-as-a-service#:~:text=Our%20agents%20are,real%20enterprise%20constraints</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:08:44) HackerOne AI Terms of Service&nbsp;</span></p><p><span style="background-color: transparent;">(00:24:56) Agentic PTaaS</span></p><p><span style="background-color: transparent;">(00:38:09) Selling data</span></p><p><span style="background-color: transparent;">(00:43:49) Decrease in Bounties</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 162: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph sit down with HackerOne Founder & CTO Alex Rice to discuss concerns of Using Hacker Data for AI and decreasing bounties.Follow us on twitter at: https://x.com/...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>162</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">38468853-3942-4515-a173-d18052af0633</guid>
  <title><![CDATA[Episode 161: Cross-Consumer Attacks & DTMF Tone Exfil]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Episode 161: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gives us some quick hits regarding CSRF and Cross Consumer Attacks, and also touches on some breaking questions surrounding HackerOne</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code </span><strong style="background-color: transparent;">ZTWCTBB26</strong></p><p><a href="https://ztw.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ztw.com/</a></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">AS Watson</span></p><p><a href="https://app.intigriti.com/programs/aswatson/watsons/detail" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://app.intigriti.com/programs/aswatson/watsons/detail</a></p><p><br></p><p><span style="background-color: transparent;">YesWeHack 2026 Report</span></p><p><a href="https://choose.yeswehack.com/bug-bounty-report-2026-trends-and-key-insights-yeswehack?utm_source=youtube&amp;utm_medium=sponsor-critical-thinking&amp;utm_campaign=yeswehack-report-2026" target="_blank" style="color: rgb(0, 120, 212);">https://choose.yeswehack.com/bug-bounty-report-2026-trends-and-key-insights-yeswehack?utm_source=youtube&amp;utm_medium=sponsor-critical-thinking&amp;utm_campaign=yeswehack-report-2026</a><span style="color: rgb(0, 120, 212);">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">PhoneLeak: Data Exfiltration in Gemini via Phone Call</span></p><p><a href="https://blog.starstrike.ai/posts/phoneleak-data-exfiltration-in-gemini-via-phone-call/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.starstrike.ai/posts/phoneleak-data-exfiltration-in-gemini-via-phone-call/</a></p><p><br></p><p><span style="background-color: transparent;">Max's Tweet about decreasing bounties</span></p><p><a href="https://x.com/0xw2w/status/2020788164378427483" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/0xw2w/status/2020788164378427483</a></p><p><br></p><p><span style="background-color: transparent;">HackerOne General Terms and Conditions</span></p><p><a href="https://www.hackerone.com/terms/general" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/terms/general</a></p><p><br></p><p><span style="background-color: transparent;">Research Review #-2: RCE in Google's AI code editor Antigravity (sudi)</span></p><p><a href="https://www.youtube.com/watch?v=JqvJSF2UMyY" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/watch?v=JqvJSF2UMyY</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:03:26) YesWeHack 2026 Report</span></p><p><span style="background-color: transparent;">(00:09:12) CSRF Realizations &amp; Data Exfiltration in Gemini via Phone Call</span></p><p><span style="background-color: transparent;">(00:14:38) 7urb0's Youtube, HackerOne decreasing bounties and Section&nbsp; &nbsp; 3.1 controversy.</span></p><p><span style="background-color: transparent;">(00:19:06) Cross Consumer Attacks</span></p><p><br></p><p><br></p>]]></description>
  <embed_id>79500483-36ca-449d-a187-d2748208fd77</embed_id>
  <pubDate>Thu, 12 Feb 2026 05:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))]]></author>
  <enclosure length="23713886" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/29603b7e-ba63-4a88-bf31-6fdc6f0a1d96/episode.mp3" />
  <itunes:title><![CDATA[Episode 161: Cross-Consumer Attacks & DTMF Tone Exfil]]></itunes:title>
  <itunes:duration>24:42</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Episode 161: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gives us some quick hits regarding CSRF and Cross Consumer Attacks, and also touches on some breaking questions surrounding HackerOne</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code </span><strong style="background-color: transparent;">ZTWCTBB26</strong></p><p><a href="https://ztw.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ztw.com/</a></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">AS Watson</span></p><p><a href="https://app.intigriti.com/programs/aswatson/watsons/detail" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://app.intigriti.com/programs/aswatson/watsons/detail</a></p><p><br></p><p><span style="background-color: transparent;">YesWeHack 2026 Report</span></p><p><a href="https://choose.yeswehack.com/bug-bounty-report-2026-trends-and-key-insights-yeswehack?utm_source=youtube&amp;utm_medium=sponsor-critical-thinking&amp;utm_campaign=yeswehack-report-2026" target="_blank" style="color: rgb(0, 120, 212);">https://choose.yeswehack.com/bug-bounty-report-2026-trends-and-key-insights-yeswehack?utm_source=youtube&amp;utm_medium=sponsor-critical-thinking&amp;utm_campaign=yeswehack-report-2026</a><span style="color: rgb(0, 120, 212);">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">PhoneLeak: Data Exfiltration in Gemini via Phone Call</span></p><p><a href="https://blog.starstrike.ai/posts/phoneleak-data-exfiltration-in-gemini-via-phone-call/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.starstrike.ai/posts/phoneleak-data-exfiltration-in-gemini-via-phone-call/</a></p><p><br></p><p><span style="background-color: transparent;">Max's Tweet about decreasing bounties</span></p><p><a href="https://x.com/0xw2w/status/2020788164378427483" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/0xw2w/status/2020788164378427483</a></p><p><br></p><p><span style="background-color: transparent;">HackerOne General Terms and Conditions</span></p><p><a href="https://www.hackerone.com/terms/general" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/terms/general</a></p><p><br></p><p><span style="background-color: transparent;">Research Review #-2: RCE in Google's AI code editor Antigravity (sudi)</span></p><p><a href="https://www.youtube.com/watch?v=JqvJSF2UMyY" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/watch?v=JqvJSF2UMyY</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:03:26) YesWeHack 2026 Report</span></p><p><span style="background-color: transparent;">(00:09:12) CSRF Realizations &amp; Data Exfiltration in Gemini via Phone Call</span></p><p><span style="background-color: transparent;">(00:14:38) 7urb0's Youtube, HackerOne decreasing bounties and Section&nbsp; &nbsp; 3.1 controversy.</span></p><p><span style="background-color: transparent;">(00:19:06) Cross Consumer Attacks</span></p><p><br></p><p><br></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Episode 161: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gives us some quick hits regarding CSRF and Cross Consumer Attacks, and also touches on some breaking questions surrounding HackerOne</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code </span><strong style="background-color: transparent;">ZTWCTBB26</strong></p><p><a href="https://ztw.com/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ztw.com/</a></p><p><br></p><p><span style="background-color: transparent;">====== This Week in Bug Bounty ======</span></p><p><br></p><p><span style="background-color: transparent;">AS Watson</span></p><p><a href="https://app.intigriti.com/programs/aswatson/watsons/detail" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://app.intigriti.com/programs/aswatson/watsons/detail</a></p><p><br></p><p><span style="background-color: transparent;">YesWeHack 2026 Report</span></p><p><a href="https://choose.yeswehack.com/bug-bounty-report-2026-trends-and-key-insights-yeswehack?utm_source=youtube&amp;utm_medium=sponsor-critical-thinking&amp;utm_campaign=yeswehack-report-2026" target="_blank" style="color: rgb(0, 120, 212);">https://choose.yeswehack.com/bug-bounty-report-2026-trends-and-key-insights-yeswehack?utm_source=youtube&amp;utm_medium=sponsor-critical-thinking&amp;utm_campaign=yeswehack-report-2026</a><span style="color: rgb(0, 120, 212);">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">PhoneLeak: Data Exfiltration in Gemini via Phone Call</span></p><p><a href="https://blog.starstrike.ai/posts/phoneleak-data-exfiltration-in-gemini-via-phone-call/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.starstrike.ai/posts/phoneleak-data-exfiltration-in-gemini-via-phone-call/</a></p><p><br></p><p><span style="background-color: transparent;">Max's Tweet about decreasing bounties</span></p><p><a href="https://x.com/0xw2w/status/2020788164378427483" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/0xw2w/status/2020788164378427483</a></p><p><br></p><p><span style="background-color: transparent;">HackerOne General Terms and Conditions</span></p><p><a href="https://www.hackerone.com/terms/general" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.hackerone.com/terms/general</a></p><p><br></p><p><span style="background-color: transparent;">Research Review #-2: RCE in Google's AI code editor Antigravity (sudi)</span></p><p><a href="https://www.youtube.com/watch?v=JqvJSF2UMyY" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/watch?v=JqvJSF2UMyY</a></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:03:26) YesWeHack 2026 Report</span></p><p><span style="background-color: transparent;">(00:09:12) CSRF Realizations &amp; Data Exfiltration in Gemini via Phone Call</span></p><p><span style="background-color: transparent;">(00:14:38) 7urb0's Youtube, HackerOne decreasing bounties and Section&nbsp; &nbsp; 3.1 controversy.</span></p><p><span style="background-color: transparent;">(00:19:06) Cross Consumer Attacks</span></p><p><br></p><p><br></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 161: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gives us some quick hits regarding CSRF and Cross Consumer Attacks, and also touches on some breaking questions surrounding HackerOneFollow us on twitter at: https://x.co...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>161</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">117a8e74-feec-49c1-b3db-891b113d3680</guid>
  <title><![CDATA[Episode 160: Cloudflare Zero-days & Mail Unsubscribing for XSS]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Episode 160: In this episode of Critical Thinking - Bug Bounty Podcast Joseph and Brandyn. Chat through some news, Including a Cloudflare Zero-day, Turning List-Unsubscribe into an SSRF/XSS Gadget, &amp; Magic String Denial of Service in Claude.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today’s Sponsor: Adobe.</span></p><p><span style="background-color: transparent;">Use code CTBB040126, and get a 10% bonus on your bounty for any AI vulnerability which is mapped to the OWASP LLM top 10.</span></p><p><span style="background-color: transparent;">Valid on Adobe Acrobat Web - AI Assistant / PDF Spaces / Content Creation and presentation features using Express</span></p><p><span style="background-color: transparent;">Adobe Express AI Assistant.&nbsp;</span></p><p><span style="background-color: transparent;">Valid through April 1st, 2026</span></p><p><br></p><p><span style="background-color: transparent;">Also we have a Google Cloud VRP Swag Bonus! Mention the podcast in any rewarded (cash or credit) VRP report submission before the end of April to receive bonus swag!</span></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">Cloudflare Zero-day</span></p><p><span style="background-color: transparent;">https://fearsoff.org/research/cloudflare-acme</span></p><p><br></p><p><span style="background-color: transparent;">Turning List-Unsubscribe into an SSRF/XSS Gadget</span></p><p><span style="background-color: transparent;">https://security.lauritz-holtmann.de/post/xss-ssrf-list-unsubscribe/</span></p><p><br></p><p><span style="background-color: transparent;">Breaking Multi-Tenant Isolation in Heroku Postgres</span></p><p><span style="background-color: transparent;">https://allistair.sh/blog/breaking-heroku-postgres/</span></p><p><br></p><p><span style="background-color: transparent;">Parse and Parse: MIME Validation Bypass to XSS via Parser Differential</span></p><p><span style="background-color: transparent;">https://lab.ctbb.show/research/parse-and-parse-mime-validation-bypass-to-xss-via-parser-differential</span></p><p><br></p><p><span style="background-color: transparent;">Claude Magic String Denial of Service</span></p><p><span style="background-color: transparent;">https://x.com/Frichette_n/status/2013988503336415522</span></p><p><br></p><p><span style="background-color: transparent;">From WebView to Remote Code Injection</span></p><p><span style="background-color: transparent;">https://djini.ai/from-webview-to-remote-code-injection/</span></p><p><br></p><p><span style="background-color: transparent;">DOM XSS Is Not Dead: The Rise of Polyglot Payloads</span></p><p><span style="background-color: transparent;">https://blogs.jsmon.sh/dom-xss-is-not-dead-the-rise-of-polyglot-payloads/</span></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:06:17) Cloudflare Zero-day &amp; Turning List-Unsubscribe into an SSRF/XSS Gadget</span></p><p><span style="background-color: transparent;">(00:16:57) Breaking Multi-Tenant Isolation in Heroku Postgres &amp; CTBB Research</span></p><p><span style="background-color: transparent;">(00:25:46) Claude Magic String Denial of Service &amp; From WebView to Remote Code Injection</span></p>]]></description>
  <embed_id>5484de81-a536-4efe-a9c6-f2594040b739</embed_id>
  <pubDate>Thu, 05 Feb 2026 05:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))]]></author>
  <enclosure length="43266440" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/0dfa5fbe-fddf-42ee-9511-c083ad993202/episode.mp3" />
  <itunes:title><![CDATA[Episode 160: Cloudflare Zero-days & Mail Unsubscribing for XSS]]></itunes:title>
  <itunes:duration>45:04</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Episode 160: In this episode of Critical Thinking - Bug Bounty Podcast Joseph and Brandyn. Chat through some news, Including a Cloudflare Zero-day, Turning List-Unsubscribe into an SSRF/XSS Gadget, &amp; Magic String Denial of Service in Claude.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today’s Sponsor: Adobe.</span></p><p><span style="background-color: transparent;">Use code CTBB040126, and get a 10% bonus on your bounty for any AI vulnerability which is mapped to the OWASP LLM top 10.</span></p><p><span style="background-color: transparent;">Valid on Adobe Acrobat Web - AI Assistant / PDF Spaces / Content Creation and presentation features using Express</span></p><p><span style="background-color: transparent;">Adobe Express AI Assistant.&nbsp;</span></p><p><span style="background-color: transparent;">Valid through April 1st, 2026</span></p><p><br></p><p><span style="background-color: transparent;">Also we have a Google Cloud VRP Swag Bonus! Mention the podcast in any rewarded (cash or credit) VRP report submission before the end of April to receive bonus swag!</span></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">Cloudflare Zero-day</span></p><p><span style="background-color: transparent;">https://fearsoff.org/research/cloudflare-acme</span></p><p><br></p><p><span style="background-color: transparent;">Turning List-Unsubscribe into an SSRF/XSS Gadget</span></p><p><span style="background-color: transparent;">https://security.lauritz-holtmann.de/post/xss-ssrf-list-unsubscribe/</span></p><p><br></p><p><span style="background-color: transparent;">Breaking Multi-Tenant Isolation in Heroku Postgres</span></p><p><span style="background-color: transparent;">https://allistair.sh/blog/breaking-heroku-postgres/</span></p><p><br></p><p><span style="background-color: transparent;">Parse and Parse: MIME Validation Bypass to XSS via Parser Differential</span></p><p><span style="background-color: transparent;">https://lab.ctbb.show/research/parse-and-parse-mime-validation-bypass-to-xss-via-parser-differential</span></p><p><br></p><p><span style="background-color: transparent;">Claude Magic String Denial of Service</span></p><p><span style="background-color: transparent;">https://x.com/Frichette_n/status/2013988503336415522</span></p><p><br></p><p><span style="background-color: transparent;">From WebView to Remote Code Injection</span></p><p><span style="background-color: transparent;">https://djini.ai/from-webview-to-remote-code-injection/</span></p><p><br></p><p><span style="background-color: transparent;">DOM XSS Is Not Dead: The Rise of Polyglot Payloads</span></p><p><span style="background-color: transparent;">https://blogs.jsmon.sh/dom-xss-is-not-dead-the-rise-of-polyglot-payloads/</span></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:06:17) Cloudflare Zero-day &amp; Turning List-Unsubscribe into an SSRF/XSS Gadget</span></p><p><span style="background-color: transparent;">(00:16:57) Breaking Multi-Tenant Isolation in Heroku Postgres &amp; CTBB Research</span></p><p><span style="background-color: transparent;">(00:25:46) Claude Magic String Denial of Service &amp; From WebView to Remote Code Injection</span></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Episode 160: In this episode of Critical Thinking - Bug Bounty Podcast Joseph and Brandyn. Chat through some news, Including a Cloudflare Zero-day, Turning List-Unsubscribe into an SSRF/XSS Gadget, &amp; Magic String Denial of Service in Claude.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today’s Sponsor: Adobe.</span></p><p><span style="background-color: transparent;">Use code CTBB040126, and get a 10% bonus on your bounty for any AI vulnerability which is mapped to the OWASP LLM top 10.</span></p><p><span style="background-color: transparent;">Valid on Adobe Acrobat Web - AI Assistant / PDF Spaces / Content Creation and presentation features using Express</span></p><p><span style="background-color: transparent;">Adobe Express AI Assistant.&nbsp;</span></p><p><span style="background-color: transparent;">Valid through April 1st, 2026</span></p><p><br></p><p><span style="background-color: transparent;">Also we have a Google Cloud VRP Swag Bonus! Mention the podcast in any rewarded (cash or credit) VRP report submission before the end of April to receive bonus swag!</span></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">Cloudflare Zero-day</span></p><p><span style="background-color: transparent;">https://fearsoff.org/research/cloudflare-acme</span></p><p><br></p><p><span style="background-color: transparent;">Turning List-Unsubscribe into an SSRF/XSS Gadget</span></p><p><span style="background-color: transparent;">https://security.lauritz-holtmann.de/post/xss-ssrf-list-unsubscribe/</span></p><p><br></p><p><span style="background-color: transparent;">Breaking Multi-Tenant Isolation in Heroku Postgres</span></p><p><span style="background-color: transparent;">https://allistair.sh/blog/breaking-heroku-postgres/</span></p><p><br></p><p><span style="background-color: transparent;">Parse and Parse: MIME Validation Bypass to XSS via Parser Differential</span></p><p><span style="background-color: transparent;">https://lab.ctbb.show/research/parse-and-parse-mime-validation-bypass-to-xss-via-parser-differential</span></p><p><br></p><p><span style="background-color: transparent;">Claude Magic String Denial of Service</span></p><p><span style="background-color: transparent;">https://x.com/Frichette_n/status/2013988503336415522</span></p><p><br></p><p><span style="background-color: transparent;">From WebView to Remote Code Injection</span></p><p><span style="background-color: transparent;">https://djini.ai/from-webview-to-remote-code-injection/</span></p><p><br></p><p><span style="background-color: transparent;">DOM XSS Is Not Dead: The Rise of Polyglot Payloads</span></p><p><span style="background-color: transparent;">https://blogs.jsmon.sh/dom-xss-is-not-dead-the-rise-of-polyglot-payloads/</span></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:06:17) Cloudflare Zero-day &amp; Turning List-Unsubscribe into an SSRF/XSS Gadget</span></p><p><span style="background-color: transparent;">(00:16:57) Breaking Multi-Tenant Isolation in Heroku Postgres &amp; CTBB Research</span></p><p><span style="background-color: transparent;">(00:25:46) Claude Magic String Denial of Service &amp; From WebView to Remote Code Injection</span></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 160: In this episode of Critical Thinking - Bug Bounty Podcast Joseph and Brandyn. Chat through some news, Including a Cloudflare Zero-day, Turning List-Unsubscribe into an SSRF/XSS Gadget, & Magic String Denial of Service in Claude.Follow ...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>160</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">43f941dd-abd5-452a-a1fb-6d2c43617e78</guid>
  <title><![CDATA[Episode 159: Avoiding Downgrades on Google Cloud VRP with Cote and Darby Hopkins]]></title>
  <description><![CDATA[<p>Episode 159: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with the Google Cloud VRP Team to deep-dive policy and reward changes, what the panel process looks like, and how to best configure for success.</p><p><br></p><p><a href="https://x.com/ctbbpodcast" target="_blank">Follow us on X</a></p><p><br></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io" target="_blank">info@criticalthinkingpodcast.io</a></p><p><br></p><p>Shoutout to<a href="https://twitter.com/realytcracker" target="_blank"> YTCracker</a> for the awesome intro music!</p><p><br></p><p>====== Links ======</p><p><br></p><p>Follow your hosts <a href="https://x.com/Rhynorater" target="_blank">Rhynorater</a>, <a href="https://x.com/rez0__" target="_blank">rez0</a> and <a href="https://x.com/gr3pme" target="_blank">gr3pme</a> on X:</p><p><br></p><p>====== Ways to Support CTBBPodcast ======</p><p><br></p><p>Hop on the <a href="https://ctbb.show/discord" target="_blank">CTBB Discord</a></p><p><br></p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><br></p><p>Get some <a href="https://ctbb.show/merch" target="_blank">hacker swag</a></p><p><br></p><p>Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code <strong>ZTWCTBB26</strong></p><p><a href="https://ztw.com/" target="_blank">https://ztw.com/</a></p><p><br></p><p><strong>Google Cloud VRP Swag Bonus!</strong> Mention the podcast in any rewarded (cash or credit) VRP report submission before the end of April to receive bonus swag!</p><p><br></p><p>Today’s Guests:</p><p><a href="https://www.linkedin.com/in/darbyhopkins/" target="_blank">Darby Hopkins</a></p><p><a href="https://www.linkedin.com/in/michaelpatrickcote/" target="_blank">Michael Cote</a></p><p><br></p><p>====== This Week in Bug Bounty ======</p><p><a href="https://www.hackerone.com/blog/ai-red-teaming-explained-by-red-teamers" target="_blank">AI Red Teaming Explained by AI Red Teamers</a></p><p><br></p><p><a href="https://www.hackerone.com/press-release/hackerone-sets-standard-ai-era-testing-good-faith-ai-research-safe-harbor" target="_blank">Good Faith AI Research Safe Harbor</a></p><p><br></p><p><a href="https://nullcon.net/goa-2026" target="_blank">Join the Adobe LHE at NULLCON GOA</a></p><p><br></p><p>====== Resources ======</p><p><br></p><p><a href="https://x.com/GoogleVRP/status/2013660670076555418" target="_blank">‘Legendary Guy’ - Jakub Domeracki</a></p><p><br></p><p><a href="https://bughunters.google.com/about/rules/google-friends/cloud-vulnerability-reward-program-rules#reward-amounts" target="_blank">Google Cloud VRP rewards rules</a></p><p><br></p><p><a href="https://github.com/google/bughunters/blob/main/cloud-tiers/cloud-tiers.text" target="_blank">Google Cloud VRP product tiers</a></p><p><br></p><p><a href="https://bughunters.google.com/blog/hardening-google-cloud-insights-from-the-latest-cloud-vrp-bugswat" target="_blank">Bug Hunters blog on the 2025 Google Cloud VRP bugSWAT</a></p><p><br></p><p><a href="https://discord.com/invite/bzA9gc6Z" target="_blank">Google VRP Discord</a></p><p><br></p><p><a href="https://x.com/GoogleVRP" target="_blank">Google VRP on X</a></p><p><br></p><p>====== Timestamps ======</p><p><br></p><p>(00:00:00) Introduction</p><p>(00:10:03) CloudVRP Bugswat Event Breakdown</p><p>(00:16:40) VRP Policy &amp; Rewards Changes</p><p>(00:04:50) Panel Process</p><p>(01:00:08) Configuring for Success &amp; Avoiding Downgrades</p><p>(01:33:47) Scenarios for Success</p>]]></description>
  <embed_id>515d49a4-4d4c-48da-a41b-5224263b14cd</embed_id>
  <pubDate>Thu, 29 Jan 2026 05:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))]]></author>
  <enclosure length="102562312" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/97142356-6841-41e2-8d82-ccae935fe3dc/episode.mp3" />
  <itunes:title><![CDATA[Episode 159: Avoiding Downgrades on Google Cloud VRP with Cote and Darby Hopkins]]></itunes:title>
  <itunes:duration>1:46:50</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 159: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with the Google Cloud VRP Team to deep-dive policy and reward changes, what the panel process looks like, and how to best configure for success.</p><p><br></p><p><a href="https://x.com/ctbbpodcast" target="_blank">Follow us on X</a></p><p><br></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io" target="_blank">info@criticalthinkingpodcast.io</a></p><p><br></p><p>Shoutout to<a href="https://twitter.com/realytcracker" target="_blank"> YTCracker</a> for the awesome intro music!</p><p><br></p><p>====== Links ======</p><p><br></p><p>Follow your hosts <a href="https://x.com/Rhynorater" target="_blank">Rhynorater</a>, <a href="https://x.com/rez0__" target="_blank">rez0</a> and <a href="https://x.com/gr3pme" target="_blank">gr3pme</a> on X:</p><p><br></p><p>====== Ways to Support CTBBPodcast ======</p><p><br></p><p>Hop on the <a href="https://ctbb.show/discord" target="_blank">CTBB Discord</a></p><p><br></p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><br></p><p>Get some <a href="https://ctbb.show/merch" target="_blank">hacker swag</a></p><p><br></p><p>Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code <strong>ZTWCTBB26</strong></p><p><a href="https://ztw.com/" target="_blank">https://ztw.com/</a></p><p><br></p><p><strong>Google Cloud VRP Swag Bonus!</strong> Mention the podcast in any rewarded (cash or credit) VRP report submission before the end of April to receive bonus swag!</p><p><br></p><p>Today’s Guests:</p><p><a href="https://www.linkedin.com/in/darbyhopkins/" target="_blank">Darby Hopkins</a></p><p><a href="https://www.linkedin.com/in/michaelpatrickcote/" target="_blank">Michael Cote</a></p><p><br></p><p>====== This Week in Bug Bounty ======</p><p><a href="https://www.hackerone.com/blog/ai-red-teaming-explained-by-red-teamers" target="_blank">AI Red Teaming Explained by AI Red Teamers</a></p><p><br></p><p><a href="https://www.hackerone.com/press-release/hackerone-sets-standard-ai-era-testing-good-faith-ai-research-safe-harbor" target="_blank">Good Faith AI Research Safe Harbor</a></p><p><br></p><p><a href="https://nullcon.net/goa-2026" target="_blank">Join the Adobe LHE at NULLCON GOA</a></p><p><br></p><p>====== Resources ======</p><p><br></p><p><a href="https://x.com/GoogleVRP/status/2013660670076555418" target="_blank">‘Legendary Guy’ - Jakub Domeracki</a></p><p><br></p><p><a href="https://bughunters.google.com/about/rules/google-friends/cloud-vulnerability-reward-program-rules#reward-amounts" target="_blank">Google Cloud VRP rewards rules</a></p><p><br></p><p><a href="https://github.com/google/bughunters/blob/main/cloud-tiers/cloud-tiers.text" target="_blank">Google Cloud VRP product tiers</a></p><p><br></p><p><a href="https://bughunters.google.com/blog/hardening-google-cloud-insights-from-the-latest-cloud-vrp-bugswat" target="_blank">Bug Hunters blog on the 2025 Google Cloud VRP bugSWAT</a></p><p><br></p><p><a href="https://discord.com/invite/bzA9gc6Z" target="_blank">Google VRP Discord</a></p><p><br></p><p><a href="https://x.com/GoogleVRP" target="_blank">Google VRP on X</a></p><p><br></p><p>====== Timestamps ======</p><p><br></p><p>(00:00:00) Introduction</p><p>(00:10:03) CloudVRP Bugswat Event Breakdown</p><p>(00:16:40) VRP Policy &amp; Rewards Changes</p><p>(00:04:50) Panel Process</p><p>(01:00:08) Configuring for Success &amp; Avoiding Downgrades</p><p>(01:33:47) Scenarios for Success</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 159: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with the Google Cloud VRP Team to deep-dive policy and reward changes, what the panel process looks like, and how to best configure for success.</p><p><br></p><p><a href="https://x.com/ctbbpodcast" target="_blank">Follow us on X</a></p><p><br></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io" target="_blank">info@criticalthinkingpodcast.io</a></p><p><br></p><p>Shoutout to<a href="https://twitter.com/realytcracker" target="_blank"> YTCracker</a> for the awesome intro music!</p><p><br></p><p>====== Links ======</p><p><br></p><p>Follow your hosts <a href="https://x.com/Rhynorater" target="_blank">Rhynorater</a>, <a href="https://x.com/rez0__" target="_blank">rez0</a> and <a href="https://x.com/gr3pme" target="_blank">gr3pme</a> on X:</p><p><br></p><p>====== Ways to Support CTBBPodcast ======</p><p><br></p><p>Hop on the <a href="https://ctbb.show/discord" target="_blank">CTBB Discord</a></p><p><br></p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><br></p><p>Get some <a href="https://ctbb.show/merch" target="_blank">hacker swag</a></p><p><br></p><p>Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code <strong>ZTWCTBB26</strong></p><p><a href="https://ztw.com/" target="_blank">https://ztw.com/</a></p><p><br></p><p><strong>Google Cloud VRP Swag Bonus!</strong> Mention the podcast in any rewarded (cash or credit) VRP report submission before the end of April to receive bonus swag!</p><p><br></p><p>Today’s Guests:</p><p><a href="https://www.linkedin.com/in/darbyhopkins/" target="_blank">Darby Hopkins</a></p><p><a href="https://www.linkedin.com/in/michaelpatrickcote/" target="_blank">Michael Cote</a></p><p><br></p><p>====== This Week in Bug Bounty ======</p><p><a href="https://www.hackerone.com/blog/ai-red-teaming-explained-by-red-teamers" target="_blank">AI Red Teaming Explained by AI Red Teamers</a></p><p><br></p><p><a href="https://www.hackerone.com/press-release/hackerone-sets-standard-ai-era-testing-good-faith-ai-research-safe-harbor" target="_blank">Good Faith AI Research Safe Harbor</a></p><p><br></p><p><a href="https://nullcon.net/goa-2026" target="_blank">Join the Adobe LHE at NULLCON GOA</a></p><p><br></p><p>====== Resources ======</p><p><br></p><p><a href="https://x.com/GoogleVRP/status/2013660670076555418" target="_blank">‘Legendary Guy’ - Jakub Domeracki</a></p><p><br></p><p><a href="https://bughunters.google.com/about/rules/google-friends/cloud-vulnerability-reward-program-rules#reward-amounts" target="_blank">Google Cloud VRP rewards rules</a></p><p><br></p><p><a href="https://github.com/google/bughunters/blob/main/cloud-tiers/cloud-tiers.text" target="_blank">Google Cloud VRP product tiers</a></p><p><br></p><p><a href="https://bughunters.google.com/blog/hardening-google-cloud-insights-from-the-latest-cloud-vrp-bugswat" target="_blank">Bug Hunters blog on the 2025 Google Cloud VRP bugSWAT</a></p><p><br></p><p><a href="https://discord.com/invite/bzA9gc6Z" target="_blank">Google VRP Discord</a></p><p><br></p><p><a href="https://x.com/GoogleVRP" target="_blank">Google VRP on X</a></p><p><br></p><p>====== Timestamps ======</p><p><br></p><p>(00:00:00) Introduction</p><p>(00:10:03) CloudVRP Bugswat Event Breakdown</p><p>(00:16:40) VRP Policy &amp; Rewards Changes</p><p>(00:04:50) Panel Process</p><p>(01:00:08) Configuring for Success &amp; Avoiding Downgrades</p><p>(01:33:47) Scenarios for Success</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 159: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with the Google Cloud VRP Team to deep-dive policy and reward changes, what the panel process looks like, and how to best configure for success.Follow us on XGot any...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>true</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>159</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">4ea10a24-0498-4f93-9802-b25de87fd433</guid>
  <title><![CDATA[Episode 158: 10hr Marathon Hack-Along Recap + $300k Client-side Bugs]]></title>
  <description><![CDATA[<p><span style="background-color: transparent;">Episode 158: In this episode of Critical Thinking - Bug Bounty Podcast we talk about our personal takeaways from the CTBB Charity Hackalong, and then break down some InsertScript POCs, what a $55,000 bug can look like, and if Smart People Ever Say They’re Smart.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code </span><strong style="background-color: transparent;">ZTWCTBB26</strong></p><p><span style="background-color: transparent;">https://ztw.com/</span></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">InsertScript - XSS Challenge Solution</span></p><p><span style="background-color: transparent;">https://insert-script.blogspot.com/2020/03/xss-challenge-solution-refresh-header.html</span></p><p><br></p><p><span style="background-color: transparent;">InsertScript - Redirect AuthHeader</span></p><p><span style="background-color: transparent;">https://www.insert-script.com/examples/redirectAuthHeader/send.html</span></p><p><br></p><p><span style="background-color: transparent;">CRLF injection on a 302 redirect</span></p><p><span style="background-color: transparent;">https://x.com/0xdef1ant/status/2009040359482118500</span></p><p><br></p><p><span style="background-color: transparent;">Multiple XSS in Meta Conversion API Gateway Leading to Zero-Click Account Takeover</span></p><p><span style="background-color: transparent;">https://ysamm.com/uncategorized/2025/01/13/capig-xss.html</span></p><p><br></p><p><span style="background-color: transparent;">Arcanum Hack Tips</span></p><p><span style="background-color: transparent;">https://github.com/Arcanum-Sec/hack_tips</span></p><p><br></p><p><span style="background-color: transparent;">Trail of Bits Releases Claude Skills</span></p><p><span style="background-color: transparent;">https://x.com/dguido/status/2011541318229533063</span></p><p><br></p><p><span style="background-color: transparent;">what a $55,000 bug can look like</span></p><p><span style="background-color: transparent;">https://x.com/the_IDORminator/status/2007480636244697237</span></p><p><br></p><p><span style="background-color: transparent;">Pwning Claude Code in 8 Different Ways</span></p><p><span style="background-color: transparent;">https://flatt.tech/research/posts/pwning-claude-code-in-8-different-ways/</span></p><p><br></p><p><span style="background-color: transparent;">Do Smart People Ever Say They’re Smart?</span></p><p><span style="background-color: transparent;">https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:04:18) Technical takeaways from CT Charity Hackalong</span></p><p><span style="background-color: transparent;">(00:22:21) InsertScript POCs &amp; Rez0 and teknogeek's IOT Adventures</span></p><p><span style="background-color: transparent;">(00:32:16) CRLF injection on a 302 redirect &amp; Multiple XSS in Meta</span></p><p><span style="background-color: transparent;">(00:41:00) Trail of Bits, what a $55,000 bug can look like, &amp; Pwning Claude Code</span></p><p><span style="background-color: transparent;">(00:54:16) Do Smart People Ever Say They’re Smart?</span></p><p><br></p><p><br></p>]]></description>
  <embed_id>f96cecf1-d40f-4014-969e-b5ddfda0b9f6</embed_id>
  <pubDate>Thu, 22 Jan 2026 05:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))]]></author>
  <enclosure length="56162147" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/2d21dab2-ed40-4efd-b16c-9f19ea25b350/episode.mp3" />
  <itunes:title><![CDATA[Episode 158: 10hr Marathon Hack-Along Recap + $300k Client-side Bugs]]></itunes:title>
  <itunes:duration>58:30</itunes:duration>
  <itunes:summary><![CDATA[<p><span style="background-color: transparent;">Episode 158: In this episode of Critical Thinking - Bug Bounty Podcast we talk about our personal takeaways from the CTBB Charity Hackalong, and then break down some InsertScript POCs, what a $55,000 bug can look like, and if Smart People Ever Say They’re Smart.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code </span><strong style="background-color: transparent;">ZTWCTBB26</strong></p><p><span style="background-color: transparent;">https://ztw.com/</span></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">InsertScript - XSS Challenge Solution</span></p><p><span style="background-color: transparent;">https://insert-script.blogspot.com/2020/03/xss-challenge-solution-refresh-header.html</span></p><p><br></p><p><span style="background-color: transparent;">InsertScript - Redirect AuthHeader</span></p><p><span style="background-color: transparent;">https://www.insert-script.com/examples/redirectAuthHeader/send.html</span></p><p><br></p><p><span style="background-color: transparent;">CRLF injection on a 302 redirect</span></p><p><span style="background-color: transparent;">https://x.com/0xdef1ant/status/2009040359482118500</span></p><p><br></p><p><span style="background-color: transparent;">Multiple XSS in Meta Conversion API Gateway Leading to Zero-Click Account Takeover</span></p><p><span style="background-color: transparent;">https://ysamm.com/uncategorized/2025/01/13/capig-xss.html</span></p><p><br></p><p><span style="background-color: transparent;">Arcanum Hack Tips</span></p><p><span style="background-color: transparent;">https://github.com/Arcanum-Sec/hack_tips</span></p><p><br></p><p><span style="background-color: transparent;">Trail of Bits Releases Claude Skills</span></p><p><span style="background-color: transparent;">https://x.com/dguido/status/2011541318229533063</span></p><p><br></p><p><span style="background-color: transparent;">what a $55,000 bug can look like</span></p><p><span style="background-color: transparent;">https://x.com/the_IDORminator/status/2007480636244697237</span></p><p><br></p><p><span style="background-color: transparent;">Pwning Claude Code in 8 Different Ways</span></p><p><span style="background-color: transparent;">https://flatt.tech/research/posts/pwning-claude-code-in-8-different-ways/</span></p><p><br></p><p><span style="background-color: transparent;">Do Smart People Ever Say They’re Smart?</span></p><p><span style="background-color: transparent;">https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:04:18) Technical takeaways from CT Charity Hackalong</span></p><p><span style="background-color: transparent;">(00:22:21) InsertScript POCs &amp; Rez0 and teknogeek's IOT Adventures</span></p><p><span style="background-color: transparent;">(00:32:16) CRLF injection on a 302 redirect &amp; Multiple XSS in Meta</span></p><p><span style="background-color: transparent;">(00:41:00) Trail of Bits, what a $55,000 bug can look like, &amp; Pwning Claude Code</span></p><p><span style="background-color: transparent;">(00:54:16) Do Smart People Ever Say They’re Smart?</span></p><p><br></p><p><br></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p><span style="background-color: transparent;">Episode 158: In this episode of Critical Thinking - Bug Bounty Podcast we talk about our personal takeaways from the CTBB Charity Hackalong, and then break down some InsertScript POCs, what a $55,000 bug can look like, and if Smart People Ever Say They’re Smart.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code </span><strong style="background-color: transparent;">ZTWCTBB26</strong></p><p><span style="background-color: transparent;">https://ztw.com/</span></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><span style="background-color: transparent;">InsertScript - XSS Challenge Solution</span></p><p><span style="background-color: transparent;">https://insert-script.blogspot.com/2020/03/xss-challenge-solution-refresh-header.html</span></p><p><br></p><p><span style="background-color: transparent;">InsertScript - Redirect AuthHeader</span></p><p><span style="background-color: transparent;">https://www.insert-script.com/examples/redirectAuthHeader/send.html</span></p><p><br></p><p><span style="background-color: transparent;">CRLF injection on a 302 redirect</span></p><p><span style="background-color: transparent;">https://x.com/0xdef1ant/status/2009040359482118500</span></p><p><br></p><p><span style="background-color: transparent;">Multiple XSS in Meta Conversion API Gateway Leading to Zero-Click Account Takeover</span></p><p><span style="background-color: transparent;">https://ysamm.com/uncategorized/2025/01/13/capig-xss.html</span></p><p><br></p><p><span style="background-color: transparent;">Arcanum Hack Tips</span></p><p><span style="background-color: transparent;">https://github.com/Arcanum-Sec/hack_tips</span></p><p><br></p><p><span style="background-color: transparent;">Trail of Bits Releases Claude Skills</span></p><p><span style="background-color: transparent;">https://x.com/dguido/status/2011541318229533063</span></p><p><br></p><p><span style="background-color: transparent;">what a $55,000 bug can look like</span></p><p><span style="background-color: transparent;">https://x.com/the_IDORminator/status/2007480636244697237</span></p><p><br></p><p><span style="background-color: transparent;">Pwning Claude Code in 8 Different Ways</span></p><p><span style="background-color: transparent;">https://flatt.tech/research/posts/pwning-claude-code-in-8-different-ways/</span></p><p><br></p><p><span style="background-color: transparent;">Do Smart People Ever Say They’re Smart?</span></p><p><span style="background-color: transparent;">https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:04:18) Technical takeaways from CT Charity Hackalong</span></p><p><span style="background-color: transparent;">(00:22:21) InsertScript POCs &amp; Rez0 and teknogeek's IOT Adventures</span></p><p><span style="background-color: transparent;">(00:32:16) CRLF injection on a 302 redirect &amp; Multiple XSS in Meta</span></p><p><span style="background-color: transparent;">(00:41:00) Trail of Bits, what a $55,000 bug can look like, &amp; Pwning Claude Code</span></p><p><span style="background-color: transparent;">(00:54:16) Do Smart People Ever Say They’re Smart?</span></p><p><br></p><p><br></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 158: In this episode of Critical Thinking - Bug Bounty Podcast we talk about our personal takeaways from the CTBB Charity Hackalong, and then break down some InsertScript POCs, what a $55,000 bug can look like, and if Smart People Ever Say ...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>true</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>158</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">1d36d8b3-bb77-46dc-b9c1-143dd4d5fc74</guid>
  <title><![CDATA[Episode 157: Crushing Pwn2Own & H1 with Kernel Driver Exploits]]></title>
  <description><![CDATA[<p>Episode 157: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Hypr to talk about hacking Mediatek and his experiences with HackerOne and Pwn2Own Ecosystems.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>Critical Research Lab:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/">https://lab.ctbb.show/</a> </p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/hyprdude">https://x.com/hyprdude</a></p><p>====== This Week in Bug Bounty ======</p><p>Top 10 web hacking techniques of 2025: call for nominations</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2025-nominations-open">https://portswigger.net/research/top-10-web-hacking-techniques-of-2025-nominations-open</a></p><p>CVE-2025-13467</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://access.redhat.com/security/cve/cve-2025-13467">https://access.redhat.com/security/cve/cve-2025-13467</a></p><p>====== Resources ======</p><p>Hypr's Blog</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.coffinsec.com">https://blog.coffinsec.com</a></p><p>mediatek? more like media-rekt, amirite.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html">https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html</a></p><p>kernel-utils</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/mellow-hype/kernel-utils">https://github.com/mellow-hype/kernel-utils</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:03:23) Heap Overflow in Mediatek Kernel Drivers</p><p>(00:19:23) Kernel Debugging &amp; ioctl Handlers </p><p>(00:43:30) Input Structs, Sync to Source, &amp; Privilege Escalation </p><p>(00:51:30) HackerOne Ecosystem vs Pwn2Own Ecosystem </p><p>(01:17:00) Kernel Utils</p><p>(01:26:46) Real World Bugs for Exploit Development vs CTFs</p>]]></description>
  <embed_id>e65212f5-8e29-4ebb-b82c-29efdef6cc86</embed_id>
  <pubDate>Thu, 15 Jan 2026 11:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="91170125" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/d9e93a51-edf3-4677-b365-d2bc231dc2d8/episode.mp3" />
  <itunes:title><![CDATA[Episode 157: Crushing Pwn2Own & H1 with Kernel Driver Exploits]]></itunes:title>
  <itunes:duration>1:34:58</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 157: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Hypr to talk about hacking Mediatek and his experiences with HackerOne and Pwn2Own Ecosystems.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>Critical Research Lab:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/">https://lab.ctbb.show/</a> </p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/hyprdude">https://x.com/hyprdude</a></p><p>====== This Week in Bug Bounty ======</p><p>Top 10 web hacking techniques of 2025: call for nominations</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2025-nominations-open">https://portswigger.net/research/top-10-web-hacking-techniques-of-2025-nominations-open</a></p><p>CVE-2025-13467</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://access.redhat.com/security/cve/cve-2025-13467">https://access.redhat.com/security/cve/cve-2025-13467</a></p><p>====== Resources ======</p><p>Hypr's Blog</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.coffinsec.com">https://blog.coffinsec.com</a></p><p>mediatek? more like media-rekt, amirite.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html">https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html</a></p><p>kernel-utils</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/mellow-hype/kernel-utils">https://github.com/mellow-hype/kernel-utils</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:03:23) Heap Overflow in Mediatek Kernel Drivers</p><p>(00:19:23) Kernel Debugging &amp; ioctl Handlers </p><p>(00:43:30) Input Structs, Sync to Source, &amp; Privilege Escalation </p><p>(00:51:30) HackerOne Ecosystem vs Pwn2Own Ecosystem </p><p>(01:17:00) Kernel Utils</p><p>(01:26:46) Real World Bugs for Exploit Development vs CTFs</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 157: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Hypr to talk about hacking Mediatek and his experiences with HackerOne and Pwn2Own Ecosystems.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>Critical Research Lab:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/">https://lab.ctbb.show/</a> </p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/hyprdude">https://x.com/hyprdude</a></p><p>====== This Week in Bug Bounty ======</p><p>Top 10 web hacking techniques of 2025: call for nominations</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2025-nominations-open">https://portswigger.net/research/top-10-web-hacking-techniques-of-2025-nominations-open</a></p><p>CVE-2025-13467</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://access.redhat.com/security/cve/cve-2025-13467">https://access.redhat.com/security/cve/cve-2025-13467</a></p><p>====== Resources ======</p><p>Hypr's Blog</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.coffinsec.com">https://blog.coffinsec.com</a></p><p>mediatek? more like media-rekt, amirite.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html">https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html</a></p><p>kernel-utils</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/mellow-hype/kernel-utils">https://github.com/mellow-hype/kernel-utils</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:03:23) Heap Overflow in Mediatek Kernel Drivers</p><p>(00:19:23) Kernel Debugging &amp; ioctl Handlers </p><p>(00:43:30) Input Structs, Sync to Source, &amp; Privilege Escalation </p><p>(00:51:30) HackerOne Ecosystem vs Pwn2Own Ecosystem </p><p>(01:17:00) Kernel Utils</p><p>(01:26:46) Real World Bugs for Exploit Development vs CTFs</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 157: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Hypr to talk about hacking Mediatek and his experiences with HackerOne and Pwn2Own Ecosystems.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>157</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">3110d83a-d3d6-47a2-932b-23d6f2657192</guid>
  <title><![CDATA[Episode 156: Chill AMA from bugbounty.forum]]></title>
  <description><![CDATA[<p>Episode 156: In this episode of Critical Thinking - Bug Bounty Podcast we answer some fantastic questions from over at <a target="_blank" rel="noopener noreferrer nofollow" href="http://bugbounty.forum">bugbounty.forum</a></p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Resources ======</p><p>Critical Thinking Lab</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://lab.ctbb.show">lab.ctbb.show</a></p><p>Cross-Site ETag Length Leak</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.arkark.dev/2025/12/26/etag-length-leak">https://blog.arkark.dev/2025/12/26/etag-length-leak</a></p><p>Clawdbot</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/clawdbot/clawdbot/">https://github.com/clawdbot/clawdbot/</a></p><p>Post from Steve Caldwell</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/moreconfetti/status/2006494133159162008">https://x.com/moreconfetti/status/2006494133159162008</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:00:58) Crit Lab update</p><p>(00:04:36) Cross-Site ETag Length Leak</p><p>(00:13:26) Clawdbot</p><p>(00:16:56) Will bug hunting become obsolete, LHE invitations, and Fulltime vs Part time?</p><p>(00:30:52) 10 bugs at $5k or 1 bug at $5k, CTBB Background, &amp; Future Plans</p><p>(00:38:32) Mentoring, Conquering Classes, and what angles we implement from the podcast</p><p>(00:49:27) Best approach on new targets, tips for making 500k in a year, AI/Vibecoding &amp; Human in the Loop</p><p>(00:59:07) Mentally mapping the target, anti-patterns that waste time, and BB beliefs that were wrong.</p><p>(01:10:12) Tackling small scope, staying on one program, picking up after a break, &amp; moving on</p><p>(01:17:41) Invisible elements that make the difference between $2k and $20k</p>]]></description>
  <embed_id>8ba9edf4-f4bd-4aa9-8a92-8b88fff9a943</embed_id>
  <pubDate>Thu, 08 Jan 2026 11:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="79794110" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/6671e946-32af-411d-bdb5-aaaa8cdc4588/episode.mp3" />
  <itunes:title><![CDATA[Episode 156: Chill AMA from bugbounty.forum]]></itunes:title>
  <itunes:duration>1:23:07</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 156: In this episode of Critical Thinking - Bug Bounty Podcast we answer some fantastic questions from over at <a target="_blank" rel="noopener noreferrer nofollow" href="http://bugbounty.forum">bugbounty.forum</a></p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Resources ======</p><p>Critical Thinking Lab</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://lab.ctbb.show">lab.ctbb.show</a></p><p>Cross-Site ETag Length Leak</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.arkark.dev/2025/12/26/etag-length-leak">https://blog.arkark.dev/2025/12/26/etag-length-leak</a></p><p>Clawdbot</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/clawdbot/clawdbot/">https://github.com/clawdbot/clawdbot/</a></p><p>Post from Steve Caldwell</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/moreconfetti/status/2006494133159162008">https://x.com/moreconfetti/status/2006494133159162008</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:00:58) Crit Lab update</p><p>(00:04:36) Cross-Site ETag Length Leak</p><p>(00:13:26) Clawdbot</p><p>(00:16:56) Will bug hunting become obsolete, LHE invitations, and Fulltime vs Part time?</p><p>(00:30:52) 10 bugs at $5k or 1 bug at $5k, CTBB Background, &amp; Future Plans</p><p>(00:38:32) Mentoring, Conquering Classes, and what angles we implement from the podcast</p><p>(00:49:27) Best approach on new targets, tips for making 500k in a year, AI/Vibecoding &amp; Human in the Loop</p><p>(00:59:07) Mentally mapping the target, anti-patterns that waste time, and BB beliefs that were wrong.</p><p>(01:10:12) Tackling small scope, staying on one program, picking up after a break, &amp; moving on</p><p>(01:17:41) Invisible elements that make the difference between $2k and $20k</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 156: In this episode of Critical Thinking - Bug Bounty Podcast we answer some fantastic questions from over at <a target="_blank" rel="noopener noreferrer nofollow" href="http://bugbounty.forum">bugbounty.forum</a></p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Resources ======</p><p>Critical Thinking Lab</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://lab.ctbb.show">lab.ctbb.show</a></p><p>Cross-Site ETag Length Leak</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.arkark.dev/2025/12/26/etag-length-leak">https://blog.arkark.dev/2025/12/26/etag-length-leak</a></p><p>Clawdbot</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/clawdbot/clawdbot/">https://github.com/clawdbot/clawdbot/</a></p><p>Post from Steve Caldwell</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/moreconfetti/status/2006494133159162008">https://x.com/moreconfetti/status/2006494133159162008</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:00:58) Crit Lab update</p><p>(00:04:36) Cross-Site ETag Length Leak</p><p>(00:13:26) Clawdbot</p><p>(00:16:56) Will bug hunting become obsolete, LHE invitations, and Fulltime vs Part time?</p><p>(00:30:52) 10 bugs at $5k or 1 bug at $5k, CTBB Background, &amp; Future Plans</p><p>(00:38:32) Mentoring, Conquering Classes, and what angles we implement from the podcast</p><p>(00:49:27) Best approach on new targets, tips for making 500k in a year, AI/Vibecoding &amp; Human in the Loop</p><p>(00:59:07) Mentally mapping the target, anti-patterns that waste time, and BB beliefs that were wrong.</p><p>(01:10:12) Tackling small scope, staying on one program, picking up after a break, &amp; moving on</p><p>(01:17:41) Invisible elements that make the difference between $2k and $20k</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 156: In this episode of Critical Thinking - Bug Bounty Podcast we answer some fantastic questions from over at bugbounty.forumFollow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>156</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">8a9fd64f-0d7a-4c71-bfe9-0894ee15edc3</guid>
  <title><![CDATA[Episode 155: 2025 Hacker Stats & 2026 Goals]]></title>
  <description><![CDATA[<p>Episode 155: In this episode of Critical Thinking - Bug Bounty Podcast Justin, Joseph, and Brandyn reflect on last year of Bug Bounty, and list their goals and predictions for what 2026 holds.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Resources ======</p><p>2024 Hacker Stats &amp; 2025 Goals</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-104-2024-hacker-stats-2025-goals">https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-104-2024-hacker-stats-2025-goals</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:08) 2025 Full Time Hunting Retrospective</p><p>(00:10:19) Most Fulfilling Moments and Bugs</p><p>(00:17:56) Satisfaction with 2025 Stats</p><p>(00:45:28) Automation, Organization, and Collaboration</p><p>(00:48:55) Time and Motivation</p><p>(01:08:01) Goals and Predictions for Bug Bounty in 2026</p>]]></description>
  <embed_id>65645380-51f0-4402-9035-41879e5785e2</embed_id>
  <pubDate>Thu, 01 Jan 2026 11:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="88578352" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/70c614da-ea45-4aae-9ffa-de2f198eb5a2/episode.mp3" />
  <itunes:title><![CDATA[Episode 155: 2025 Hacker Stats & 2026 Goals]]></itunes:title>
  <itunes:duration>1:32:16</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 155: In this episode of Critical Thinking - Bug Bounty Podcast Justin, Joseph, and Brandyn reflect on last year of Bug Bounty, and list their goals and predictions for what 2026 holds.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Resources ======</p><p>2024 Hacker Stats &amp; 2025 Goals</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-104-2024-hacker-stats-2025-goals">https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-104-2024-hacker-stats-2025-goals</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:08) 2025 Full Time Hunting Retrospective</p><p>(00:10:19) Most Fulfilling Moments and Bugs</p><p>(00:17:56) Satisfaction with 2025 Stats</p><p>(00:45:28) Automation, Organization, and Collaboration</p><p>(00:48:55) Time and Motivation</p><p>(01:08:01) Goals and Predictions for Bug Bounty in 2026</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 155: In this episode of Critical Thinking - Bug Bounty Podcast Justin, Joseph, and Brandyn reflect on last year of Bug Bounty, and list their goals and predictions for what 2026 holds.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Resources ======</p><p>2024 Hacker Stats &amp; 2025 Goals</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-104-2024-hacker-stats-2025-goals">https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-104-2024-hacker-stats-2025-goals</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:08) 2025 Full Time Hunting Retrospective</p><p>(00:10:19) Most Fulfilling Moments and Bugs</p><p>(00:17:56) Satisfaction with 2025 Stats</p><p>(00:45:28) Automation, Organization, and Collaboration</p><p>(00:48:55) Time and Motivation</p><p>(01:08:01) Goals and Predictions for Bug Bounty in 2026</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 155: In this episode of Critical Thinking - Bug Bounty Podcast Justin, Joseph, and Brandyn reflect on last year of Bug Bounty, and list their goals and predictions for what 2026 holds.Follow us on twitter at: https://x.com/ctbbpodcastGot an...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>155</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">8c7af518-40b0-4b0d-84e1-70d19458a596</guid>
  <title><![CDATA[Episode 154: Starting a Pentesting Company on Top of Bug Bounty]]></title>
  <description><![CDATA[<p>Episode 154: In this episode of Critical Thinking - Bug Bounty Podcast Joseph and Brandyn talk through the transition from Bug Bounty hunting to Pentesting. We cover diversifying income streams, the challenges of pricing for Pentests, legal considerations, and what Bug Hunters can bring to the Pentesting world</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:03:36) Starting a Pentesting Company </p><p>(00:12:25) Advantages of Pentesting as a Bug Bounty Hunter</p><p>(00:29:03) Pricing, Sales, and knowing your Market/Worth</p><p>(00:36:21) Compliance in Pentests &amp; Rapid-Fire Takaways</p>]]></description>
  <embed_id>20d7e2c1-e2a0-4cfa-a6b3-071e30e173f0</embed_id>
  <pubDate>Thu, 25 Dec 2025 11:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="39810457" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/bae9a290-36ce-4cb5-98db-df2b52693e2c/episode.mp3" />
  <itunes:title><![CDATA[Episode 154: Starting a Pentesting Company on Top of Bug Bounty]]></itunes:title>
  <itunes:duration>41:28</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 154: In this episode of Critical Thinking - Bug Bounty Podcast Joseph and Brandyn talk through the transition from Bug Bounty hunting to Pentesting. We cover diversifying income streams, the challenges of pricing for Pentests, legal considerations, and what Bug Hunters can bring to the Pentesting world</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:03:36) Starting a Pentesting Company </p><p>(00:12:25) Advantages of Pentesting as a Bug Bounty Hunter</p><p>(00:29:03) Pricing, Sales, and knowing your Market/Worth</p><p>(00:36:21) Compliance in Pentests &amp; Rapid-Fire Takaways</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 154: In this episode of Critical Thinking - Bug Bounty Podcast Joseph and Brandyn talk through the transition from Bug Bounty hunting to Pentesting. We cover diversifying income streams, the challenges of pricing for Pentests, legal considerations, and what Bug Hunters can bring to the Pentesting world</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:03:36) Starting a Pentesting Company </p><p>(00:12:25) Advantages of Pentesting as a Bug Bounty Hunter</p><p>(00:29:03) Pricing, Sales, and knowing your Market/Worth</p><p>(00:36:21) Compliance in Pentests &amp; Rapid-Fire Takaways</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 154: In this episode of Critical Thinking - Bug Bounty Podcast Joseph and Brandyn talk through the transition from Bug Bounty hunting to Pentesting. We cover diversifying income streams, the challenges of pricing for Pentests, legal conside...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>154</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">33017e77-3c83-456a-a190-fd7b4b716e0e</guid>
  <title><![CDATA[Episode 153: Hacking the Robots of the Future: Hardware, AI, and Bug Bounties with Matt Brown]]></title>
  <description><![CDATA[<p>Episode 153: In this episode of Critical Thinking - Bug Bounty Podcast Matt Brown returns to talk with us about hacking robots, IOT hackbots, and his Zero-to-Hero Hardware Hacking Guide.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guest: Matt Brown</p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nmatt0">https://x.com/nmatt0</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/BrownFineSecurity/iothackbot">https://github.com/BrownFineSecurity/iothackbot</a></li></ul><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.amazon.com/KeeYees-Analyzer-Device-Channel-Arduino/dp/B07K6HXDH1">KeeYees USB Logic Analyzer Device</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://saleae.com/logic">Saleae logic analyzer</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.amazon.com/stores/XGecu/page/ACADF4DC-D4D0-4162-BDAF-566A7CF73D5F">XGecu</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/playlist?list=PLoFdAHrZtKkhcd9k8ZcR4th8Q8PNOx7iU">Hardware Hacking Tutorial by Make Me Hack</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://wrongbaud.github.io/posts/router-teardown/">UART and SPI firmware extraction</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/B0Wi2EP-BCY">UART Root Shell on Linux Router</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/pogUY9jH3sw">UART Shell Jail and Unlocked Bootloader</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/Su4MTlgDfzI">Chinese IP Camera Firmware Extraction</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/IkXbuF7_VPk">Chip-Off Firmware Extraction</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:01:22) Incremental Session Token Story and Matt Brown Intro </p><p>(00:10:42) Hardware Bug Bounty Scene &amp; AI on Devices</p><p>(00:24:30) Hacking Human Robot</p><p>(00:41:33) Zero-to-Hero Hardware Hacking Guide</p><p>(01:01:47) IOT Hackbot</p>]]></description>
  <embed_id>e0bf2460-81de-4a70-81aa-9ef05dcfbf28</embed_id>
  <pubDate>Thu, 18 Dec 2025 11:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="73762542" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/17dba378-59a9-4258-b136-1a145d36b0e2/episode.mp3" />
  <itunes:title><![CDATA[Episode 153: Hacking the Robots of the Future: Hardware, AI, and Bug Bounties with Matt Brown]]></itunes:title>
  <itunes:duration>1:16:50</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 153: In this episode of Critical Thinking - Bug Bounty Podcast Matt Brown returns to talk with us about hacking robots, IOT hackbots, and his Zero-to-Hero Hardware Hacking Guide.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guest: Matt Brown</p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nmatt0">https://x.com/nmatt0</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/BrownFineSecurity/iothackbot">https://github.com/BrownFineSecurity/iothackbot</a></li></ul><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.amazon.com/KeeYees-Analyzer-Device-Channel-Arduino/dp/B07K6HXDH1">KeeYees USB Logic Analyzer Device</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://saleae.com/logic">Saleae logic analyzer</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.amazon.com/stores/XGecu/page/ACADF4DC-D4D0-4162-BDAF-566A7CF73D5F">XGecu</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/playlist?list=PLoFdAHrZtKkhcd9k8ZcR4th8Q8PNOx7iU">Hardware Hacking Tutorial by Make Me Hack</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://wrongbaud.github.io/posts/router-teardown/">UART and SPI firmware extraction</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/B0Wi2EP-BCY">UART Root Shell on Linux Router</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/pogUY9jH3sw">UART Shell Jail and Unlocked Bootloader</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/Su4MTlgDfzI">Chinese IP Camera Firmware Extraction</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/IkXbuF7_VPk">Chip-Off Firmware Extraction</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:01:22) Incremental Session Token Story and Matt Brown Intro </p><p>(00:10:42) Hardware Bug Bounty Scene &amp; AI on Devices</p><p>(00:24:30) Hacking Human Robot</p><p>(00:41:33) Zero-to-Hero Hardware Hacking Guide</p><p>(01:01:47) IOT Hackbot</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 153: In this episode of Critical Thinking - Bug Bounty Podcast Matt Brown returns to talk with us about hacking robots, IOT hackbots, and his Zero-to-Hero Hardware Hacking Guide.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guest: Matt Brown</p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nmatt0">https://x.com/nmatt0</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/BrownFineSecurity/iothackbot">https://github.com/BrownFineSecurity/iothackbot</a></li></ul><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.amazon.com/KeeYees-Analyzer-Device-Channel-Arduino/dp/B07K6HXDH1">KeeYees USB Logic Analyzer Device</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://saleae.com/logic">Saleae logic analyzer</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.amazon.com/stores/XGecu/page/ACADF4DC-D4D0-4162-BDAF-566A7CF73D5F">XGecu</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/playlist?list=PLoFdAHrZtKkhcd9k8ZcR4th8Q8PNOx7iU">Hardware Hacking Tutorial by Make Me Hack</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://wrongbaud.github.io/posts/router-teardown/">UART and SPI firmware extraction</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/B0Wi2EP-BCY">UART Root Shell on Linux Router</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/pogUY9jH3sw">UART Shell Jail and Unlocked Bootloader</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/Su4MTlgDfzI">Chinese IP Camera Firmware Extraction</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/IkXbuF7_VPk">Chip-Off Firmware Extraction</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:01:22) Incremental Session Token Story and Matt Brown Intro </p><p>(00:10:42) Hardware Bug Bounty Scene &amp; AI on Devices</p><p>(00:24:30) Hacking Human Robot</p><p>(00:41:33) Zero-to-Hero Hardware Hacking Guide</p><p>(01:01:47) IOT Hackbot</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 153: In this episode of Critical Thinking - Bug Bounty Podcast Matt Brown returns to talk with us about hacking robots, IOT hackbots, and his Zero-to-Hero Hardware Hacking Guide.Follow us on twitter at: https://x.com/ctbbpodcastGot any idea...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>153</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">e2293ba2-e84c-4e54-9407-5410e0e27ed2</guid>
  <title><![CDATA[Episode 152: GeminiJack and Agentic Security with Sasi Levi]]></title>
  <description><![CDATA[<p>Episode 152: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Sasi Levi from Noma Security to talk about AI and Agentic Security. We also talk about ForcedLeak, a Google Vertex Bug, and debate if Prompt Injection is a real Vuln.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>CHeck out our New Christmas Swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Elevation Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/tl-ec">https://ctbb.show/tl-ec</a></p><p>And Noma Security! <a target="_blank" rel="noopener noreferrer nofollow" href="https://noma.security/">https://noma.security/</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/sasi2103">https://x.com/sasi2103</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/vercel_platform_protection?type=team">Vercel Platform Protection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/cramforce/status/1998072892391592195?s=20">Dedicated HackerOne program for Vercel WAF</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs?scopeType%5B%5D=open-source&amp;page=1">YesWeHack Open Source Programs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide">Android recon for Bug Bounty hunters</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/sasi2103/status/608349038778437632">Sasi's Tweet from 2015</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://noma.security/blog/forcedleak-agent-risks-exposed-in-salesforce-agentforce/">ForcedLeak: AI Agent risks exposed in Salesforce AgentForce</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://danielmiessler.com/blog/is-prompt-injection-a-vulnerability">Is Prompt Injection a Vulnerability?</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:09:16) Google Vertex AI Bug</p><p>(00:29:28) Sasi's Background and Bug Bounty Journey</p><p>(00:38:55) Resources for AI and Agentic Security Methodology</p><p>(00:50:34) ForcedLeak</p><p>(01:02:06) Is Prompt Injection a Vuln?</p>]]></description>
  <embed_id>52cfb609-7dd3-4548-b6c2-140e96c6c32b</embed_id>
  <pubDate>Thu, 11 Dec 2025 11:00:15 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="78338352" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/e6a73322-8adc-4c69-9d64-e3196107fc4c/episode.mp3" />
  <itunes:title><![CDATA[Episode 152: GeminiJack and Agentic Security with Sasi Levi]]></itunes:title>
  <itunes:duration>1:21:36</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 152: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Sasi Levi from Noma Security to talk about AI and Agentic Security. We also talk about ForcedLeak, a Google Vertex Bug, and debate if Prompt Injection is a real Vuln.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>CHeck out our New Christmas Swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Elevation Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/tl-ec">https://ctbb.show/tl-ec</a></p><p>And Noma Security! <a target="_blank" rel="noopener noreferrer nofollow" href="https://noma.security/">https://noma.security/</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/sasi2103">https://x.com/sasi2103</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/vercel_platform_protection?type=team">Vercel Platform Protection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/cramforce/status/1998072892391592195?s=20">Dedicated HackerOne program for Vercel WAF</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs?scopeType%5B%5D=open-source&amp;page=1">YesWeHack Open Source Programs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide">Android recon for Bug Bounty hunters</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/sasi2103/status/608349038778437632">Sasi's Tweet from 2015</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://noma.security/blog/forcedleak-agent-risks-exposed-in-salesforce-agentforce/">ForcedLeak: AI Agent risks exposed in Salesforce AgentForce</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://danielmiessler.com/blog/is-prompt-injection-a-vulnerability">Is Prompt Injection a Vulnerability?</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:09:16) Google Vertex AI Bug</p><p>(00:29:28) Sasi's Background and Bug Bounty Journey</p><p>(00:38:55) Resources for AI and Agentic Security Methodology</p><p>(00:50:34) ForcedLeak</p><p>(01:02:06) Is Prompt Injection a Vuln?</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 152: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Sasi Levi from Noma Security to talk about AI and Agentic Security. We also talk about ForcedLeak, a Google Vertex Bug, and debate if Prompt Injection is a real Vuln.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>CHeck out our New Christmas Swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Elevation Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/tl-ec">https://ctbb.show/tl-ec</a></p><p>And Noma Security! <a target="_blank" rel="noopener noreferrer nofollow" href="https://noma.security/">https://noma.security/</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/sasi2103">https://x.com/sasi2103</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/vercel_platform_protection?type=team">Vercel Platform Protection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/cramforce/status/1998072892391592195?s=20">Dedicated HackerOne program for Vercel WAF</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs?scopeType%5B%5D=open-source&amp;page=1">YesWeHack Open Source Programs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide">Android recon for Bug Bounty hunters</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/sasi2103/status/608349038778437632">Sasi's Tweet from 2015</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://noma.security/blog/forcedleak-agent-risks-exposed-in-salesforce-agentforce/">ForcedLeak: AI Agent risks exposed in Salesforce AgentForce</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://danielmiessler.com/blog/is-prompt-injection-a-vulnerability">Is Prompt Injection a Vulnerability?</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:09:16) Google Vertex AI Bug</p><p>(00:29:28) Sasi's Background and Bug Bounty Journey</p><p>(00:38:55) Resources for AI and Agentic Security Methodology</p><p>(00:50:34) ForcedLeak</p><p>(01:02:06) Is Prompt Injection a Vuln?</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 152: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Sasi Levi from Noma Security to talk about AI and Agentic Security. We also talk about ForcedLeak, a Google Vertex Bug, and debate if Prompt Injection is a real ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>152</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">d2b078fb-19e5-4a7b-b780-7fd41dea6b61</guid>
  <title><![CDATA[Episode 151: Client-side Advanced Topics]]></title>
  <description><![CDATA[<p>Episode 151: In this episode of Critical Thinking - Bug Bounty Podcast we’re covering Client-side advanced topics. Justin talks Joseph (and us) through Third-Party Cookie Nuances, Iframe Tricks, URL Parsing, and more.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Elevation Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/tl-ec">https://ctbb.show/tl-ec</a></p><p>====== Resources ======</p><p>Nowasky's Tweet #1</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nowaskyjr/status/1993421017381744974">https://x.com/nowaskyjr/status/1993421017381744974</a></p><p>Nowasky's Tweet #2</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nowaskyjr/status/1992717862398800081">https://x.com/nowaskyjr/status/1992717862398800081</a></p><p>rep+ in Chrome DevTools</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/BourAbdelhadi/status/1992622964077179229">https://x.com/BourAbdelhadi/status/1992622964077179229</a></p><p>Terjanq Post from 2021</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/terjanq/status/1421093136022048775">https://x.com/terjanq/status/1421093136022048775</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:58) Client-side news &amp; AI Updates</p><p>(00:12:02) Third-Party Cookie Nuances &amp; PostMessages</p><p>(00:30:09) Iframe Tricks</p><p>(00:47:43) URL Parsing, CSPTS, and Client-side Routes</p>]]></description>
  <embed_id>12b89adb-2e05-4d44-b8a3-c84c6fa1f27a</embed_id>
  <pubDate>Thu, 04 Dec 2025 11:00:37 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="64738796" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/016262a0-7afd-46f0-9f52-91639392a20c/episode.mp3" />
  <itunes:title><![CDATA[Episode 151: Client-side Advanced Topics]]></itunes:title>
  <itunes:duration>1:07:26</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 151: In this episode of Critical Thinking - Bug Bounty Podcast we’re covering Client-side advanced topics. Justin talks Joseph (and us) through Third-Party Cookie Nuances, Iframe Tricks, URL Parsing, and more.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Elevation Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/tl-ec">https://ctbb.show/tl-ec</a></p><p>====== Resources ======</p><p>Nowasky's Tweet #1</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nowaskyjr/status/1993421017381744974">https://x.com/nowaskyjr/status/1993421017381744974</a></p><p>Nowasky's Tweet #2</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nowaskyjr/status/1992717862398800081">https://x.com/nowaskyjr/status/1992717862398800081</a></p><p>rep+ in Chrome DevTools</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/BourAbdelhadi/status/1992622964077179229">https://x.com/BourAbdelhadi/status/1992622964077179229</a></p><p>Terjanq Post from 2021</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/terjanq/status/1421093136022048775">https://x.com/terjanq/status/1421093136022048775</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:58) Client-side news &amp; AI Updates</p><p>(00:12:02) Third-Party Cookie Nuances &amp; PostMessages</p><p>(00:30:09) Iframe Tricks</p><p>(00:47:43) URL Parsing, CSPTS, and Client-side Routes</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 151: In this episode of Critical Thinking - Bug Bounty Podcast we’re covering Client-side advanced topics. Justin talks Joseph (and us) through Third-Party Cookie Nuances, Iframe Tricks, URL Parsing, and more.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Elevation Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/tl-ec">https://ctbb.show/tl-ec</a></p><p>====== Resources ======</p><p>Nowasky's Tweet #1</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nowaskyjr/status/1993421017381744974">https://x.com/nowaskyjr/status/1993421017381744974</a></p><p>Nowasky's Tweet #2</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nowaskyjr/status/1992717862398800081">https://x.com/nowaskyjr/status/1992717862398800081</a></p><p>rep+ in Chrome DevTools</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/BourAbdelhadi/status/1992622964077179229">https://x.com/BourAbdelhadi/status/1992622964077179229</a></p><p>Terjanq Post from 2021</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/terjanq/status/1421093136022048775">https://x.com/terjanq/status/1421093136022048775</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:58) Client-side news &amp; AI Updates</p><p>(00:12:02) Third-Party Cookie Nuances &amp; PostMessages</p><p>(00:30:09) Iframe Tricks</p><p>(00:47:43) URL Parsing, CSPTS, and Client-side Routes</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 151: In this episode of Critical Thinking - Bug Bounty Podcast we’re covering Client-side advanced topics. Justin talks Joseph (and us) through Third-Party Cookie Nuances, Iframe Tricks, URL Parsing, and more.Follow us on twitter at: https:...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>151</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">dbc90930-5658-4c67-adb0-fdd8c9755570</guid>
  <title><![CDATA[Episode 150: ASP.NET MVC Patterns, Popping Oracle Identity, and Esoteric Subdomain Enumeration]]></title>
  <description><![CDATA[<p>Episode 150: In this episode of Critical Thinking - Bug Bounty Podcast we're highlighting some cool news and research, but not before expressing our gratitude to the Hacker community. We are so thankful for you all!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Elevation Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/tl-ec">https://ctbb.show/tl-ec</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/3027461">Cache Overflow on Cloudflare</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/research-center/breaking-oracles-identity-manager-pre-auth-rce/">Breaking Oracle’s Identity Manager</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hx01.me/hailcsv.htm">Who Needs a Blind XSS?</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/research/asp-net-mvc-view-engine-search-patterns">ASP.NET MVC View Engine Search Patterns</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/p-e-w/heretic">Heretic</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.google.com/presentation/d/1UOcryh9c7zJ0UnnLwqRLFIyfU5LxSRRRt10c17dV8tI/edit?slide=id.g2d6dd8819b6_0_20#slide=id.g2d6dd8819b6_0_20">Lesser known techniques for large-scale subdomain enum</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/learn/invalid-reports/google-products/4655949258227712/antigravity-known-issues#known-issues">Antigravity – Known Issues</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bugbountydaily.com/">Bug Bounty Daily</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/caido-community/surf">Caido version of AssetNote Surf</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:09:47) Breaking Oracle’s Identity Manager &amp; Who Needs a Blind XSS?</p><p>(00:20:37) <a target="_blank" rel="noopener noreferrer nofollow" href="http://ASP.NET">ASP.NET</a> MVC View Engine Search Patterns &amp; Heretic</p><p>(00:29:04) Lesser known techniques for large-scale subdomain enum</p><p>(00:35:29) Gemini 3 &amp; Antigravity.</p><p>(00:45:57) Bug Bounty Daily  </p><p>(00:52:42) Surf for Caido</p>]]></description>
  <embed_id>26b5c0c1-b379-4961-b8ca-cf379cb49fba</embed_id>
  <pubDate>Thu, 27 Nov 2025 11:00:16 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="55042561" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/a27ca039-0b05-432c-986e-ebfc7b612fbd/episode.mp3" />
  <itunes:title><![CDATA[Episode 150: ASP.NET MVC Patterns, Popping Oracle Identity, and Esoteric Subdomain Enumeration]]></itunes:title>
  <itunes:duration>57:20</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 150: In this episode of Critical Thinking - Bug Bounty Podcast we're highlighting some cool news and research, but not before expressing our gratitude to the Hacker community. We are so thankful for you all!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Elevation Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/tl-ec">https://ctbb.show/tl-ec</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/3027461">Cache Overflow on Cloudflare</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/research-center/breaking-oracles-identity-manager-pre-auth-rce/">Breaking Oracle’s Identity Manager</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hx01.me/hailcsv.htm">Who Needs a Blind XSS?</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/research/asp-net-mvc-view-engine-search-patterns">ASP.NET MVC View Engine Search Patterns</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/p-e-w/heretic">Heretic</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.google.com/presentation/d/1UOcryh9c7zJ0UnnLwqRLFIyfU5LxSRRRt10c17dV8tI/edit?slide=id.g2d6dd8819b6_0_20#slide=id.g2d6dd8819b6_0_20">Lesser known techniques for large-scale subdomain enum</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/learn/invalid-reports/google-products/4655949258227712/antigravity-known-issues#known-issues">Antigravity – Known Issues</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bugbountydaily.com/">Bug Bounty Daily</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/caido-community/surf">Caido version of AssetNote Surf</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:09:47) Breaking Oracle’s Identity Manager &amp; Who Needs a Blind XSS?</p><p>(00:20:37) <a target="_blank" rel="noopener noreferrer nofollow" href="http://ASP.NET">ASP.NET</a> MVC View Engine Search Patterns &amp; Heretic</p><p>(00:29:04) Lesser known techniques for large-scale subdomain enum</p><p>(00:35:29) Gemini 3 &amp; Antigravity.</p><p>(00:45:57) Bug Bounty Daily  </p><p>(00:52:42) Surf for Caido</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 150: In this episode of Critical Thinking - Bug Bounty Podcast we're highlighting some cool news and research, but not before expressing our gratitude to the Hacker community. We are so thankful for you all!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Elevation Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/tl-ec">https://ctbb.show/tl-ec</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/3027461">Cache Overflow on Cloudflare</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/research-center/breaking-oracles-identity-manager-pre-auth-rce/">Breaking Oracle’s Identity Manager</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hx01.me/hailcsv.htm">Who Needs a Blind XSS?</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/research/asp-net-mvc-view-engine-search-patterns">ASP.NET MVC View Engine Search Patterns</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/p-e-w/heretic">Heretic</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.google.com/presentation/d/1UOcryh9c7zJ0UnnLwqRLFIyfU5LxSRRRt10c17dV8tI/edit?slide=id.g2d6dd8819b6_0_20#slide=id.g2d6dd8819b6_0_20">Lesser known techniques for large-scale subdomain enum</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/learn/invalid-reports/google-products/4655949258227712/antigravity-known-issues#known-issues">Antigravity – Known Issues</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bugbountydaily.com/">Bug Bounty Daily</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/caido-community/surf">Caido version of AssetNote Surf</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:09:47) Breaking Oracle’s Identity Manager &amp; Who Needs a Blind XSS?</p><p>(00:20:37) <a target="_blank" rel="noopener noreferrer nofollow" href="http://ASP.NET">ASP.NET</a> MVC View Engine Search Patterns &amp; Heretic</p><p>(00:29:04) Lesser known techniques for large-scale subdomain enum</p><p>(00:35:29) Gemini 3 &amp; Antigravity.</p><p>(00:45:57) Bug Bounty Daily  </p><p>(00:52:42) Surf for Caido</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 150: In this episode of Critical Thinking - Bug Bounty Podcast we're highlighting some cool news and research, but not before expressing our gratitude to the Hacker community. We are so thankful for you all!Follow us on twitter at: https://...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>150</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">57d6feba-8a7d-4042-81b9-2057679b9226</guid>
  <title><![CDATA[Episode 149: DEFCON Debrief: AI Vulns, Unicode Weirdness, and Wild Vulnerability Chains]]></title>
  <description><![CDATA[<p>Episode 149: In this episode of Critical Thinking - Bug Bounty Podcast The DEFCON videos are up, and Justin and Joseph talk through some of their favorites.</p><p>Follow us on <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">X</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a>, <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">rez0</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">gr3pme</a> on X: </p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">Discord!</a></p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/research/unicode-surrogates-to-replacement-characters">Unicode surrogates conversion</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=y_aQQmDMaY4">Prompt. Scan. Exploit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=RNXCnJvE1Zg&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk">Breaking into thousands of cloud based VPNs with 1 bug</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=mPo-an8BUXc">Examining Access Control Vulnerabilities in GraphQL</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=AOp0QtUORBc&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=6">Smart Bus Smart Hacking</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=LCGm5-ZjKK0">Passkeys Pwned</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=kSJBEZkJ4vM&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=3">Bypassing Intent Destination Checks</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=CUxbDRR0A8I">Gemini Agents in Google Calendar</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=JL2PT1Dac3g">Exploitation of DOM Clobbering Vuln at Scale</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/jackfromeast/TheHulk">TheHulk</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=rLnlLLKISyY&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=4">Smart Devices, Dumb Resets</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=T13YfM8z0lE&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=7">Mac PRT Cookie Theft</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:10:10) Prompt. Scan. Exploit</p><p>(00:23:52) Breaking into thousands of cloud based VPNs with 1 bug</p><p>(00:33:25) Access Control Vulns in GraphQL, Smart Bus Hacking, &amp; Passkeys Pwned</p><p>(00:44:10) Bypassing Intent Destination Checks &amp; Invoking Gemini Agents</p><p>(00:57:08) DOM Clobbering, Mac PRT Cookie Theft, &amp; Smart Devices, Dumb Resets</p>]]></description>
  <embed_id>928bd31c-455c-4017-a676-4d4ebf40f290</embed_id>
  <pubDate>Thu, 20 Nov 2025 11:00:00 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="60050138" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/d78d9152-d17d-4809-b4ef-e0ea1583be7c/episode.mp3" />
  <itunes:title><![CDATA[Episode 149: DEFCON Debrief: AI Vulns, Unicode Weirdness, and Wild Vulnerability Chains]]></itunes:title>
  <itunes:duration>1:02:33</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 149: In this episode of Critical Thinking - Bug Bounty Podcast The DEFCON videos are up, and Justin and Joseph talk through some of their favorites.</p><p>Follow us on <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">X</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a>, <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">rez0</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">gr3pme</a> on X: </p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">Discord!</a></p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/research/unicode-surrogates-to-replacement-characters">Unicode surrogates conversion</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=y_aQQmDMaY4">Prompt. Scan. Exploit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=RNXCnJvE1Zg&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk">Breaking into thousands of cloud based VPNs with 1 bug</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=mPo-an8BUXc">Examining Access Control Vulnerabilities in GraphQL</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=AOp0QtUORBc&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=6">Smart Bus Smart Hacking</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=LCGm5-ZjKK0">Passkeys Pwned</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=kSJBEZkJ4vM&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=3">Bypassing Intent Destination Checks</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=CUxbDRR0A8I">Gemini Agents in Google Calendar</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=JL2PT1Dac3g">Exploitation of DOM Clobbering Vuln at Scale</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/jackfromeast/TheHulk">TheHulk</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=rLnlLLKISyY&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=4">Smart Devices, Dumb Resets</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=T13YfM8z0lE&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=7">Mac PRT Cookie Theft</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:10:10) Prompt. Scan. Exploit</p><p>(00:23:52) Breaking into thousands of cloud based VPNs with 1 bug</p><p>(00:33:25) Access Control Vulns in GraphQL, Smart Bus Hacking, &amp; Passkeys Pwned</p><p>(00:44:10) Bypassing Intent Destination Checks &amp; Invoking Gemini Agents</p><p>(00:57:08) DOM Clobbering, Mac PRT Cookie Theft, &amp; Smart Devices, Dumb Resets</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 149: In this episode of Critical Thinking - Bug Bounty Podcast The DEFCON videos are up, and Justin and Joseph talk through some of their favorites.</p><p>Follow us on <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">X</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a>, <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">rez0</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">gr3pme</a> on X: </p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">Discord!</a></p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/research/unicode-surrogates-to-replacement-characters">Unicode surrogates conversion</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=y_aQQmDMaY4">Prompt. Scan. Exploit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=RNXCnJvE1Zg&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk">Breaking into thousands of cloud based VPNs with 1 bug</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=mPo-an8BUXc">Examining Access Control Vulnerabilities in GraphQL</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=AOp0QtUORBc&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=6">Smart Bus Smart Hacking</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=LCGm5-ZjKK0">Passkeys Pwned</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=kSJBEZkJ4vM&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=3">Bypassing Intent Destination Checks</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=CUxbDRR0A8I">Gemini Agents in Google Calendar</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=JL2PT1Dac3g">Exploitation of DOM Clobbering Vuln at Scale</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/jackfromeast/TheHulk">TheHulk</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=rLnlLLKISyY&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=4">Smart Devices, Dumb Resets</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=T13YfM8z0lE&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=7">Mac PRT Cookie Theft</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:10:10) Prompt. Scan. Exploit</p><p>(00:23:52) Breaking into thousands of cloud based VPNs with 1 bug</p><p>(00:33:25) Access Control Vulns in GraphQL, Smart Bus Hacking, &amp; Passkeys Pwned</p><p>(00:44:10) Bypassing Intent Destination Checks &amp; Invoking Gemini Agents</p><p>(00:57:08) DOM Clobbering, Mac PRT Cookie Theft, &amp; Smart Devices, Dumb Resets</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 149: In this episode of Critical Thinking - Bug Bounty Podcast The DEFCON videos are up, and Justin and Joseph talk through some of their favorites.Follow us on XGot any ideas and suggestions? Feel free to send us any feedback here: info@cr...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>149</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">0314d3b6-7a74-43b1-a7e1-f6c6651b5188</guid>
  <title><![CDATA[Episode 148: MCP Hacking Guide]]></title>
  <description><![CDATA[<p>Episode 148: In this episode of Critical Thinking - Bug Bounty Podcast Justin gives us a crash course on Model Context Protocol.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:51) MCP Architecture &amp; Authentication</p><p>(00:13:08) Roots, Sampling, &amp; Elicitation</p><p>(00:19:15) Tools and Resources</p>]]></description>
  <embed_id>dc008aba-0435-449b-acec-ffe8b1fd69d3</embed_id>
  <pubDate>Thu, 13 Nov 2025 11:00:52 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="31138640" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/f514ae56-921b-4db6-ab10-978f43334cdb/episode.mp3" />
  <itunes:title><![CDATA[Episode 148: MCP Hacking Guide]]></itunes:title>
  <itunes:duration>32:26</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 148: In this episode of Critical Thinking - Bug Bounty Podcast Justin gives us a crash course on Model Context Protocol.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:51) MCP Architecture &amp; Authentication</p><p>(00:13:08) Roots, Sampling, &amp; Elicitation</p><p>(00:19:15) Tools and Resources</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 148: In this episode of Critical Thinking - Bug Bounty Podcast Justin gives us a crash course on Model Context Protocol.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:51) MCP Architecture &amp; Authentication</p><p>(00:13:08) Roots, Sampling, &amp; Elicitation</p><p>(00:19:15) Tools and Resources</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 148: In this episode of Critical Thinking - Bug Bounty Podcast Justin gives us a crash course on Model Context Protocol.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here:...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>148</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">05089ff6-7f1e-496e-879b-a73190e064df</guid>
  <title><![CDATA[Episode 147: Stupid Simple Hacking Workflow Tips]]></title>
  <description><![CDATA[<p>Episode 147: In this episode of Critical Thinking - Bug Bounty Podcast we're talking tips and tricks that help us in hacking that we really should’ve learned sooner.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Network Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>====== This Week in Bug Bounty ======</p><p>Netscaler's new program</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/netscaler_public_program?type=team">https://hackerone.com/netscaler_public_program?type=team</a></p><p>The ultimate Bug Bounty guide to HTTP request smuggling vulnerabilities</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/http-request-smuggling-guide-vulnerabilities">https://www.yeswehack.com/learn-bug-bounty/http-request-smuggling-guide-vulnerabilities</a></p><p>Hackers now have 2 Request-a-Response</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.bugcrowd.com/changelog/researchers/request-a-response-researcher/">https://docs.bugcrowd.com/changelog/researchers/request-a-response-researcher/</a></p><p>Evan Connelly Spotlight</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/hacker-spotlight-evan-connelly/">https://www.bugcrowd.com/blog/hacker-spotlight-evan-connelly/</a></p><p>Epic Games Jobs Openings</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://Jobs.ctbb.show">Jobs.ctbb.show</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:09:23) Command Palette, Auto-decoding, &amp; Evenbetter</p><p>(00:17:28) Chrome Devtools Edit as html &amp; Raycast</p><p>(00:33:23) ffuf -request flag</p><p>(00:41:33) JXScout</p><p>(00:48:55) Conditional Breakpoints in Devtools &amp; Lightning round tips</p>]]></description>
  <embed_id>e18e1192-6434-40aa-9224-c6fa285ed7de</embed_id>
  <pubDate>Thu, 06 Nov 2025 11:01:16 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="56450257" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/1ae886dd-57e7-482f-8ade-a5daefc7dd62/episode.mp3" />
  <itunes:title><![CDATA[Episode 147: Stupid Simple Hacking Workflow Tips]]></itunes:title>
  <itunes:duration>58:48</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 147: In this episode of Critical Thinking - Bug Bounty Podcast we're talking tips and tricks that help us in hacking that we really should’ve learned sooner.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Network Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>====== This Week in Bug Bounty ======</p><p>Netscaler's new program</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/netscaler_public_program?type=team">https://hackerone.com/netscaler_public_program?type=team</a></p><p>The ultimate Bug Bounty guide to HTTP request smuggling vulnerabilities</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/http-request-smuggling-guide-vulnerabilities">https://www.yeswehack.com/learn-bug-bounty/http-request-smuggling-guide-vulnerabilities</a></p><p>Hackers now have 2 Request-a-Response</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.bugcrowd.com/changelog/researchers/request-a-response-researcher/">https://docs.bugcrowd.com/changelog/researchers/request-a-response-researcher/</a></p><p>Evan Connelly Spotlight</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/hacker-spotlight-evan-connelly/">https://www.bugcrowd.com/blog/hacker-spotlight-evan-connelly/</a></p><p>Epic Games Jobs Openings</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://Jobs.ctbb.show">Jobs.ctbb.show</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:09:23) Command Palette, Auto-decoding, &amp; Evenbetter</p><p>(00:17:28) Chrome Devtools Edit as html &amp; Raycast</p><p>(00:33:23) ffuf -request flag</p><p>(00:41:33) JXScout</p><p>(00:48:55) Conditional Breakpoints in Devtools &amp; Lightning round tips</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 147: In this episode of Critical Thinking - Bug Bounty Podcast we're talking tips and tricks that help us in hacking that we really should’ve learned sooner.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Network Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>====== This Week in Bug Bounty ======</p><p>Netscaler's new program</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/netscaler_public_program?type=team">https://hackerone.com/netscaler_public_program?type=team</a></p><p>The ultimate Bug Bounty guide to HTTP request smuggling vulnerabilities</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/http-request-smuggling-guide-vulnerabilities">https://www.yeswehack.com/learn-bug-bounty/http-request-smuggling-guide-vulnerabilities</a></p><p>Hackers now have 2 Request-a-Response</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.bugcrowd.com/changelog/researchers/request-a-response-researcher/">https://docs.bugcrowd.com/changelog/researchers/request-a-response-researcher/</a></p><p>Evan Connelly Spotlight</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/hacker-spotlight-evan-connelly/">https://www.bugcrowd.com/blog/hacker-spotlight-evan-connelly/</a></p><p>Epic Games Jobs Openings</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://Jobs.ctbb.show">Jobs.ctbb.show</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:09:23) Command Palette, Auto-decoding, &amp; Evenbetter</p><p>(00:17:28) Chrome Devtools Edit as html &amp; Raycast</p><p>(00:33:23) ffuf -request flag</p><p>(00:41:33) JXScout</p><p>(00:48:55) Conditional Breakpoints in Devtools &amp; Lightning round tips</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 147: In this episode of Critical Thinking - Bug Bounty Podcast we're talking tips and tricks that help us in hacking that we really should’ve learned sooner.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Fe...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>147</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">505d0a45-a95c-4c22-add7-57e74ba239dc</guid>
  <title><![CDATA[Episode 146: Hacking Horror Stories]]></title>
  <description><![CDATA[<p>Episode 146: In this episode of Critical Thinking - Bug Bounty Podcast Justin, Joseph, and Brandyn all sit down to celebrate the spooky season by swapping their scariest bug stories. From frightening fails and firings to hacks with chilling and critical consequences. Grab your flashlight and a blanket for this one!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Network Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/ssti-cache-poisoning-logic-vulnerabilities">Methodology tips from top Bug Bounty hunters</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/news/yeswehack-marks-first-year-of-partnership-with-singapore-government-bug-bounty-programmes">YesWeHack marks first year of partnership with Singapore’s Government</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/report/hacker-powered-security">HackerOne Hacker-Powered Security Report</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/">Critical Research Lab</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/hacking-clubwpt-gold">Hacking the World Poker Tour: Inside ClubWPT Gold’s Back Office</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://muffsec.com/blog/file-creation-via-sqlite-injection/">File Creation via SQLite Injection</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:10:11) Crit Research Lab News</p><p>(00:21:31) Hacking the World Poker Tour &amp; File Creation via SQLite Injection</p><p>(00:30:40) Brandyn's Spooky Bug</p><p>(00:38:02) Joseph's Spooky Bug</p><p>(00:44:18) Justin's Spooky Bug</p><p>(00:54:44) Banking Bugs, LHE Scares, and Workday weirdness.</p><p>(01:14:52) Firings and failures</p><p>(01:22:49) Bank Bug Redux</p><p>(01:35:55) Wedding planning/registry app &amp; Amazon Rufus bugs</p><p>(01:40:52) New Relic bug</p>]]></description>
  <embed_id>1cb27d03-505d-4f71-80e2-b10746350c86</embed_id>
  <pubDate>Thu, 30 Oct 2025 10:00:44 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="106210379" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/1f92bebb-7e7f-4877-95a1-43a3ee8812bf/episode.mp3" />
  <itunes:title><![CDATA[Episode 146: Hacking Horror Stories]]></itunes:title>
  <itunes:duration>1:50:38</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 146: In this episode of Critical Thinking - Bug Bounty Podcast Justin, Joseph, and Brandyn all sit down to celebrate the spooky season by swapping their scariest bug stories. From frightening fails and firings to hacks with chilling and critical consequences. Grab your flashlight and a blanket for this one!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Network Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/ssti-cache-poisoning-logic-vulnerabilities">Methodology tips from top Bug Bounty hunters</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/news/yeswehack-marks-first-year-of-partnership-with-singapore-government-bug-bounty-programmes">YesWeHack marks first year of partnership with Singapore’s Government</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/report/hacker-powered-security">HackerOne Hacker-Powered Security Report</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/">Critical Research Lab</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/hacking-clubwpt-gold">Hacking the World Poker Tour: Inside ClubWPT Gold’s Back Office</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://muffsec.com/blog/file-creation-via-sqlite-injection/">File Creation via SQLite Injection</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:10:11) Crit Research Lab News</p><p>(00:21:31) Hacking the World Poker Tour &amp; File Creation via SQLite Injection</p><p>(00:30:40) Brandyn's Spooky Bug</p><p>(00:38:02) Joseph's Spooky Bug</p><p>(00:44:18) Justin's Spooky Bug</p><p>(00:54:44) Banking Bugs, LHE Scares, and Workday weirdness.</p><p>(01:14:52) Firings and failures</p><p>(01:22:49) Bank Bug Redux</p><p>(01:35:55) Wedding planning/registry app &amp; Amazon Rufus bugs</p><p>(01:40:52) New Relic bug</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 146: In this episode of Critical Thinking - Bug Bounty Podcast Justin, Joseph, and Brandyn all sit down to celebrate the spooky season by swapping their scariest bug stories. From frightening fails and firings to hacks with chilling and critical consequences. Grab your flashlight and a blanket for this one!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Network Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/ssti-cache-poisoning-logic-vulnerabilities">Methodology tips from top Bug Bounty hunters</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/news/yeswehack-marks-first-year-of-partnership-with-singapore-government-bug-bounty-programmes">YesWeHack marks first year of partnership with Singapore’s Government</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/report/hacker-powered-security">HackerOne Hacker-Powered Security Report</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/">Critical Research Lab</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/hacking-clubwpt-gold">Hacking the World Poker Tour: Inside ClubWPT Gold’s Back Office</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://muffsec.com/blog/file-creation-via-sqlite-injection/">File Creation via SQLite Injection</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:10:11) Crit Research Lab News</p><p>(00:21:31) Hacking the World Poker Tour &amp; File Creation via SQLite Injection</p><p>(00:30:40) Brandyn's Spooky Bug</p><p>(00:38:02) Joseph's Spooky Bug</p><p>(00:44:18) Justin's Spooky Bug</p><p>(00:54:44) Banking Bugs, LHE Scares, and Workday weirdness.</p><p>(01:14:52) Firings and failures</p><p>(01:22:49) Bank Bug Redux</p><p>(01:35:55) Wedding planning/registry app &amp; Amazon Rufus bugs</p><p>(01:40:52) New Relic bug</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 146: In this episode of Critical Thinking - Bug Bounty Podcast Justin, Joseph, and Brandyn all sit down to celebrate the spooky season by swapping their scariest bug stories. From frightening fails and firings to hacks with chilling and cri...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>146</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">2a864b35-ec6e-43e0-979b-93374d407401</guid>
  <title><![CDATA[Episode 145: Gr3pme's Secret: Bug Bounty Note Taking Methodology]]></title>
  <description><![CDATA[<p>Episode 145: In this episode of Critical Thinking - Bug Bounty Podcast Brandyn lets us in on some of his notetaking tips, including his Templates, Threat Modeling, and ways he uses notes to help with collaboration.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, Rez0, &amp; gr3pme on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Network Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>====== This Week in Bug Bounty ======</p><p>The minefield between syntaxes</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/syntax-confusion-ambiguous-parsing-exploits">https://www.yeswehack.com/learn-bug-bounty/syntax-confusion-ambiguous-parsing-exploits</a></p><p>====== Resources ======</p><p>Brandyn's Notion Template</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://terrific-dart-70e.notion.site/Example-Target-CTBB-294f4ca0f42481cca0b0ca6ac0a7c81d">https://terrific-dart-70e.notion.site/Example-Target-CTBB-294f4ca0f42481cca0b0ca6ac0a7c81d</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:07:25) Templates, Target, and Tech Stack</p><p>(00:13:33) Threat Modeling and Attack Vectors</p>]]></description>
  <embed_id>ad305aa1-7346-4f6a-8df6-40fc1b109579</embed_id>
  <pubDate>Thu, 23 Oct 2025 10:00:54 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="27154236" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/790538d8-dd6c-4e43-be78-4572c462dbc6/episode.mp3" />
  <itunes:title><![CDATA[Episode 145: Gr3pme's Secret: Bug Bounty Note Taking Methodology]]></itunes:title>
  <itunes:duration>28:17</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 145: In this episode of Critical Thinking - Bug Bounty Podcast Brandyn lets us in on some of his notetaking tips, including his Templates, Threat Modeling, and ways he uses notes to help with collaboration.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, Rez0, &amp; gr3pme on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Network Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>====== This Week in Bug Bounty ======</p><p>The minefield between syntaxes</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/syntax-confusion-ambiguous-parsing-exploits">https://www.yeswehack.com/learn-bug-bounty/syntax-confusion-ambiguous-parsing-exploits</a></p><p>====== Resources ======</p><p>Brandyn's Notion Template</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://terrific-dart-70e.notion.site/Example-Target-CTBB-294f4ca0f42481cca0b0ca6ac0a7c81d">https://terrific-dart-70e.notion.site/Example-Target-CTBB-294f4ca0f42481cca0b0ca6ac0a7c81d</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:07:25) Templates, Target, and Tech Stack</p><p>(00:13:33) Threat Modeling and Attack Vectors</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 145: In this episode of Critical Thinking - Bug Bounty Podcast Brandyn lets us in on some of his notetaking tips, including his Templates, Threat Modeling, and ways he uses notes to help with collaboration.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, Rez0, &amp; gr3pme on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Network Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>====== This Week in Bug Bounty ======</p><p>The minefield between syntaxes</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/syntax-confusion-ambiguous-parsing-exploits">https://www.yeswehack.com/learn-bug-bounty/syntax-confusion-ambiguous-parsing-exploits</a></p><p>====== Resources ======</p><p>Brandyn's Notion Template</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://terrific-dart-70e.notion.site/Example-Target-CTBB-294f4ca0f42481cca0b0ca6ac0a7c81d">https://terrific-dart-70e.notion.site/Example-Target-CTBB-294f4ca0f42481cca0b0ca6ac0a7c81d</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:07:25) Templates, Target, and Tech Stack</p><p>(00:13:33) Threat Modeling and Attack Vectors</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 145: In this episode of Critical Thinking - Bug Bounty Podcast Brandyn lets us in on some of his notetaking tips, including his Templates, Threat Modeling, and ways he uses notes to help with collaboration.Follow us on twitter at: https://x...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>145</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">fb672abf-83bc-4827-b5e5-458b52e48298</guid>
  <title><![CDATA[Episode 144: Google’s Top AI Hackers: Busfactor and Monke]]></title>
  <description><![CDATA[<p>Episode 144: In this episode of Critical Thinking - Bug Bounty Podcast Joseph is joined by Vitor Falcão and Ciarán Cotter to discuss their success at the recent Mexico LHE, as well as their journey and routines in fulltime hacking. </p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker DAC</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-dac">https://www.criticalthinkingpodcast.io/tl-dac</a></p><p>Today’s Guests:</p><p>Vitor Falcão</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/busf4ctor">https://x.com/busf4ctor</a></p><p>Ciarán Cotter</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/monkehack">https://x.com/monkehack</a> </p><p>====== This Week in Bug Bounty======</p><p>Securing the Age of AI Autonomy: Priorities for 2026</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/events/bionic-hacking">https://www.hackerone.com/events/bionic-hacking</a></p><p>====== Resources ======</p><p>AI Vulnerability Reward Program Rules</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/about/rules/google-friends/5222232590712832/ai-vulnerability-reward-program-rules">https://bughunters.google.com/about/rules/google-friends/5222232590712832/ai-vulnerability-reward-program-rules</a></p><p>My First 3 Months as a Full-Time Bug Bounty Hunter</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://vitorfalcao.com/posts/3-months-as-a-full-time-bug-bounty-hunter/">https://vitorfalcao.com/posts/3-months-as-a-full-time-bug-bounty-hunter/</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:32) Client side Bug Story &amp;  Vitor's BB journey</p><p>(00:13:59) Google LHE Mexico takeaways</p><p>(00:26:55) Full-time hunting reflections</p><p>(00:33:39) Hacking routines</p><p>(00:42:56) Hacking AI</p>]]></description>
  <embed_id>d253c4f4-1eaf-442a-b6e3-2fdf4c187547</embed_id>
  <pubDate>Thu, 16 Oct 2025 10:00:59 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="50562040" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/4a0ee581-2be0-4722-9d79-c72d7556eafb/episode.mp3" />
  <itunes:title><![CDATA[Episode 144: Google’s Top AI Hackers: Busfactor and Monke]]></itunes:title>
  <itunes:duration>52:40</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 144: In this episode of Critical Thinking - Bug Bounty Podcast Joseph is joined by Vitor Falcão and Ciarán Cotter to discuss their success at the recent Mexico LHE, as well as their journey and routines in fulltime hacking. </p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker DAC</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-dac">https://www.criticalthinkingpodcast.io/tl-dac</a></p><p>Today’s Guests:</p><p>Vitor Falcão</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/busf4ctor">https://x.com/busf4ctor</a></p><p>Ciarán Cotter</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/monkehack">https://x.com/monkehack</a> </p><p>====== This Week in Bug Bounty======</p><p>Securing the Age of AI Autonomy: Priorities for 2026</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/events/bionic-hacking">https://www.hackerone.com/events/bionic-hacking</a></p><p>====== Resources ======</p><p>AI Vulnerability Reward Program Rules</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/about/rules/google-friends/5222232590712832/ai-vulnerability-reward-program-rules">https://bughunters.google.com/about/rules/google-friends/5222232590712832/ai-vulnerability-reward-program-rules</a></p><p>My First 3 Months as a Full-Time Bug Bounty Hunter</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://vitorfalcao.com/posts/3-months-as-a-full-time-bug-bounty-hunter/">https://vitorfalcao.com/posts/3-months-as-a-full-time-bug-bounty-hunter/</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:32) Client side Bug Story &amp;  Vitor's BB journey</p><p>(00:13:59) Google LHE Mexico takeaways</p><p>(00:26:55) Full-time hunting reflections</p><p>(00:33:39) Hacking routines</p><p>(00:42:56) Hacking AI</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 144: In this episode of Critical Thinking - Bug Bounty Podcast Joseph is joined by Vitor Falcão and Ciarán Cotter to discuss their success at the recent Mexico LHE, as well as their journey and routines in fulltime hacking. </p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker DAC</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-dac">https://www.criticalthinkingpodcast.io/tl-dac</a></p><p>Today’s Guests:</p><p>Vitor Falcão</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/busf4ctor">https://x.com/busf4ctor</a></p><p>Ciarán Cotter</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/monkehack">https://x.com/monkehack</a> </p><p>====== This Week in Bug Bounty======</p><p>Securing the Age of AI Autonomy: Priorities for 2026</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/events/bionic-hacking">https://www.hackerone.com/events/bionic-hacking</a></p><p>====== Resources ======</p><p>AI Vulnerability Reward Program Rules</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/about/rules/google-friends/5222232590712832/ai-vulnerability-reward-program-rules">https://bughunters.google.com/about/rules/google-friends/5222232590712832/ai-vulnerability-reward-program-rules</a></p><p>My First 3 Months as a Full-Time Bug Bounty Hunter</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://vitorfalcao.com/posts/3-months-as-a-full-time-bug-bounty-hunter/">https://vitorfalcao.com/posts/3-months-as-a-full-time-bug-bounty-hunter/</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:32) Client side Bug Story &amp;  Vitor's BB journey</p><p>(00:13:59) Google LHE Mexico takeaways</p><p>(00:26:55) Full-time hunting reflections</p><p>(00:33:39) Hacking routines</p><p>(00:42:56) Hacking AI</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 144: In this episode of Critical Thinking - Bug Bounty Podcast Joseph is joined by Vitor Falcão and Ciarán Cotter to discuss their success at the recent Mexico LHE, as well as their journey and routines in fulltime hacking. Follow us on twi...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>144</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">d3274bf0-19ec-4ce4-8d17-5fa3a5bbcb56</guid>
  <title><![CDATA[Episode 143: New Cohost + Client-Side Gadgets, LHE Meta — Instant Global Admin in Entra!]]></title>
  <description><![CDATA[<p>Episode 143: In this episode of Critical Thinking - Bug Bounty Podcast Justin brings Brandyn back to announce him as our newest co-host. We chat about recent LHE experiences, and then break down some news. </p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== This Week in Bug Bounty ======</p><p>YesWeHack won the European commission: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/news/european-commission-tender-won-yeswehack">https://www.yeswehack.com/news/european-commission-tender-won-yeswehack</a></p><p>YesWeHack now have authorised cve numbering authority: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/news/yeswehack-authorised-cve-numbering-authority">https://www.yeswehack.com/news/yeswehack-authorised-cve-numbering-authority</a></p><p>A wide range of highly used open source bug bounty program such as Log4J, Systemd, GNOME and a lot more: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://event.yeswehack.com/events/open-the-code-source-the-bounty">https://event.yeswehack.com/events/open-the-code-source-the-bounty</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger-labs.net/xss/xss.php?x=%253Cinput%2520onclick=attributes%5B0%5D.value=%2527%60%2527+URL+%2527%60%2527%253E#$%7Balert(1)">Attributes reference inside HTML</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.huli.tw/2025/09/15/en/xss-without-semicolon-and-parentheses/">Explaining XSS without parentheses and semi-colons</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/blog/6715529872080896/beyond-sandbox-domains-rendering-untrusted-web-content-with-safecontentframe">Beyond Sandbox Domains: Rendering Untrusted Web Content with SafeContentFrame</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/">One Token to rule them all</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/MrTurvey/flareprox">flareprox</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://aituglo.com/caido/">Caido 101: How to master it</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:03:16) LHE approaches and accomplishments</p><p>(00:30:54) Attributes reference inside HTML &amp; Explaining XSS without parentheses and semi-colons</p><p>(00:44:33) One Token to rule them all</p><p>(00:57:13) Flareprox &amp; Caido 101</p>]]></description>
  <embed_id>8cb2e1b4-42e5-425f-afd2-d8b4f2d1188e</embed_id>
  <pubDate>Thu, 09 Oct 2025 10:00:44 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="61810583" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/e042da3e-4dd3-4b11-bd34-b0616a447d2b/episode.mp3" />
  <itunes:title><![CDATA[Episode 143: New Cohost + Client-Side Gadgets, LHE Meta — Instant Global Admin in Entra!]]></itunes:title>
  <itunes:duration>1:04:23</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 143: In this episode of Critical Thinking - Bug Bounty Podcast Justin brings Brandyn back to announce him as our newest co-host. We chat about recent LHE experiences, and then break down some news. </p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== This Week in Bug Bounty ======</p><p>YesWeHack won the European commission: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/news/european-commission-tender-won-yeswehack">https://www.yeswehack.com/news/european-commission-tender-won-yeswehack</a></p><p>YesWeHack now have authorised cve numbering authority: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/news/yeswehack-authorised-cve-numbering-authority">https://www.yeswehack.com/news/yeswehack-authorised-cve-numbering-authority</a></p><p>A wide range of highly used open source bug bounty program such as Log4J, Systemd, GNOME and a lot more: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://event.yeswehack.com/events/open-the-code-source-the-bounty">https://event.yeswehack.com/events/open-the-code-source-the-bounty</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger-labs.net/xss/xss.php?x=%253Cinput%2520onclick=attributes%5B0%5D.value=%2527%60%2527+URL+%2527%60%2527%253E#$%7Balert(1)">Attributes reference inside HTML</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.huli.tw/2025/09/15/en/xss-without-semicolon-and-parentheses/">Explaining XSS without parentheses and semi-colons</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/blog/6715529872080896/beyond-sandbox-domains-rendering-untrusted-web-content-with-safecontentframe">Beyond Sandbox Domains: Rendering Untrusted Web Content with SafeContentFrame</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/">One Token to rule them all</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/MrTurvey/flareprox">flareprox</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://aituglo.com/caido/">Caido 101: How to master it</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:03:16) LHE approaches and accomplishments</p><p>(00:30:54) Attributes reference inside HTML &amp; Explaining XSS without parentheses and semi-colons</p><p>(00:44:33) One Token to rule them all</p><p>(00:57:13) Flareprox &amp; Caido 101</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 143: In this episode of Critical Thinking - Bug Bounty Podcast Justin brings Brandyn back to announce him as our newest co-host. We chat about recent LHE experiences, and then break down some news. </p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== This Week in Bug Bounty ======</p><p>YesWeHack won the European commission: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/news/european-commission-tender-won-yeswehack">https://www.yeswehack.com/news/european-commission-tender-won-yeswehack</a></p><p>YesWeHack now have authorised cve numbering authority: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/news/yeswehack-authorised-cve-numbering-authority">https://www.yeswehack.com/news/yeswehack-authorised-cve-numbering-authority</a></p><p>A wide range of highly used open source bug bounty program such as Log4J, Systemd, GNOME and a lot more: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://event.yeswehack.com/events/open-the-code-source-the-bounty">https://event.yeswehack.com/events/open-the-code-source-the-bounty</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger-labs.net/xss/xss.php?x=%253Cinput%2520onclick=attributes%5B0%5D.value=%2527%60%2527+URL+%2527%60%2527%253E#$%7Balert(1)">Attributes reference inside HTML</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.huli.tw/2025/09/15/en/xss-without-semicolon-and-parentheses/">Explaining XSS without parentheses and semi-colons</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/blog/6715529872080896/beyond-sandbox-domains-rendering-untrusted-web-content-with-safecontentframe">Beyond Sandbox Domains: Rendering Untrusted Web Content with SafeContentFrame</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/">One Token to rule them all</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/MrTurvey/flareprox">flareprox</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://aituglo.com/caido/">Caido 101: How to master it</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:03:16) LHE approaches and accomplishments</p><p>(00:30:54) Attributes reference inside HTML &amp; Explaining XSS without parentheses and semi-colons</p><p>(00:44:33) One Token to rule them all</p><p>(00:57:13) Flareprox &amp; Caido 101</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 143: In this episode of Critical Thinking - Bug Bounty Podcast Justin brings Brandyn back to announce him as our newest co-host. We chat about recent LHE experiences, and then break down some news. Follow us on twitter at: https://x.com/ctb...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>143</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">4a0e5fb4-6f64-4d92-a505-7635b958187d</guid>
  <title><![CDATA[Episode 142: Gr3pme's Full-Time Hunting Journey Update, Insane AI research, And Some Light News]]></title>
  <description><![CDATA[<p>Episode 142: In this episode of Critical Thinking - Bug Bounty Podcast Rez0 and Gr3pme join forces to discuss Websocket research, Meta’s $111750 Bug, PROMISQROUTE, and the opportunities afforded by going full time in Bug Bounty.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0</a> on Twitter:</p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-dac">ThreatLocker DAC</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge-of-the-month">New Monthly Dojo challenge and Dojo UI design</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/ultimate-guide-race-condition-vulnerabilities">The ultimate Bug Bounty guide to exploiting race condition vulnerabilities in web applications</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/marketingrckstr/status/1967958828424802461">Watch Our boy Brandyn on the TV</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://murtasec.com/">murtasec</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/websocket-turbo-intruder-unearthing-the-websocket-goldmine">WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.vulnano.com/2025/09/remote-code-execution-though.html">Remote code execution though vulnerability in Facebook Messenger for Windows</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://semgrep.dev/blog/2025/finding-vulnerabilities-in-modern-web-apps-using-claude-code-and-openai-codex/">Finding vulnerabilities in modern web apps using Claude Code and OpenAI Codex</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arxiv.org/pdf/2508.17155">Mind the Gap</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://adversa.ai/blog/promisqroute-gpt-5-ai-router-novel-vulnerability-class/">PROMISQROUTE</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:16) Full Time Bug Bounty and Business Startups</p><p>(00:15:50) Websockets</p><p>(00:22:17) Meta’s $111750 Bug</p><p>(00:28:38) Finding vulns using Claude Code and OpenAI Codex</p><p>(00:39:32) Time-of-Check to Time-of-Use Vulns in LLM-Enabled Agents</p><p>(00:45:22) PROMISQROUTE</p>]]></description>
  <embed_id>e574c71d-112c-478d-8cbd-46821d9fb00d</embed_id>
  <pubDate>Thu, 02 Oct 2025 10:01:03 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="52642231" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/4dd50178-7b39-4469-bd61-5fb909f3a697/episode.mp3" />
  <itunes:title><![CDATA[Episode 142: Gr3pme's Full-Time Hunting Journey Update, Insane AI research, And Some Light News]]></itunes:title>
  <itunes:duration>54:50</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 142: In this episode of Critical Thinking - Bug Bounty Podcast Rez0 and Gr3pme join forces to discuss Websocket research, Meta’s $111750 Bug, PROMISQROUTE, and the opportunities afforded by going full time in Bug Bounty.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0</a> on Twitter:</p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-dac">ThreatLocker DAC</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge-of-the-month">New Monthly Dojo challenge and Dojo UI design</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/ultimate-guide-race-condition-vulnerabilities">The ultimate Bug Bounty guide to exploiting race condition vulnerabilities in web applications</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/marketingrckstr/status/1967958828424802461">Watch Our boy Brandyn on the TV</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://murtasec.com/">murtasec</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/websocket-turbo-intruder-unearthing-the-websocket-goldmine">WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.vulnano.com/2025/09/remote-code-execution-though.html">Remote code execution though vulnerability in Facebook Messenger for Windows</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://semgrep.dev/blog/2025/finding-vulnerabilities-in-modern-web-apps-using-claude-code-and-openai-codex/">Finding vulnerabilities in modern web apps using Claude Code and OpenAI Codex</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arxiv.org/pdf/2508.17155">Mind the Gap</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://adversa.ai/blog/promisqroute-gpt-5-ai-router-novel-vulnerability-class/">PROMISQROUTE</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:16) Full Time Bug Bounty and Business Startups</p><p>(00:15:50) Websockets</p><p>(00:22:17) Meta’s $111750 Bug</p><p>(00:28:38) Finding vulns using Claude Code and OpenAI Codex</p><p>(00:39:32) Time-of-Check to Time-of-Use Vulns in LLM-Enabled Agents</p><p>(00:45:22) PROMISQROUTE</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 142: In this episode of Critical Thinking - Bug Bounty Podcast Rez0 and Gr3pme join forces to discuss Websocket research, Meta’s $111750 Bug, PROMISQROUTE, and the opportunities afforded by going full time in Bug Bounty.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0</a> on Twitter:</p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-dac">ThreatLocker DAC</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge-of-the-month">New Monthly Dojo challenge and Dojo UI design</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/ultimate-guide-race-condition-vulnerabilities">The ultimate Bug Bounty guide to exploiting race condition vulnerabilities in web applications</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/marketingrckstr/status/1967958828424802461">Watch Our boy Brandyn on the TV</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://murtasec.com/">murtasec</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/websocket-turbo-intruder-unearthing-the-websocket-goldmine">WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.vulnano.com/2025/09/remote-code-execution-though.html">Remote code execution though vulnerability in Facebook Messenger for Windows</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://semgrep.dev/blog/2025/finding-vulnerabilities-in-modern-web-apps-using-claude-code-and-openai-codex/">Finding vulnerabilities in modern web apps using Claude Code and OpenAI Codex</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arxiv.org/pdf/2508.17155">Mind the Gap</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://adversa.ai/blog/promisqroute-gpt-5-ai-router-novel-vulnerability-class/">PROMISQROUTE</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:16) Full Time Bug Bounty and Business Startups</p><p>(00:15:50) Websockets</p><p>(00:22:17) Meta’s $111750 Bug</p><p>(00:28:38) Finding vulns using Claude Code and OpenAI Codex</p><p>(00:39:32) Time-of-Check to Time-of-Use Vulns in LLM-Enabled Agents</p><p>(00:45:22) PROMISQROUTE</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 142: In this episode of Critical Thinking - Bug Bounty Podcast Rez0 and Gr3pme join forces to discuss Websocket research, Meta’s $111750 Bug, PROMISQROUTE, and the opportunities afforded by going full time in Bug Bounty.Follow us on twitter...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>142</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">04975930-217d-4443-a3b5-71300167ff22</guid>
  <title><![CDATA[Episode 141: Hacking the Pod - Google Docs 0-day & React CreateElement Exploits with Nick Copi (7urb0)]]></title>
  <description><![CDATA[<p>Episode 141: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Nick Copi to talk about CSPT, React, CSS Injections and how Nick hacked the pod.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker DAC</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-dac">https://www.criticalthinkingpodcast.io/tl-dac</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/7urb01">https://x.com/7urb01</a></p><p>====== Resources ======</p><p>regexploit</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/doyensec/regexploit">https://github.com/doyensec/regexploit</a></p><p>Fontleak</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://adragos.ro/fontleak/">https://adragos.ro/fontleak/</a></p><p>debug(function)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.chrome.com/docs/devtools/console/utilities#debug-function">https://developer.chrome.com/docs/devtools/console/utilities#debug-function</a></p><p>domloggerpp</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/kevin-mizu/domloggerpp">https://github.com/kevin-mizu/domloggerpp</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:40) Google Docs Bug and 7urb0 Introduction</p><p>(00:13:26) Bring-a-bug story</p><p>(00:20:21) 7urb0's DEFCON talk teaser &amp; Intrusive Thoughts Worth Sharing</p><p>(00:30:01) CSPTs and React Apps</p><p>(00:51:31) CSS Injections</p><p>(01:04:55) 7urb0's backstory and game hacking</p><p>(01:18:33) Worst Crit</p>]]></description>
  <embed_id>d52c6a52-0283-4099-be87-d9fc633c5ab9</embed_id>
  <pubDate>Thu, 25 Sep 2025 10:01:10 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="80178218" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/300c3626-5c37-41bc-8b56-5d7d1abf96ca/episode.mp3" />
  <itunes:title><![CDATA[Episode 141: Hacking the Pod - Google Docs 0-day & React CreateElement Exploits with Nick Copi (7urb0)]]></itunes:title>
  <itunes:duration>1:23:31</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 141: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Nick Copi to talk about CSPT, React, CSS Injections and how Nick hacked the pod.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker DAC</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-dac">https://www.criticalthinkingpodcast.io/tl-dac</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/7urb01">https://x.com/7urb01</a></p><p>====== Resources ======</p><p>regexploit</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/doyensec/regexploit">https://github.com/doyensec/regexploit</a></p><p>Fontleak</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://adragos.ro/fontleak/">https://adragos.ro/fontleak/</a></p><p>debug(function)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.chrome.com/docs/devtools/console/utilities#debug-function">https://developer.chrome.com/docs/devtools/console/utilities#debug-function</a></p><p>domloggerpp</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/kevin-mizu/domloggerpp">https://github.com/kevin-mizu/domloggerpp</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:40) Google Docs Bug and 7urb0 Introduction</p><p>(00:13:26) Bring-a-bug story</p><p>(00:20:21) 7urb0's DEFCON talk teaser &amp; Intrusive Thoughts Worth Sharing</p><p>(00:30:01) CSPTs and React Apps</p><p>(00:51:31) CSS Injections</p><p>(01:04:55) 7urb0's backstory and game hacking</p><p>(01:18:33) Worst Crit</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 141: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Nick Copi to talk about CSPT, React, CSS Injections and how Nick hacked the pod.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker DAC</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-dac">https://www.criticalthinkingpodcast.io/tl-dac</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/7urb01">https://x.com/7urb01</a></p><p>====== Resources ======</p><p>regexploit</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/doyensec/regexploit">https://github.com/doyensec/regexploit</a></p><p>Fontleak</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://adragos.ro/fontleak/">https://adragos.ro/fontleak/</a></p><p>debug(function)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.chrome.com/docs/devtools/console/utilities#debug-function">https://developer.chrome.com/docs/devtools/console/utilities#debug-function</a></p><p>domloggerpp</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/kevin-mizu/domloggerpp">https://github.com/kevin-mizu/domloggerpp</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:40) Google Docs Bug and 7urb0 Introduction</p><p>(00:13:26) Bring-a-bug story</p><p>(00:20:21) 7urb0's DEFCON talk teaser &amp; Intrusive Thoughts Worth Sharing</p><p>(00:30:01) CSPTs and React Apps</p><p>(00:51:31) CSS Injections</p><p>(01:04:55) 7urb0's backstory and game hacking</p><p>(01:18:33) Worst Crit</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 141: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Nick Copi to talk about CSPT, React, CSS Injections and how Nick hacked the pod.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggest...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>141</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">33f35a85-a916-4e97-a35e-eaacda44a177</guid>
  <title><![CDATA[Episode 140: Crit Research Lab Update & Client-Side Tricks Galore]]></title>
  <description><![CDATA[<p>Episode 140: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph give an update from The Crit Research Lab, as well as some writeups on postMessage vulnerabilities, Cookie Chaos, and more.</p><p>Follow us on X at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Send us feedback at <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">Discord</a>!</p><p>Get some <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">hacker swag here!</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/ultimate-guide-csrf-vulnerabilities">Cross-site request forgery</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/blog/hackerone-portswigger-hacker-milestone-rewards-program">HackerOne New Milestone Program</a></p><p>Email <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:santerra.holler@bugcrowd.com">santerra.holler@bugcrowd.com</a> for media opportunities</p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://criticalthinkingpodcast.github.io/research/Exploiting-web-worker-XSS-with-blobs">Exploiting Web Worker XSS with Blobs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/p/critical-research-lab/">Critical Research Lab</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__/status/1965848719863193827">Rez0's Tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jub0bs.com/posts/2022-02-08-cve-2022-21703-writeup/">CVE-2022-21703: cross-origin request forgery against Grafana</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/terjanq/status/1965041537680822534">Conversation about Forcing Quirks Mode</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__/status/1965582855322419383">AI Busniess Logic &amp; POC or GTFO</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.ryukudz.com/posts/postmessage-part-1/">Hunting postMessage Vulnerabilities – Part 1</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.ryukudz.com/posts/postmessage-part-2/">Hunting postMessage Vulnerabilities – Part 2</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://executiveoffense.beehiiv.com/p/ai-hackbots-part-1">Executive Offense</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/cookie-chaos-how-to-bypass-host-and-secure-cookie-prefixes">Cookie Chaos: How to bypass Host and<strong> </strong>Secure cookie prefixes</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:48) Crit Research Update</p><p>(00:13:00) Encouragement &amp; Collaboration</p><p>(00:19:37) Cross-origin request forgery &amp; Anthropic's web fetch</p><p>(00:29:17) Quirks Mode, AI Business Logic &amp; POC or GTFO</p><p>(00:44:21) Hunting postMessage &amp; Claude Code browserbase</p><p>(00:51:25) Community story, Executive Offense, &amp; Cookie Chaos</p>]]></description>
  <embed_id>a3f926e1-40f7-4470-b1be-3fe35120fa68</embed_id>
  <pubDate>Thu, 18 Sep 2025 10:01:17 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="55377766" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/bb4b2f37-30d3-4564-921b-711606ad03c1/episode.mp3" />
  <itunes:title><![CDATA[Episode 140: Crit Research Lab Update & Client-Side Tricks Galore]]></itunes:title>
  <itunes:duration>57:41</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 140: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph give an update from The Crit Research Lab, as well as some writeups on postMessage vulnerabilities, Cookie Chaos, and more.</p><p>Follow us on X at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Send us feedback at <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">Discord</a>!</p><p>Get some <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">hacker swag here!</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/ultimate-guide-csrf-vulnerabilities">Cross-site request forgery</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/blog/hackerone-portswigger-hacker-milestone-rewards-program">HackerOne New Milestone Program</a></p><p>Email <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:santerra.holler@bugcrowd.com">santerra.holler@bugcrowd.com</a> for media opportunities</p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://criticalthinkingpodcast.github.io/research/Exploiting-web-worker-XSS-with-blobs">Exploiting Web Worker XSS with Blobs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/p/critical-research-lab/">Critical Research Lab</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__/status/1965848719863193827">Rez0's Tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jub0bs.com/posts/2022-02-08-cve-2022-21703-writeup/">CVE-2022-21703: cross-origin request forgery against Grafana</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/terjanq/status/1965041537680822534">Conversation about Forcing Quirks Mode</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__/status/1965582855322419383">AI Busniess Logic &amp; POC or GTFO</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.ryukudz.com/posts/postmessage-part-1/">Hunting postMessage Vulnerabilities – Part 1</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.ryukudz.com/posts/postmessage-part-2/">Hunting postMessage Vulnerabilities – Part 2</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://executiveoffense.beehiiv.com/p/ai-hackbots-part-1">Executive Offense</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/cookie-chaos-how-to-bypass-host-and-secure-cookie-prefixes">Cookie Chaos: How to bypass Host and<strong> </strong>Secure cookie prefixes</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:48) Crit Research Update</p><p>(00:13:00) Encouragement &amp; Collaboration</p><p>(00:19:37) Cross-origin request forgery &amp; Anthropic's web fetch</p><p>(00:29:17) Quirks Mode, AI Business Logic &amp; POC or GTFO</p><p>(00:44:21) Hunting postMessage &amp; Claude Code browserbase</p><p>(00:51:25) Community story, Executive Offense, &amp; Cookie Chaos</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 140: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph give an update from The Crit Research Lab, as well as some writeups on postMessage vulnerabilities, Cookie Chaos, and more.</p><p>Follow us on X at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Send us feedback at <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">Discord</a>!</p><p>Get some <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">hacker swag here!</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/ultimate-guide-csrf-vulnerabilities">Cross-site request forgery</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/blog/hackerone-portswigger-hacker-milestone-rewards-program">HackerOne New Milestone Program</a></p><p>Email <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:santerra.holler@bugcrowd.com">santerra.holler@bugcrowd.com</a> for media opportunities</p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://criticalthinkingpodcast.github.io/research/Exploiting-web-worker-XSS-with-blobs">Exploiting Web Worker XSS with Blobs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/p/critical-research-lab/">Critical Research Lab</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__/status/1965848719863193827">Rez0's Tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jub0bs.com/posts/2022-02-08-cve-2022-21703-writeup/">CVE-2022-21703: cross-origin request forgery against Grafana</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/terjanq/status/1965041537680822534">Conversation about Forcing Quirks Mode</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__/status/1965582855322419383">AI Busniess Logic &amp; POC or GTFO</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.ryukudz.com/posts/postmessage-part-1/">Hunting postMessage Vulnerabilities – Part 1</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.ryukudz.com/posts/postmessage-part-2/">Hunting postMessage Vulnerabilities – Part 2</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://executiveoffense.beehiiv.com/p/ai-hackbots-part-1">Executive Offense</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/cookie-chaos-how-to-bypass-host-and-secure-cookie-prefixes">Cookie Chaos: How to bypass Host and<strong> </strong>Secure cookie prefixes</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:48) Crit Research Update</p><p>(00:13:00) Encouragement &amp; Collaboration</p><p>(00:19:37) Cross-origin request forgery &amp; Anthropic's web fetch</p><p>(00:29:17) Quirks Mode, AI Business Logic &amp; POC or GTFO</p><p>(00:44:21) Hunting postMessage &amp; Claude Code browserbase</p><p>(00:51:25) Community story, Executive Offense, &amp; Cookie Chaos</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 140: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph give an update from The Crit Research Lab, as well as some writeups on postMessage vulnerabilities, Cookie Chaos, and more.Follow us on X at: https://x.com/ctb...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>140</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">b433c481-2053-446c-afb6-645fb9483af9</guid>
  <title><![CDATA[Episode 139: James Kettle - Pwning in Prod & How to do Web Security Research]]></title>
  <description><![CDATA[<p>Episode 139: In this episode of Critical Thinking - Bug Bounty Podcast Justin finally sits down with the great James Kettle to talk about HTTP Proxys, metagaming research, avoiding burnout, and why HTTP/1.1 must die!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/albinowax">https://x.com/albinowax</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jameskettle.com">https://jameskettle.com</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/android-lab-mobile-hacking-tools?utm_source=x&amp;utm_medium=social&amp;utm_campaign=android-lab-mobile">Building an Android Bug Bounty lab</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/mobile-hacking-resource-kit-your-one%E2%80%91stop-hub-for-ios-and-android-pen-testing/">Mobile Hacking Toolkit</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720">CVE-2022-22720</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/so-you-want-to-be-a-web-security-researcher">So you want to be a web security researcher?</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/skbKjO8ahCI?feature=shared&amp;t=1252">Hunting Evasive Vulnerabilities: Finding Flaws That Others Miss by James Kettle</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/talks?talkId=32">HTTP/1.1 Must Die! The Desync Endgame</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.skeletonscribe.net/2013/05/practical-http-host-header-attacks.html">Practical HTTP Host header attacks</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:01) Apache MITM-powered pause-based client-side desync</p><p>(00:15:33) HTTP Proxys and Burp Suite  HTTP/2 in Repeater</p><p>(00:24:52) AI intagrations, life structure, and avoiding burnout</p><p>(00:35:23) Client-side to server-side progression</p><p>(00:47:39) The 'metagame' of security research</p><p>(01:29:43) Host Header Attacks &amp; HTTP/1.1 Must Die! </p><p>(02:02:34) Is HTTP/2 the solution?</p>]]></description>
  <embed_id>b5cad591-2fa7-4d87-aae5-28cc359befcf</embed_id>
  <pubDate>Thu, 11 Sep 2025 10:01:12 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="136178479" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/cbcd7703-0765-483e-9261-9c6c7c4ae001/episode.mp3" />
  <itunes:title><![CDATA[Episode 139: James Kettle - Pwning in Prod & How to do Web Security Research]]></itunes:title>
  <itunes:duration>2:21:51</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 139: In this episode of Critical Thinking - Bug Bounty Podcast Justin finally sits down with the great James Kettle to talk about HTTP Proxys, metagaming research, avoiding burnout, and why HTTP/1.1 must die!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/albinowax">https://x.com/albinowax</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jameskettle.com">https://jameskettle.com</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/android-lab-mobile-hacking-tools?utm_source=x&amp;utm_medium=social&amp;utm_campaign=android-lab-mobile">Building an Android Bug Bounty lab</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/mobile-hacking-resource-kit-your-one%E2%80%91stop-hub-for-ios-and-android-pen-testing/">Mobile Hacking Toolkit</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720">CVE-2022-22720</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/so-you-want-to-be-a-web-security-researcher">So you want to be a web security researcher?</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/skbKjO8ahCI?feature=shared&amp;t=1252">Hunting Evasive Vulnerabilities: Finding Flaws That Others Miss by James Kettle</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/talks?talkId=32">HTTP/1.1 Must Die! The Desync Endgame</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.skeletonscribe.net/2013/05/practical-http-host-header-attacks.html">Practical HTTP Host header attacks</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:01) Apache MITM-powered pause-based client-side desync</p><p>(00:15:33) HTTP Proxys and Burp Suite  HTTP/2 in Repeater</p><p>(00:24:52) AI intagrations, life structure, and avoiding burnout</p><p>(00:35:23) Client-side to server-side progression</p><p>(00:47:39) The 'metagame' of security research</p><p>(01:29:43) Host Header Attacks &amp; HTTP/1.1 Must Die! </p><p>(02:02:34) Is HTTP/2 the solution?</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 139: In this episode of Critical Thinking - Bug Bounty Podcast Justin finally sits down with the great James Kettle to talk about HTTP Proxys, metagaming research, avoiding burnout, and why HTTP/1.1 must die!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/albinowax">https://x.com/albinowax</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jameskettle.com">https://jameskettle.com</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/android-lab-mobile-hacking-tools?utm_source=x&amp;utm_medium=social&amp;utm_campaign=android-lab-mobile">Building an Android Bug Bounty lab</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/mobile-hacking-resource-kit-your-one%E2%80%91stop-hub-for-ios-and-android-pen-testing/">Mobile Hacking Toolkit</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720">CVE-2022-22720</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/so-you-want-to-be-a-web-security-researcher">So you want to be a web security researcher?</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/skbKjO8ahCI?feature=shared&amp;t=1252">Hunting Evasive Vulnerabilities: Finding Flaws That Others Miss by James Kettle</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/talks?talkId=32">HTTP/1.1 Must Die! The Desync Endgame</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.skeletonscribe.net/2013/05/practical-http-host-header-attacks.html">Practical HTTP Host header attacks</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:01) Apache MITM-powered pause-based client-side desync</p><p>(00:15:33) HTTP Proxys and Burp Suite  HTTP/2 in Repeater</p><p>(00:24:52) AI intagrations, life structure, and avoiding burnout</p><p>(00:35:23) Client-side to server-side progression</p><p>(00:47:39) The 'metagame' of security research</p><p>(01:29:43) Host Header Attacks &amp; HTTP/1.1 Must Die! </p><p>(02:02:34) Is HTTP/2 the solution?</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 139: In this episode of Critical Thinking - Bug Bounty Podcast Justin finally sits down with the great James Kettle to talk about HTTP Proxys, metagaming research, avoiding burnout, and why HTTP/1.1 must die!Follow us on twitter at: https:/...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>139</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">0a3bf57b-871a-4d83-ac92-28bcea92a22f</guid>
  <title><![CDATA[Episode 138: Caido Tools and Workflows]]></title>
  <description><![CDATA[<p>Episode 138: In this episode of Critical Thinking - Bug Bounty Podcast We’re talking Caido tools and workflows. Justin gives us a list of some of the Caido tools that have caught his interest, as well as how he’s using them.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== This Week in Bug Bounty ======</p><p>Meet YesWeHack at ROOTCON 2025</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/meet-yeswehack-at-rootcon-2025">https://www.yeswehack.com/page/meet-yeswehack-at-rootcon-2025</a></p><p>New Dojo challenge featuring a Local File Inclusion in a Ruby application</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge-of-the-month/dojo-44?utm_source=sponsor&amp;utm_medium=challenge&amp;utm_campaign=dojo-44">https://dojo-yeswehack.com/challenge-of-the-month/dojo-44?utm_source=sponsor&amp;utm_medium=challenge&amp;utm_campaign=dojo-44</a></p><p>AI Red Teaming CTF</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctf.hackthebox.com/event/details/ai-red-teaming-ctf-ai-gon3-rogu3-2604">https://ctf.hackthebox.com/event/details/ai-red-teaming-ctf-ai-gon3-rogu3-2604</a></p><p>====== Resources ======</p><p>Web Security Labs</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://caido.rhynorater.com">http://caido.rhynorater.com</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:32) Common filters &amp; command palette in EvenBetter</p><p>(00:06:49) Notes++</p><p>(00:09:28) Shift Agents and Drop</p><p>(00:15:34) Workflows</p>]]></description>
  <embed_id>4f3ae1ac-0cf0-445a-8bae-f8feddc6f0d0</embed_id>
  <pubDate>Thu, 04 Sep 2025 10:00:51 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="21746262" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/bf9450ce-fa29-4b2d-b943-b44da60a9a24/episode.mp3" />
  <itunes:title><![CDATA[Episode 138: Caido Tools and Workflows]]></itunes:title>
  <itunes:duration>22:39</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 138: In this episode of Critical Thinking - Bug Bounty Podcast We’re talking Caido tools and workflows. Justin gives us a list of some of the Caido tools that have caught his interest, as well as how he’s using them.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== This Week in Bug Bounty ======</p><p>Meet YesWeHack at ROOTCON 2025</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/meet-yeswehack-at-rootcon-2025">https://www.yeswehack.com/page/meet-yeswehack-at-rootcon-2025</a></p><p>New Dojo challenge featuring a Local File Inclusion in a Ruby application</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge-of-the-month/dojo-44?utm_source=sponsor&amp;utm_medium=challenge&amp;utm_campaign=dojo-44">https://dojo-yeswehack.com/challenge-of-the-month/dojo-44?utm_source=sponsor&amp;utm_medium=challenge&amp;utm_campaign=dojo-44</a></p><p>AI Red Teaming CTF</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctf.hackthebox.com/event/details/ai-red-teaming-ctf-ai-gon3-rogu3-2604">https://ctf.hackthebox.com/event/details/ai-red-teaming-ctf-ai-gon3-rogu3-2604</a></p><p>====== Resources ======</p><p>Web Security Labs</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://caido.rhynorater.com">http://caido.rhynorater.com</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:32) Common filters &amp; command palette in EvenBetter</p><p>(00:06:49) Notes++</p><p>(00:09:28) Shift Agents and Drop</p><p>(00:15:34) Workflows</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 138: In this episode of Critical Thinking - Bug Bounty Podcast We’re talking Caido tools and workflows. Justin gives us a list of some of the Caido tools that have caught his interest, as well as how he’s using them.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== This Week in Bug Bounty ======</p><p>Meet YesWeHack at ROOTCON 2025</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/meet-yeswehack-at-rootcon-2025">https://www.yeswehack.com/page/meet-yeswehack-at-rootcon-2025</a></p><p>New Dojo challenge featuring a Local File Inclusion in a Ruby application</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge-of-the-month/dojo-44?utm_source=sponsor&amp;utm_medium=challenge&amp;utm_campaign=dojo-44">https://dojo-yeswehack.com/challenge-of-the-month/dojo-44?utm_source=sponsor&amp;utm_medium=challenge&amp;utm_campaign=dojo-44</a></p><p>AI Red Teaming CTF</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctf.hackthebox.com/event/details/ai-red-teaming-ctf-ai-gon3-rogu3-2604">https://ctf.hackthebox.com/event/details/ai-red-teaming-ctf-ai-gon3-rogu3-2604</a></p><p>====== Resources ======</p><p>Web Security Labs</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://caido.rhynorater.com">http://caido.rhynorater.com</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:32) Common filters &amp; command palette in EvenBetter</p><p>(00:06:49) Notes++</p><p>(00:09:28) Shift Agents and Drop</p><p>(00:15:34) Workflows</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 138: In this episode of Critical Thinking - Bug Bounty Podcast We’re talking Caido tools and workflows. Justin gives us a list of some of the Caido tools that have caught his interest, as well as how he’s using them.Follow us on twitter at:...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>138</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">e46d2ed2-f56f-41b8-a4db-dc8488c90a8d</guid>
  <title><![CDATA[Episode 137: How We Do AI-Assisted Whitebox Review, New CSPT Gadgets, and Tools from SLCyber]]></title>
  <description><![CDATA[<p>Episode 137: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner and Joseph Thacker reunite to talk about AI Hacking Assistants, CSPT and cache deception, and a bunch of tools like <a target="_blank" rel="noopener noreferrer nofollow" href="http://ch.at">ch.at</a>, Slice, Ebka, and more.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/vulnerability-vectors-sql-injection?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=sqli-vuln-vectors">Vulnerability vectors: SQL injection for Bug Bounty hunters</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/2995025">Mozilla VPN Clients: RCE via file write and path traversal</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zere.es/posts/cache-deception-cspt-account-takeover/">Cache Deception + CSPT:</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Arxiv_Daily/status/1952452878716805172">dig @ch.at</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://Tools.slcyber.io">Searchlight Cyber Tools</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/noperator/slice">Slice</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Slonser/Ebka-Caido-AI">Ebka-Caido-AI</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/reports/vrp/wG2bN8vZr">postMessage targetOrigin bypass</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:01:26) Claude, Gemini, and Hacking Assistants</p><p>(00:11:08) AI Safety</p><p>(00:18:09) CSPT</p><p>(00:23:26) <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Arxiv_Daily/status/1952452878716805172">ch.at</a>, Slice, Ebka, &amp; Searchlight Cyber Tools</p><p>(00:45:19) postMessage targetOrigin bypass</p>]]></description>
  <embed_id>344326e2-5cb3-44fe-911d-3246c9577d8f</embed_id>
  <pubDate>Thu, 28 Aug 2025 10:00:32 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="47186609" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/991533aa-8ab9-4786-8dda-8a5f459ae896/episode.mp3" />
  <itunes:title><![CDATA[Episode 137: How We Do AI-Assisted Whitebox Review, New CSPT Gadgets, and Tools from SLCyber]]></itunes:title>
  <itunes:duration>49:09</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 137: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner and Joseph Thacker reunite to talk about AI Hacking Assistants, CSPT and cache deception, and a bunch of tools like <a target="_blank" rel="noopener noreferrer nofollow" href="http://ch.at">ch.at</a>, Slice, Ebka, and more.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/vulnerability-vectors-sql-injection?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=sqli-vuln-vectors">Vulnerability vectors: SQL injection for Bug Bounty hunters</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/2995025">Mozilla VPN Clients: RCE via file write and path traversal</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zere.es/posts/cache-deception-cspt-account-takeover/">Cache Deception + CSPT:</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Arxiv_Daily/status/1952452878716805172">dig @ch.at</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://Tools.slcyber.io">Searchlight Cyber Tools</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/noperator/slice">Slice</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Slonser/Ebka-Caido-AI">Ebka-Caido-AI</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/reports/vrp/wG2bN8vZr">postMessage targetOrigin bypass</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:01:26) Claude, Gemini, and Hacking Assistants</p><p>(00:11:08) AI Safety</p><p>(00:18:09) CSPT</p><p>(00:23:26) <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Arxiv_Daily/status/1952452878716805172">ch.at</a>, Slice, Ebka, &amp; Searchlight Cyber Tools</p><p>(00:45:19) postMessage targetOrigin bypass</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 137: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner and Joseph Thacker reunite to talk about AI Hacking Assistants, CSPT and cache deception, and a bunch of tools like <a target="_blank" rel="noopener noreferrer nofollow" href="http://ch.at">ch.at</a>, Slice, Ebka, and more.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/vulnerability-vectors-sql-injection?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=sqli-vuln-vectors">Vulnerability vectors: SQL injection for Bug Bounty hunters</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/2995025">Mozilla VPN Clients: RCE via file write and path traversal</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zere.es/posts/cache-deception-cspt-account-takeover/">Cache Deception + CSPT:</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Arxiv_Daily/status/1952452878716805172">dig @ch.at</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://Tools.slcyber.io">Searchlight Cyber Tools</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/noperator/slice">Slice</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Slonser/Ebka-Caido-AI">Ebka-Caido-AI</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/reports/vrp/wG2bN8vZr">postMessage targetOrigin bypass</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:01:26) Claude, Gemini, and Hacking Assistants</p><p>(00:11:08) AI Safety</p><p>(00:18:09) CSPT</p><p>(00:23:26) <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Arxiv_Daily/status/1952452878716805172">ch.at</a>, Slice, Ebka, &amp; Searchlight Cyber Tools</p><p>(00:45:19) postMessage targetOrigin bypass</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 137: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner and Joseph Thacker reunite to talk about AI Hacking Assistants, CSPT and cache deception, and a bunch of tools like ch.at, Slice, Ebka, and more.Follow us on twit...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>137</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">b3907eb4-cc30-4935-8e3f-5938b5745b47</guid>
  <title><![CDATA[Episode 136: Hacking Cluely, AI Prod Sec, and How To Not Get Sued with Jack Cable]]></title>
  <description><![CDATA[<p>Episode 136: In this episode of Critical Thinking - Bug Bounty Podcast, Joseph Thacker sits down with Jack Cable to get the scoop on a significant bug in Cluely’s desktop application, as well as the resulting drama. They also talk about Jack’s background in government cybersecurity initiatives, and the legal risks faced by security researchers.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker. Checkout ThreatLocker Detect! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect">https://www.criticalthinkingpodcast.io/tl-detect</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/jackhcable?lang=en">https://x.com/jackhcable?lang=en</a></p><p>====== This Week in Bug Bounty ======</p><p>Nullcon Berlin</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/yeswehack-live-hacking-nullcon-berlin-2025?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=lhe-nullcon-berlin">https://www.yeswehack.com/page/yeswehack-live-hacking-nullcon-berlin-2025?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=lhe-nullcon-berlin</a></p><p>BB Bulletin #15</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/pulse/bug-bounty-bulletin-15-yes-we-hack-dntue/">https://www.linkedin.com/pulse/bug-bounty-bulletin-15-yes-we-hack-dntue/</a></p><p>2x Bounty on Grab</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/grab?type=team">https://hackerone.com/grab?type=team</a></p><p>====== Resources ======</p><p>Corridor</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://corridor.dev/">https://corridor.dev/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://disclose.io">disclose.io</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://disclose.io/">https://disclose.io/</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:03:33) Cluely Bug, Government involvement, &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="http://Disclosed.io">Disclosed.io</a></p><p>(00:12:33) AI in security &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="http://Corridor.dev">Corridor.dev</a></p><p>(00:29:23) Cluely Bug Fallout &amp; Ethics of hacking outside of Programs</p><p>(00:41:20) Shift Agents</p>]]></description>
  <embed_id>b932e530-0962-4432-92e8-7e8d17ddd005</embed_id>
  <pubDate>Thu, 21 Aug 2025 10:00:52 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="48850497" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/69890baa-1c14-4da8-b1da-ab9c45f9b71c/episode.mp3" />
  <itunes:title><![CDATA[Episode 136: Hacking Cluely, AI Prod Sec, and How To Not Get Sued with Jack Cable]]></itunes:title>
  <itunes:duration>50:53</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 136: In this episode of Critical Thinking - Bug Bounty Podcast, Joseph Thacker sits down with Jack Cable to get the scoop on a significant bug in Cluely’s desktop application, as well as the resulting drama. They also talk about Jack’s background in government cybersecurity initiatives, and the legal risks faced by security researchers.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker. Checkout ThreatLocker Detect! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect">https://www.criticalthinkingpodcast.io/tl-detect</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/jackhcable?lang=en">https://x.com/jackhcable?lang=en</a></p><p>====== This Week in Bug Bounty ======</p><p>Nullcon Berlin</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/yeswehack-live-hacking-nullcon-berlin-2025?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=lhe-nullcon-berlin">https://www.yeswehack.com/page/yeswehack-live-hacking-nullcon-berlin-2025?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=lhe-nullcon-berlin</a></p><p>BB Bulletin #15</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/pulse/bug-bounty-bulletin-15-yes-we-hack-dntue/">https://www.linkedin.com/pulse/bug-bounty-bulletin-15-yes-we-hack-dntue/</a></p><p>2x Bounty on Grab</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/grab?type=team">https://hackerone.com/grab?type=team</a></p><p>====== Resources ======</p><p>Corridor</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://corridor.dev/">https://corridor.dev/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://disclose.io">disclose.io</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://disclose.io/">https://disclose.io/</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:03:33) Cluely Bug, Government involvement, &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="http://Disclosed.io">Disclosed.io</a></p><p>(00:12:33) AI in security &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="http://Corridor.dev">Corridor.dev</a></p><p>(00:29:23) Cluely Bug Fallout &amp; Ethics of hacking outside of Programs</p><p>(00:41:20) Shift Agents</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 136: In this episode of Critical Thinking - Bug Bounty Podcast, Joseph Thacker sits down with Jack Cable to get the scoop on a significant bug in Cluely’s desktop application, as well as the resulting drama. They also talk about Jack’s background in government cybersecurity initiatives, and the legal risks faced by security researchers.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker. Checkout ThreatLocker Detect! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect">https://www.criticalthinkingpodcast.io/tl-detect</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/jackhcable?lang=en">https://x.com/jackhcable?lang=en</a></p><p>====== This Week in Bug Bounty ======</p><p>Nullcon Berlin</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/yeswehack-live-hacking-nullcon-berlin-2025?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=lhe-nullcon-berlin">https://www.yeswehack.com/page/yeswehack-live-hacking-nullcon-berlin-2025?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=lhe-nullcon-berlin</a></p><p>BB Bulletin #15</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/pulse/bug-bounty-bulletin-15-yes-we-hack-dntue/">https://www.linkedin.com/pulse/bug-bounty-bulletin-15-yes-we-hack-dntue/</a></p><p>2x Bounty on Grab</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/grab?type=team">https://hackerone.com/grab?type=team</a></p><p>====== Resources ======</p><p>Corridor</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://corridor.dev/">https://corridor.dev/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://disclose.io">disclose.io</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://disclose.io/">https://disclose.io/</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:03:33) Cluely Bug, Government involvement, &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="http://Disclosed.io">Disclosed.io</a></p><p>(00:12:33) AI in security &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="http://Corridor.dev">Corridor.dev</a></p><p>(00:29:23) Cluely Bug Fallout &amp; Ethics of hacking outside of Programs</p><p>(00:41:20) Shift Agents</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 136: In this episode of Critical Thinking - Bug Bounty Podcast, Joseph Thacker sits down with Jack Cable to get the scoop on a significant bug in Cluely’s desktop application, as well as the resulting drama. They also talk about Jack’s back...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>136</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">52bd53af-18a4-4bf8-907d-e214b609ec61</guid>
  <title><![CDATA[Episode 135: Akamai's Ryan Barnett on WAFs, Unicode Confusables, and Triage Stories]]></title>
  <description><![CDATA[<p>Episode 135: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Ryan Barnett for a deep dive on WAFs. We also recap his Exploiting Unicode Normalization talk from DEFCON, and get his perspective on bug hunting from his time at Akamai. </p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker. Checkout ThreatLocker Detect! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect">https://www.criticalthinkingpodcast.io/tl-detect</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ryancbarnett">https://x.com/ryancbarnett</a></p><p>====== Resources ======</p><p>Accidental Stored XSS Flaw in Zemanta 'Related Posts' Plugin for TypePad</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://webappdefender.blogspot.com/2013/04/accidental-stored-xss-flaw-in-zemanta.html">https://webappdefender.blogspot.com/2013/04/accidental-stored-xss-flaw-in-zemanta.html</a></p><p>XSS Street-Fight</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://media.blackhat.com/bh-dc-11/Barnett/BlackHat_DC_2011_Barnett_XSS%20Streetfight-Slides.pdf">https://media.blackhat.com/bh-dc-11/Barnett/BlackHat_DC_2011_Barnett_XSS%20Streetfight-Slides.pdf</a></p><p>Blackhat USA 2025 - Lost in Translation: Exploiting Unicode Normalization</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.blackhat.com/us-25/briefings/schedule/#lost-in-translation-exploiting-unicode-normalization-44923">https://www.blackhat.com/us-25/briefings/schedule/#lost-in-translation-exploiting-unicode-normalization-44923</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:49) Accidental Stored XSS in Typepad Plugin </p><p>(00:06:34) Chatscatter &amp; Abusing third party Analytics</p><p>(00:11:42) Ryan Barnett Introduction</p><p>(00:21:11) Virtual Patching &amp; WAF Challenges</p><p>(00:40:39) AWS API Gateways &amp; Whitelisting Bug Hunter Traffic</p><p>(00:49:59) Lost in Translation: Exploiting Unicode Normalization</p><p>(01:11:29) CSPs at the WAF level &amp; 'Bounties for Bypass'</p>]]></description>
  <embed_id>67deaf2a-01e2-48c8-a625-c3addc710272</embed_id>
  <pubDate>Thu, 14 Aug 2025 10:01:08 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="82898288" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/c1194f75-e23e-4559-8dea-13beff345b3d/episode.mp3" />
  <itunes:title><![CDATA[Episode 135: Akamai's Ryan Barnett on WAFs, Unicode Confusables, and Triage Stories]]></itunes:title>
  <itunes:duration>1:26:21</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 135: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Ryan Barnett for a deep dive on WAFs. We also recap his Exploiting Unicode Normalization talk from DEFCON, and get his perspective on bug hunting from his time at Akamai. </p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker. Checkout ThreatLocker Detect! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect">https://www.criticalthinkingpodcast.io/tl-detect</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ryancbarnett">https://x.com/ryancbarnett</a></p><p>====== Resources ======</p><p>Accidental Stored XSS Flaw in Zemanta 'Related Posts' Plugin for TypePad</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://webappdefender.blogspot.com/2013/04/accidental-stored-xss-flaw-in-zemanta.html">https://webappdefender.blogspot.com/2013/04/accidental-stored-xss-flaw-in-zemanta.html</a></p><p>XSS Street-Fight</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://media.blackhat.com/bh-dc-11/Barnett/BlackHat_DC_2011_Barnett_XSS%20Streetfight-Slides.pdf">https://media.blackhat.com/bh-dc-11/Barnett/BlackHat_DC_2011_Barnett_XSS%20Streetfight-Slides.pdf</a></p><p>Blackhat USA 2025 - Lost in Translation: Exploiting Unicode Normalization</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.blackhat.com/us-25/briefings/schedule/#lost-in-translation-exploiting-unicode-normalization-44923">https://www.blackhat.com/us-25/briefings/schedule/#lost-in-translation-exploiting-unicode-normalization-44923</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:49) Accidental Stored XSS in Typepad Plugin </p><p>(00:06:34) Chatscatter &amp; Abusing third party Analytics</p><p>(00:11:42) Ryan Barnett Introduction</p><p>(00:21:11) Virtual Patching &amp; WAF Challenges</p><p>(00:40:39) AWS API Gateways &amp; Whitelisting Bug Hunter Traffic</p><p>(00:49:59) Lost in Translation: Exploiting Unicode Normalization</p><p>(01:11:29) CSPs at the WAF level &amp; 'Bounties for Bypass'</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 135: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Ryan Barnett for a deep dive on WAFs. We also recap his Exploiting Unicode Normalization talk from DEFCON, and get his perspective on bug hunting from his time at Akamai. </p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker. Checkout ThreatLocker Detect! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect">https://www.criticalthinkingpodcast.io/tl-detect</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ryancbarnett">https://x.com/ryancbarnett</a></p><p>====== Resources ======</p><p>Accidental Stored XSS Flaw in Zemanta 'Related Posts' Plugin for TypePad</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://webappdefender.blogspot.com/2013/04/accidental-stored-xss-flaw-in-zemanta.html">https://webappdefender.blogspot.com/2013/04/accidental-stored-xss-flaw-in-zemanta.html</a></p><p>XSS Street-Fight</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://media.blackhat.com/bh-dc-11/Barnett/BlackHat_DC_2011_Barnett_XSS%20Streetfight-Slides.pdf">https://media.blackhat.com/bh-dc-11/Barnett/BlackHat_DC_2011_Barnett_XSS%20Streetfight-Slides.pdf</a></p><p>Blackhat USA 2025 - Lost in Translation: Exploiting Unicode Normalization</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.blackhat.com/us-25/briefings/schedule/#lost-in-translation-exploiting-unicode-normalization-44923">https://www.blackhat.com/us-25/briefings/schedule/#lost-in-translation-exploiting-unicode-normalization-44923</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:49) Accidental Stored XSS in Typepad Plugin </p><p>(00:06:34) Chatscatter &amp; Abusing third party Analytics</p><p>(00:11:42) Ryan Barnett Introduction</p><p>(00:21:11) Virtual Patching &amp; WAF Challenges</p><p>(00:40:39) AWS API Gateways &amp; Whitelisting Bug Hunter Traffic</p><p>(00:49:59) Lost in Translation: Exploiting Unicode Normalization</p><p>(01:11:29) CSPs at the WAF level &amp; 'Bounties for Bypass'</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 135: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Ryan Barnett for a deep dive on WAFs. We also recap his Exploiting Unicode Normalization talk from DEFCON, and get his perspective on bug hunting from his ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>135</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">fa456f50-64eb-4aa6-8f9e-fe7ae912421b</guid>
  <title><![CDATA[Episode 134: XBOW - AI Hacking Agent and Human in the Loop with Diego Djurado]]></title>
  <description><![CDATA[<p>Episode 134: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Diego Djurado to give us the scoop on XBOW. We cover a little about its architecture and approach to hunting, the challenges with hallucinations, and the future of AI in the BB landscape. Diego also shares some of his own hacking journey and successes in the Ambassador World cup.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-userstore">ThreatLocker User Store</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/djurado9">https://x.com/djurado9</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/yeswehack-live-hacking-nullcon-berlin-2025?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=lhe-nullcon-berlin">Announcement of our upcoming live hacking event at Nullcon Berlin, taking place on September 4-5</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugbountydefcon.com/2025-speakers">Bug Bounty Village Speakers 2025</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=4NITbv-_C9w">Talkie Pwnii Caido showcase</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=HjZxwcBJl7Y">Caido Masterclass – From Setup to Exploits</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/access-control-vs-account-takeover-what-bug-bounty-hunters-need-to-know/">Access Control vs Account Takeover: What Bug Bounty Hunters Need to Know</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://xbow.com/blog/xbow-akamai-cloudtest-xxe/#akamai-cloudtest-xxe---X">CVE-2025-49493: XML External Entity (XXE) Injection in Akamai CloudTest</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:56) Diego's ATO Bug</p><p>(00:12:01) H1 Ambassador World Cup and work with XBOW</p><p>(00:20:57) XBOW's CloudTest XXE Bug</p><p>(00:49:59) Freedom, Hallucinations, &amp; Validation</p><p>(01:07:24) XBOW's Architecture</p><p>(01:23:50) Humans in the Loop, Harnesses, and Xbow's Reception</p><p>(01:44:21) Ambassador World Cup plans for the future</p>]]></description>
  <embed_id>9ecf1438-206b-411f-a8e1-cc472a05ca80</embed_id>
  <pubDate>Mon, 04 Aug 2025 10:00:52 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="109042471" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/84dbf365-a294-4cbd-ba34-1165e48a86a5/episode.mp3" />
  <itunes:title><![CDATA[Episode 134: XBOW - AI Hacking Agent and Human in the Loop with Diego Djurado]]></itunes:title>
  <itunes:duration>1:53:35</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 134: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Diego Djurado to give us the scoop on XBOW. We cover a little about its architecture and approach to hunting, the challenges with hallucinations, and the future of AI in the BB landscape. Diego also shares some of his own hacking journey and successes in the Ambassador World cup.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-userstore">ThreatLocker User Store</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/djurado9">https://x.com/djurado9</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/yeswehack-live-hacking-nullcon-berlin-2025?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=lhe-nullcon-berlin">Announcement of our upcoming live hacking event at Nullcon Berlin, taking place on September 4-5</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugbountydefcon.com/2025-speakers">Bug Bounty Village Speakers 2025</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=4NITbv-_C9w">Talkie Pwnii Caido showcase</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=HjZxwcBJl7Y">Caido Masterclass – From Setup to Exploits</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/access-control-vs-account-takeover-what-bug-bounty-hunters-need-to-know/">Access Control vs Account Takeover: What Bug Bounty Hunters Need to Know</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://xbow.com/blog/xbow-akamai-cloudtest-xxe/#akamai-cloudtest-xxe---X">CVE-2025-49493: XML External Entity (XXE) Injection in Akamai CloudTest</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:56) Diego's ATO Bug</p><p>(00:12:01) H1 Ambassador World Cup and work with XBOW</p><p>(00:20:57) XBOW's CloudTest XXE Bug</p><p>(00:49:59) Freedom, Hallucinations, &amp; Validation</p><p>(01:07:24) XBOW's Architecture</p><p>(01:23:50) Humans in the Loop, Harnesses, and Xbow's Reception</p><p>(01:44:21) Ambassador World Cup plans for the future</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 134: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Diego Djurado to give us the scoop on XBOW. We cover a little about its architecture and approach to hunting, the challenges with hallucinations, and the future of AI in the BB landscape. Diego also shares some of his own hacking journey and successes in the Ambassador World cup.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-userstore">ThreatLocker User Store</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/djurado9">https://x.com/djurado9</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/yeswehack-live-hacking-nullcon-berlin-2025?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=lhe-nullcon-berlin">Announcement of our upcoming live hacking event at Nullcon Berlin, taking place on September 4-5</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugbountydefcon.com/2025-speakers">Bug Bounty Village Speakers 2025</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=4NITbv-_C9w">Talkie Pwnii Caido showcase</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=HjZxwcBJl7Y">Caido Masterclass – From Setup to Exploits</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/access-control-vs-account-takeover-what-bug-bounty-hunters-need-to-know/">Access Control vs Account Takeover: What Bug Bounty Hunters Need to Know</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://xbow.com/blog/xbow-akamai-cloudtest-xxe/#akamai-cloudtest-xxe---X">CVE-2025-49493: XML External Entity (XXE) Injection in Akamai CloudTest</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:56) Diego's ATO Bug</p><p>(00:12:01) H1 Ambassador World Cup and work with XBOW</p><p>(00:20:57) XBOW's CloudTest XXE Bug</p><p>(00:49:59) Freedom, Hallucinations, &amp; Validation</p><p>(01:07:24) XBOW's Architecture</p><p>(01:23:50) Humans in the Loop, Harnesses, and Xbow's Reception</p><p>(01:44:21) Ambassador World Cup plans for the future</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 134: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Diego Djurado to give us the scoop on XBOW. We cover a little about its architecture and approach to hunting, the challenges with hallucinations, and the future ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>134</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">99ea8ef3-df0a-4785-996d-6c13dfba678a</guid>
  <title><![CDATA[Episode 133: Building Hacker Communities - Bug Bounty Village, getDisclosed, and the LHE Squad]]></title>
  <description><![CDATA[<p>Episode 133: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Harley and Ari from H1 to talk some about community management roles within Bug Bounty, as well as discuss the evolution of Bug Bounty Village at DEFCON, and what they’ve got in store this year.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guests:</p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="http://x.com/infinitelogins">x.com/infinitelogins</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Arl_rose">https://x.com/Arl_rose</a></li></ul><p>Today’s Sponsor is Adobe. Use code CTBBP0907 in your first report on Adobe Behance, Portfolio, Fonts or Acrobat Web, and earn a one-time 10% bonus reward!</p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/BugBountyDEFCON/status/1947763983584313699">BBV Platform Panel about Triage</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/yeswehack-makes-our-debut-at-black-hat-usa-2025">YesWeHACK Makes Debut at Black Hat USA 2025</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge-of-the-month/dojo-43">New Dojo challenge featuring a time-based token prediction combined PyYAML deserialization</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gmsgadget.com/">GMSGadget</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugbountydefcon.com/">Bug Bounty Village</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://getdisclosed.com">Sign up for the Disclosed Newsletter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://disclosedonline.com">Disclosed Online</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://youtube.com/infinitelogins">Harley's Youtube Channel</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:51) Bug Stories and Hacking Journeys</p><p>(00:32:37) Community Management within Bug Bounty</p><p>(00:39:43) Bug Bounty Village - Origin &amp; 2025 Plans</p><p>(01:02:39) Disclosed Online and Harley's Upcoming Ebook</p>]]></description>
  <embed_id>37b29a2c-8209-4da3-bf14-4eb2bc3b2c03</embed_id>
  <pubDate>Thu, 31 Jul 2025 10:00:53 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="73154412" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/016d1e17-062d-4c17-a910-b76328349ca6/episode.mp3" />
  <itunes:title><![CDATA[Episode 133: Building Hacker Communities - Bug Bounty Village, getDisclosed, and the LHE Squad]]></itunes:title>
  <itunes:duration>1:16:12</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 133: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Harley and Ari from H1 to talk some about community management roles within Bug Bounty, as well as discuss the evolution of Bug Bounty Village at DEFCON, and what they’ve got in store this year.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guests:</p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="http://x.com/infinitelogins">x.com/infinitelogins</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Arl_rose">https://x.com/Arl_rose</a></li></ul><p>Today’s Sponsor is Adobe. Use code CTBBP0907 in your first report on Adobe Behance, Portfolio, Fonts or Acrobat Web, and earn a one-time 10% bonus reward!</p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/BugBountyDEFCON/status/1947763983584313699">BBV Platform Panel about Triage</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/yeswehack-makes-our-debut-at-black-hat-usa-2025">YesWeHACK Makes Debut at Black Hat USA 2025</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge-of-the-month/dojo-43">New Dojo challenge featuring a time-based token prediction combined PyYAML deserialization</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gmsgadget.com/">GMSGadget</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugbountydefcon.com/">Bug Bounty Village</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://getdisclosed.com">Sign up for the Disclosed Newsletter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://disclosedonline.com">Disclosed Online</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://youtube.com/infinitelogins">Harley's Youtube Channel</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:51) Bug Stories and Hacking Journeys</p><p>(00:32:37) Community Management within Bug Bounty</p><p>(00:39:43) Bug Bounty Village - Origin &amp; 2025 Plans</p><p>(01:02:39) Disclosed Online and Harley's Upcoming Ebook</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 133: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Harley and Ari from H1 to talk some about community management roles within Bug Bounty, as well as discuss the evolution of Bug Bounty Village at DEFCON, and what they’ve got in store this year.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guests:</p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="http://x.com/infinitelogins">x.com/infinitelogins</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Arl_rose">https://x.com/Arl_rose</a></li></ul><p>Today’s Sponsor is Adobe. Use code CTBBP0907 in your first report on Adobe Behance, Portfolio, Fonts or Acrobat Web, and earn a one-time 10% bonus reward!</p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/BugBountyDEFCON/status/1947763983584313699">BBV Platform Panel about Triage</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/yeswehack-makes-our-debut-at-black-hat-usa-2025">YesWeHACK Makes Debut at Black Hat USA 2025</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge-of-the-month/dojo-43">New Dojo challenge featuring a time-based token prediction combined PyYAML deserialization</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gmsgadget.com/">GMSGadget</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugbountydefcon.com/">Bug Bounty Village</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://getdisclosed.com">Sign up for the Disclosed Newsletter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://disclosedonline.com">Disclosed Online</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://youtube.com/infinitelogins">Harley's Youtube Channel</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:51) Bug Stories and Hacking Journeys</p><p>(00:32:37) Community Management within Bug Bounty</p><p>(00:39:43) Bug Bounty Village - Origin &amp; 2025 Plans</p><p>(01:02:39) Disclosed Online and Harley's Upcoming Ebook</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 133: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Harley and Ari from H1 to talk some about community management roles within Bug Bounty, as well as discuss the evolution of Bug Bounty Village at DEFCON, and wha...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>133</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">b1536dfb-78fb-493b-bbd8-349040864d5f</guid>
  <title><![CDATA[Episode 132: Archive Testing Methodology with Mathias Karlsson]]></title>
  <description><![CDATA[<p>Episode 132: In this episode of Critical Thinking - Bug Bounty Podcast, Justin Gardner is joined by Mathias Karlsson to discuss vulnerabilities associated with archives. They talk about his new tool, Archive Alchemist, and explore topics like the significance of Unicode paths, symlinks, and TAR before they end up talking about Charsets again..</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0</a> on Twitter: </p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">CTBB Discord</a>!</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/TL-patch-management">ThreatLocker - Patch Management</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/avlidienbrunn">Mathias Karlsson</a></p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs/swiss-post-evoting">Swiss Post's 2025 Public Intrusion Test starts on July 28</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.intigriti.com/blog/business-insights/intigriti-teams-with-nvidia-to-launch-bug-bounty-vulnerability-disclosure-program">Intigriti teams with NVIDIA</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://live-bug-crowd.pantheonsite.io/blog/announcing-the-bugcrowd-ingenuity-awards-celebrating-excellence-among-hackers-and-industry-leaders/">Bugcrowd Ingenuity Awards</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=syXVGe8zPSY">Hack the Hacker Series - AI Vulnerabilities and Bug Bounties</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/a-novel-technique-for-sql-injection-in-pdos-prepared-statements/">A Novel Technique for SQL Injection in PDO’s Prepared Statements</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/how-we-accidentally-discovered-a-remote-code-execution-vulnerability-in-etq-reliance/">How We Accidentally Discovered a Remote Code Execution Vulnerability in ETQ Reliance</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/avlidienbrunn/archivealchemist">Archive Alchemist</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=X7j2sisMKzk">Hacking Livestream #53: The ZIP file format</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:10:04) Archive Alchemist</p><p>(00:36:05) Unicode Extensions, normalization, and confusion attacks on Zip parsers</p><p>(00:48:44) Character Sets</p><p>(01:01:49) 7zip &amp; File Names </p><p>(01:06:44) Path Traversal, Symlinks &amp; Identifying Techniques</p><p>(01:36:05) Hardlinks and TAR</p>]]></description>
  <embed_id>bf76ca00-66d4-4c63-b31e-0ecc93f7b9d4</embed_id>
  <pubDate>Thu, 24 Jul 2025 10:00:39 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="105154197" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/30d71459-b19b-4108-9740-435f086c6706/episode.mp3" />
  <itunes:title><![CDATA[Episode 132: Archive Testing Methodology with Mathias Karlsson]]></itunes:title>
  <itunes:duration>1:49:32</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 132: In this episode of Critical Thinking - Bug Bounty Podcast, Justin Gardner is joined by Mathias Karlsson to discuss vulnerabilities associated with archives. They talk about his new tool, Archive Alchemist, and explore topics like the significance of Unicode paths, symlinks, and TAR before they end up talking about Charsets again..</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0</a> on Twitter: </p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">CTBB Discord</a>!</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/TL-patch-management">ThreatLocker - Patch Management</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/avlidienbrunn">Mathias Karlsson</a></p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs/swiss-post-evoting">Swiss Post's 2025 Public Intrusion Test starts on July 28</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.intigriti.com/blog/business-insights/intigriti-teams-with-nvidia-to-launch-bug-bounty-vulnerability-disclosure-program">Intigriti teams with NVIDIA</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://live-bug-crowd.pantheonsite.io/blog/announcing-the-bugcrowd-ingenuity-awards-celebrating-excellence-among-hackers-and-industry-leaders/">Bugcrowd Ingenuity Awards</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=syXVGe8zPSY">Hack the Hacker Series - AI Vulnerabilities and Bug Bounties</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/a-novel-technique-for-sql-injection-in-pdos-prepared-statements/">A Novel Technique for SQL Injection in PDO’s Prepared Statements</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/how-we-accidentally-discovered-a-remote-code-execution-vulnerability-in-etq-reliance/">How We Accidentally Discovered a Remote Code Execution Vulnerability in ETQ Reliance</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/avlidienbrunn/archivealchemist">Archive Alchemist</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=X7j2sisMKzk">Hacking Livestream #53: The ZIP file format</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:10:04) Archive Alchemist</p><p>(00:36:05) Unicode Extensions, normalization, and confusion attacks on Zip parsers</p><p>(00:48:44) Character Sets</p><p>(01:01:49) 7zip &amp; File Names </p><p>(01:06:44) Path Traversal, Symlinks &amp; Identifying Techniques</p><p>(01:36:05) Hardlinks and TAR</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 132: In this episode of Critical Thinking - Bug Bounty Podcast, Justin Gardner is joined by Mathias Karlsson to discuss vulnerabilities associated with archives. They talk about his new tool, Archive Alchemist, and explore topics like the significance of Unicode paths, symlinks, and TAR before they end up talking about Charsets again..</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0</a> on Twitter: </p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">CTBB Discord</a>!</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/TL-patch-management">ThreatLocker - Patch Management</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/avlidienbrunn">Mathias Karlsson</a></p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs/swiss-post-evoting">Swiss Post's 2025 Public Intrusion Test starts on July 28</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.intigriti.com/blog/business-insights/intigriti-teams-with-nvidia-to-launch-bug-bounty-vulnerability-disclosure-program">Intigriti teams with NVIDIA</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://live-bug-crowd.pantheonsite.io/blog/announcing-the-bugcrowd-ingenuity-awards-celebrating-excellence-among-hackers-and-industry-leaders/">Bugcrowd Ingenuity Awards</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=syXVGe8zPSY">Hack the Hacker Series - AI Vulnerabilities and Bug Bounties</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/a-novel-technique-for-sql-injection-in-pdos-prepared-statements/">A Novel Technique for SQL Injection in PDO’s Prepared Statements</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/how-we-accidentally-discovered-a-remote-code-execution-vulnerability-in-etq-reliance/">How We Accidentally Discovered a Remote Code Execution Vulnerability in ETQ Reliance</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/avlidienbrunn/archivealchemist">Archive Alchemist</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=X7j2sisMKzk">Hacking Livestream #53: The ZIP file format</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:10:04) Archive Alchemist</p><p>(00:36:05) Unicode Extensions, normalization, and confusion attacks on Zip parsers</p><p>(00:48:44) Character Sets</p><p>(01:01:49) 7zip &amp; File Names </p><p>(01:06:44) Path Traversal, Symlinks &amp; Identifying Techniques</p><p>(01:36:05) Hardlinks and TAR</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 132: In this episode of Critical Thinking - Bug Bounty Podcast, Justin Gardner is joined by Mathias Karlsson to discuss vulnerabilities associated with archives. They talk about his new tool, Archive Alchemist, and explore topics like the s...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>132</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">41c94fc0-b93d-45bb-8050-8427240996b0</guid>
  <title><![CDATA[Episode 131: SL Cyber Writeups, Bug Bounty Metastrategy, and Orphaned Github Commits ]]></title>
  <description><![CDATA[<p>Episode 131: In this episode of Critical Thinking - Bug Bounty Podcast we're covering Christmas in July with several banger articles from Searchlight Cyber, as well as covering things like Raycast for Windows, Third-Person prompting, and touch on the recent McDonalds Leak</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor is Adobe. Use code CTBBP0907 in your first report on Adobe Behance, Portfolio, Fonts or Acrobat Web, and earn a one-time 10% bonus reward!</p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://amlw.dev/vrp/135276622/">v1 Instance Metadata Service protections bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ian.sh/mcdonalds">Would you like an IDOR with that? Leaking 64 million McDonald’s job applications</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/how-we-got-persistent-xss-on-every-aem-cloud-site-thrice/">How we got persistent XSS on every AEM cloud site, thrice</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/albinowax/status/1943306445149049178">Google docs now supports export as markdown</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/abusing-windows-net-quirks-and-unicode-normalization-to-exploit-dnn-dotnetnuke/">Abusing Windows, .NET quirks, and Unicode Normalization to exploit DNN (DotNetNuke)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets">How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/thoughts/bugbounty-feedback-strategy-and-alchemy">Bug bounty, feedback, strategy and alchemy</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:39) Metadata Service protections bypass &amp; Mcdonalds Leak</p><p>(00:12:30) Christmas in July with Searchlight Cyber Pt 1</p><p>(00:19:43) Export as Markdown, Raycast for Windows, &amp; Third-Person prompting</p><p>(00:23:56) Christmas in July with Searchlight Cyber Pt 2</p><p>(00:27:39) GitHub’s “Oops Commits” for Leaked Secrets</p><p>(00:36:53) Bug bounty, feedback, strategy and alchemy</p>]]></description>
  <embed_id>ac5fcad7-f59c-411f-8eb8-704dcc1d6448</embed_id>
  <pubDate>Thu, 17 Jul 2025 10:01:20 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="48577988" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/cc154132-11f1-4ee3-9afb-8d5d9c4e8de3/episode.mp3" />
  <itunes:title><![CDATA[Episode 131: SL Cyber Writeups, Bug Bounty Metastrategy, and Orphaned Github Commits ]]></itunes:title>
  <itunes:duration>50:36</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 131: In this episode of Critical Thinking - Bug Bounty Podcast we're covering Christmas in July with several banger articles from Searchlight Cyber, as well as covering things like Raycast for Windows, Third-Person prompting, and touch on the recent McDonalds Leak</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor is Adobe. Use code CTBBP0907 in your first report on Adobe Behance, Portfolio, Fonts or Acrobat Web, and earn a one-time 10% bonus reward!</p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://amlw.dev/vrp/135276622/">v1 Instance Metadata Service protections bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ian.sh/mcdonalds">Would you like an IDOR with that? Leaking 64 million McDonald’s job applications</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/how-we-got-persistent-xss-on-every-aem-cloud-site-thrice/">How we got persistent XSS on every AEM cloud site, thrice</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/albinowax/status/1943306445149049178">Google docs now supports export as markdown</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/abusing-windows-net-quirks-and-unicode-normalization-to-exploit-dnn-dotnetnuke/">Abusing Windows, .NET quirks, and Unicode Normalization to exploit DNN (DotNetNuke)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets">How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/thoughts/bugbounty-feedback-strategy-and-alchemy">Bug bounty, feedback, strategy and alchemy</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:39) Metadata Service protections bypass &amp; Mcdonalds Leak</p><p>(00:12:30) Christmas in July with Searchlight Cyber Pt 1</p><p>(00:19:43) Export as Markdown, Raycast for Windows, &amp; Third-Person prompting</p><p>(00:23:56) Christmas in July with Searchlight Cyber Pt 2</p><p>(00:27:39) GitHub’s “Oops Commits” for Leaked Secrets</p><p>(00:36:53) Bug bounty, feedback, strategy and alchemy</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 131: In this episode of Critical Thinking - Bug Bounty Podcast we're covering Christmas in July with several banger articles from Searchlight Cyber, as well as covering things like Raycast for Windows, Third-Person prompting, and touch on the recent McDonalds Leak</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor is Adobe. Use code CTBBP0907 in your first report on Adobe Behance, Portfolio, Fonts or Acrobat Web, and earn a one-time 10% bonus reward!</p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://amlw.dev/vrp/135276622/">v1 Instance Metadata Service protections bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ian.sh/mcdonalds">Would you like an IDOR with that? Leaking 64 million McDonald’s job applications</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/how-we-got-persistent-xss-on-every-aem-cloud-site-thrice/">How we got persistent XSS on every AEM cloud site, thrice</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/albinowax/status/1943306445149049178">Google docs now supports export as markdown</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/abusing-windows-net-quirks-and-unicode-normalization-to-exploit-dnn-dotnetnuke/">Abusing Windows, .NET quirks, and Unicode Normalization to exploit DNN (DotNetNuke)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets">How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/thoughts/bugbounty-feedback-strategy-and-alchemy">Bug bounty, feedback, strategy and alchemy</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:05:39) Metadata Service protections bypass &amp; Mcdonalds Leak</p><p>(00:12:30) Christmas in July with Searchlight Cyber Pt 1</p><p>(00:19:43) Export as Markdown, Raycast for Windows, &amp; Third-Person prompting</p><p>(00:23:56) Christmas in July with Searchlight Cyber Pt 2</p><p>(00:27:39) GitHub’s “Oops Commits” for Leaked Secrets</p><p>(00:36:53) Bug bounty, feedback, strategy and alchemy</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 131: In this episode of Critical Thinking - Bug Bounty Podcast we're covering Christmas in July with several banger articles from Searchlight Cyber, as well as covering things like Raycast for Windows, Third-Person prompting, and touch on t...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>131</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">ff77558e-13bc-4c78-ac82-f78ea7c382b5</guid>
  <title><![CDATA[Episode 130: Minecraft Hacks to Google Hacking Star - Valentino ]]></title>
  <description><![CDATA[<p>Episode 130: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Valentino, who shares his journey from hacking Minecraft to becoming a Google hunter. He talks us through several bugs, including an HTML Sanitizer bypass and .NET deserialization, and highlights the hyper creative approaches he tends to employ.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker - Patch Management</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/TL-patch-management">https://www.criticalthinkingpodcast.io/TL-patch-management</a></p><p>Today’s Guest: Valentino - <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.3133700.xyz/">https://blog.3133700.xyz/</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://web.archive.org/web/20220702003650/https://xz.aliyun.com/t/11450">JMX Manager</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/1675516">Stored XSS in reclamos</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.google.com/document/d/18oQDjLVcrwRFTaRK6zW2tnL3gwWwthOQnp89kMKNAb0/edit?tab=t.0">Command Injection in Vertex AI</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/thezdi/presentations/blob/main/2023_Hexacon/whitepaper-net-deser.pdf">whitepaper-net-deser.pdf</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/valent1nee/vulnz/blob/main/free-after-use.go">free-after-use.go</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.3133700.xyz/pmb#CVE-2023-52155">A Journey Into Finding Vulnerabilities in the PMB Library Management System</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/valent1nee/vulnz/blob/main/emulated-register_globals.php">emulated-register_globals.php</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:38) JMXProxy Bug Story</p><p>(00:09:46) Intro to Valentino</p><p>(00:29:08) HTML Sanitizer bypass on MercadoLibre</p><p>(00:37:16) Command injection in Vertex AI</p><p>(00:44:10) .NET deserialization, &amp; Argument injection to LFR, &amp; Free after use</p><p>(00:51:33) Luck, creativity, and evolution as Hacker</p><p>(00:59:31) Issues in file extension validation components, Emulated register_globals, &amp; AI Hacking</p>]]></description>
  <embed_id>d00191c7-58ff-4c60-a12e-ed4ba3aec9cb</embed_id>
  <pubDate>Thu, 10 Jul 2025 08:20:06 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="65698438" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/ec8d5687-525f-4cd9-80ed-359234db6633/episode.mp3" />
  <itunes:title><![CDATA[Episode 130: Minecraft Hacks to Google Hacking Star - Valentino ]]></itunes:title>
  <itunes:duration>1:08:26</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 130: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Valentino, who shares his journey from hacking Minecraft to becoming a Google hunter. He talks us through several bugs, including an HTML Sanitizer bypass and .NET deserialization, and highlights the hyper creative approaches he tends to employ.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker - Patch Management</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/TL-patch-management">https://www.criticalthinkingpodcast.io/TL-patch-management</a></p><p>Today’s Guest: Valentino - <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.3133700.xyz/">https://blog.3133700.xyz/</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://web.archive.org/web/20220702003650/https://xz.aliyun.com/t/11450">JMX Manager</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/1675516">Stored XSS in reclamos</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.google.com/document/d/18oQDjLVcrwRFTaRK6zW2tnL3gwWwthOQnp89kMKNAb0/edit?tab=t.0">Command Injection in Vertex AI</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/thezdi/presentations/blob/main/2023_Hexacon/whitepaper-net-deser.pdf">whitepaper-net-deser.pdf</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/valent1nee/vulnz/blob/main/free-after-use.go">free-after-use.go</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.3133700.xyz/pmb#CVE-2023-52155">A Journey Into Finding Vulnerabilities in the PMB Library Management System</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/valent1nee/vulnz/blob/main/emulated-register_globals.php">emulated-register_globals.php</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:38) JMXProxy Bug Story</p><p>(00:09:46) Intro to Valentino</p><p>(00:29:08) HTML Sanitizer bypass on MercadoLibre</p><p>(00:37:16) Command injection in Vertex AI</p><p>(00:44:10) .NET deserialization, &amp; Argument injection to LFR, &amp; Free after use</p><p>(00:51:33) Luck, creativity, and evolution as Hacker</p><p>(00:59:31) Issues in file extension validation components, Emulated register_globals, &amp; AI Hacking</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 130: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Valentino, who shares his journey from hacking Minecraft to becoming a Google hunter. He talks us through several bugs, including an HTML Sanitizer bypass and .NET deserialization, and highlights the hyper creative approaches he tends to employ.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker - Patch Management</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/TL-patch-management">https://www.criticalthinkingpodcast.io/TL-patch-management</a></p><p>Today’s Guest: Valentino - <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.3133700.xyz/">https://blog.3133700.xyz/</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://web.archive.org/web/20220702003650/https://xz.aliyun.com/t/11450">JMX Manager</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/1675516">Stored XSS in reclamos</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.google.com/document/d/18oQDjLVcrwRFTaRK6zW2tnL3gwWwthOQnp89kMKNAb0/edit?tab=t.0">Command Injection in Vertex AI</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/thezdi/presentations/blob/main/2023_Hexacon/whitepaper-net-deser.pdf">whitepaper-net-deser.pdf</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/valent1nee/vulnz/blob/main/free-after-use.go">free-after-use.go</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.3133700.xyz/pmb#CVE-2023-52155">A Journey Into Finding Vulnerabilities in the PMB Library Management System</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/valent1nee/vulnz/blob/main/emulated-register_globals.php">emulated-register_globals.php</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:38) JMXProxy Bug Story</p><p>(00:09:46) Intro to Valentino</p><p>(00:29:08) HTML Sanitizer bypass on MercadoLibre</p><p>(00:37:16) Command injection in Vertex AI</p><p>(00:44:10) .NET deserialization, &amp; Argument injection to LFR, &amp; Free after use</p><p>(00:51:33) Luck, creativity, and evolution as Hacker</p><p>(00:59:31) Issues in file extension validation components, Emulated register_globals, &amp; AI Hacking</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 130: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Valentino, who shares his journey from hacking Minecraft to becoming a Google hunter. He talks us through several bugs, including an HTML Sanitizer bypass an...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>130</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">a0294ef9-9bd2-44bb-b980-7737be50c91a</guid>
  <title><![CDATA[Episode 129: Is this how Bug Bounty Ends?]]></title>
  <description><![CDATA[<p>Episode 129: In this episode of Critical Thinking - Bug Bounty Podcast we chat about the future of hack bots and human-AI collaboration, the challenges posed by tokenization, and the need for cybersecurity professionals to adapt to the evolving landscape of hacking in the age of AI</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== This Week in Bug Bounty ======</p><p>Improper error handling in async cryptographic operations crashes process</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/2817648">https://hackerone.com/reports/2817648</a></p><p>Recon Series #6: Excavating hidden artifacts with Wayback Machine</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/recon-wayback-machine-web-archive">https://www.yeswehack.com/learn-bug-bounty/recon-wayback-machine-web-archive</a></p><p>====== Resources ======</p><p>This is How They Tell Me Bug Bounty Ends </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/hacking/2025/06/09/this-is-how-they-tell-me-bug-bounty-ends.html">https://josephthacker.com/hacking/2025/06/09/this-is-how-they-tell-me-bug-bounty-ends.html</a></p><p>Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discovery</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/blog/welcome-hackbots-how-ai-shaping-future-vulnerability-discovery">https://www.hackerone.com/blog/welcome-hackbots-how-ai-shaping-future-vulnerability-discovery</a></p><p>Glitch Token</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=WO2X3oZEJOA">https://www.youtube.com/watch?v=WO2X3oZEJOA</a></p><p>Conducting smarter intelligences than me: new orchestras</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://southbridge-research.notion.site/conducting-smarter-intelligences-than-me">https://southbridge-research.notion.site/conducting-smarter-intelligences-than-me</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:04:05) Is this how Bug Bounty Ends?</p><p>(00:11:14) Hackbots and handling leads</p><p>(00:20:50) Hacker chain of thought &amp; Tokenization</p><p>(00:32:54) Context Engineering</p>]]></description>
  <embed_id>671d00e5-de6a-4804-8eee-f9f04474c502</embed_id>
  <pubDate>Thu, 03 Jul 2025 11:01:06 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="34787006" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/38de5f9a-0819-4529-93c3-5a86b32d1203/episode.mp3" />
  <itunes:title><![CDATA[Episode 129: Is this how Bug Bounty Ends?]]></itunes:title>
  <itunes:duration>36:14</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 129: In this episode of Critical Thinking - Bug Bounty Podcast we chat about the future of hack bots and human-AI collaboration, the challenges posed by tokenization, and the need for cybersecurity professionals to adapt to the evolving landscape of hacking in the age of AI</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== This Week in Bug Bounty ======</p><p>Improper error handling in async cryptographic operations crashes process</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/2817648">https://hackerone.com/reports/2817648</a></p><p>Recon Series #6: Excavating hidden artifacts with Wayback Machine</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/recon-wayback-machine-web-archive">https://www.yeswehack.com/learn-bug-bounty/recon-wayback-machine-web-archive</a></p><p>====== Resources ======</p><p>This is How They Tell Me Bug Bounty Ends </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/hacking/2025/06/09/this-is-how-they-tell-me-bug-bounty-ends.html">https://josephthacker.com/hacking/2025/06/09/this-is-how-they-tell-me-bug-bounty-ends.html</a></p><p>Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discovery</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/blog/welcome-hackbots-how-ai-shaping-future-vulnerability-discovery">https://www.hackerone.com/blog/welcome-hackbots-how-ai-shaping-future-vulnerability-discovery</a></p><p>Glitch Token</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=WO2X3oZEJOA">https://www.youtube.com/watch?v=WO2X3oZEJOA</a></p><p>Conducting smarter intelligences than me: new orchestras</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://southbridge-research.notion.site/conducting-smarter-intelligences-than-me">https://southbridge-research.notion.site/conducting-smarter-intelligences-than-me</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:04:05) Is this how Bug Bounty Ends?</p><p>(00:11:14) Hackbots and handling leads</p><p>(00:20:50) Hacker chain of thought &amp; Tokenization</p><p>(00:32:54) Context Engineering</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 129: In this episode of Critical Thinking - Bug Bounty Podcast we chat about the future of hack bots and human-AI collaboration, the challenges posed by tokenization, and the need for cybersecurity professionals to adapt to the evolving landscape of hacking in the age of AI</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== This Week in Bug Bounty ======</p><p>Improper error handling in async cryptographic operations crashes process</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/2817648">https://hackerone.com/reports/2817648</a></p><p>Recon Series #6: Excavating hidden artifacts with Wayback Machine</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/recon-wayback-machine-web-archive">https://www.yeswehack.com/learn-bug-bounty/recon-wayback-machine-web-archive</a></p><p>====== Resources ======</p><p>This is How They Tell Me Bug Bounty Ends </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/hacking/2025/06/09/this-is-how-they-tell-me-bug-bounty-ends.html">https://josephthacker.com/hacking/2025/06/09/this-is-how-they-tell-me-bug-bounty-ends.html</a></p><p>Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discovery</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/blog/welcome-hackbots-how-ai-shaping-future-vulnerability-discovery">https://www.hackerone.com/blog/welcome-hackbots-how-ai-shaping-future-vulnerability-discovery</a></p><p>Glitch Token</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=WO2X3oZEJOA">https://www.youtube.com/watch?v=WO2X3oZEJOA</a></p><p>Conducting smarter intelligences than me: new orchestras</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://southbridge-research.notion.site/conducting-smarter-intelligences-than-me">https://southbridge-research.notion.site/conducting-smarter-intelligences-than-me</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:04:05) Is this how Bug Bounty Ends?</p><p>(00:11:14) Hackbots and handling leads</p><p>(00:20:50) Hacker chain of thought &amp; Tokenization</p><p>(00:32:54) Context Engineering</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 129: In this episode of Critical Thinking - Bug Bounty Podcast we chat about the future of hack bots and human-AI collaboration, the challenges posed by tokenization, and the need for cybersecurity professionals to adapt to the evolving lan...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>129</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">e530c725-1b5d-4c04-a750-6c52d19746f9</guid>
  <title><![CDATA[Episode 128: New Research in Blind SSRF and Self-XSS, and How to Architect Source-code Review AI Bots]]></title>
  <description><![CDATA[<p>Episode 128: In this episode of Critical Thinking - Bug Bounty Podcast we talking Blind SSRF and Self-XSS, as well as Reversing massive minified JS with AI and a wild Google Logo Ligature Bug</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/TL-patch-management">Today's Sponsor: ThreatLocker - Patch Management</a></p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/yeswehack-at-lehack-2025"><strong>BitK's "Payload plz" challenge at LeHack</strong></a></p><p></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.slonser.info/posts/make-self-xss-great-again/">Make Self-XSS Great Again</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/infosec_au/status/1937103837334323472">Novel SSRF Technique Involving HTTP Redirect Loops</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/assetnote/surf">Surf - Escalate your SSRF vulnerabilities on Modern Cloud Environments</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/intenttoship/status/1937135319142293805">Gecko:  Intent to prototype: Framebusting Intervention</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://southbridge-research.notion.site/conducting-smarter-intelligences-than-me">Conducting smarter intelligences than me: new orchestras</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/hrishioa/mandark">Mandark</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/hrishioa/lumentis">Lumentis</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/xssdoctor/jscollab">jscollab</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.jefftk.com/p/google-logo-ligature-bug">Google Logo Ligature Bug</a></p><p></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:03:55) Self-XSS and  credentialless iframe </p><p>(00:16:50) Novel SSRF Technique Involving HTTP Redirect Loops</p><p>(00:25:02) Framebusting</p><p>(00:29:13) Reversing massive minified JS with AI</p><p>(00:53:12) Google Logo Ligature Bug</p>]]></description>
  <embed_id>e92cf9b5-b94e-4c68-84c2-53d602fb61a8</embed_id>
  <pubDate>Thu, 26 Jun 2025 11:00:31 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="55778588" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/5e97891d-4e20-41b0-8beb-891e82891883/episode.mp3" />
  <itunes:title><![CDATA[Episode 128: New Research in Blind SSRF and Self-XSS, and How to Architect Source-code Review AI Bots]]></itunes:title>
  <itunes:duration>58:06</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 128: In this episode of Critical Thinking - Bug Bounty Podcast we talking Blind SSRF and Self-XSS, as well as Reversing massive minified JS with AI and a wild Google Logo Ligature Bug</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/TL-patch-management">Today's Sponsor: ThreatLocker - Patch Management</a></p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/yeswehack-at-lehack-2025"><strong>BitK's "Payload plz" challenge at LeHack</strong></a></p><p></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.slonser.info/posts/make-self-xss-great-again/">Make Self-XSS Great Again</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/infosec_au/status/1937103837334323472">Novel SSRF Technique Involving HTTP Redirect Loops</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/assetnote/surf">Surf - Escalate your SSRF vulnerabilities on Modern Cloud Environments</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/intenttoship/status/1937135319142293805">Gecko:  Intent to prototype: Framebusting Intervention</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://southbridge-research.notion.site/conducting-smarter-intelligences-than-me">Conducting smarter intelligences than me: new orchestras</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/hrishioa/mandark">Mandark</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/hrishioa/lumentis">Lumentis</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/xssdoctor/jscollab">jscollab</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.jefftk.com/p/google-logo-ligature-bug">Google Logo Ligature Bug</a></p><p></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:03:55) Self-XSS and  credentialless iframe </p><p>(00:16:50) Novel SSRF Technique Involving HTTP Redirect Loops</p><p>(00:25:02) Framebusting</p><p>(00:29:13) Reversing massive minified JS with AI</p><p>(00:53:12) Google Logo Ligature Bug</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 128: In this episode of Critical Thinking - Bug Bounty Podcast we talking Blind SSRF and Self-XSS, as well as Reversing massive minified JS with AI and a wild Google Logo Ligature Bug</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/TL-patch-management">Today's Sponsor: ThreatLocker - Patch Management</a></p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/page/yeswehack-at-lehack-2025"><strong>BitK's "Payload plz" challenge at LeHack</strong></a></p><p></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.slonser.info/posts/make-self-xss-great-again/">Make Self-XSS Great Again</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/infosec_au/status/1937103837334323472">Novel SSRF Technique Involving HTTP Redirect Loops</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/assetnote/surf">Surf - Escalate your SSRF vulnerabilities on Modern Cloud Environments</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/intenttoship/status/1937135319142293805">Gecko:  Intent to prototype: Framebusting Intervention</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://southbridge-research.notion.site/conducting-smarter-intelligences-than-me">Conducting smarter intelligences than me: new orchestras</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/hrishioa/mandark">Mandark</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/hrishioa/lumentis">Lumentis</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/xssdoctor/jscollab">jscollab</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.jefftk.com/p/google-logo-ligature-bug">Google Logo Ligature Bug</a></p><p></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:03:55) Self-XSS and  credentialless iframe </p><p>(00:16:50) Novel SSRF Technique Involving HTTP Redirect Loops</p><p>(00:25:02) Framebusting</p><p>(00:29:13) Reversing massive minified JS with AI</p><p>(00:53:12) Google Logo Ligature Bug</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 128: In this episode of Critical Thinking - Bug Bounty Podcast we talking Blind SSRF and Self-XSS, as well as Reversing massive minified JS with AI and a wild Google Logo Ligature BugFollow us on twitter at: https://x.com/ctbbpodcastGot any...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>128</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">4f5a0651-075e-4f58-8b38-edff97c467f1</guid>
  <title><![CDATA[Episode 127: Drama, PDF as JS Chaos, Bounty Profile Apps, And More]]></title>
  <description><![CDATA[<p>Episode 127: In this episode of Critical Thinking - Bug Bounty Podcast we address some recent bug bounty controversy before jumping into a slew of news items</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">Follow us on X</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>Today's Sponsor: <a target="_blank" rel="noopener noreferrer nofollow" href="http://hackerone.com/adobe">Adobe</a></p><p><strong>====== This Week In Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/recon-hackers-guide-google-dorking?utm_source=twitter&amp;utm_medium=social&amp;utm_campaign=guide-google-dorking">Hackers Guide to Google dorking</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/yeswecaido-plugin-bug-bounty-programs?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=blog-tool-yeswecaido">YesWeCaido</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge-of-the-month/dojo-42?utm_source=twitter&amp;utm_medium=social&amp;utm_campaign=dojo-challenge?">New Dojo Challenge</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/blog/smart-contracts-common-vulnerabilities-and-real-world-cases">Smart Contract BB tips</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/introducing-bugcrowd-red-team-as-a-service-rtaas/">Red Team AAS</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://getdisclosed.com/">Disclosed</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/xssdoctor/status/1932953259339083929">PDF csp bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.doyensec.com/2025/01/09/cspt-file-upload.html">Bypassing File Upload Restrictions To Exploit Client-Side Path Traversal</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jorianwoltjer.com/blog/p/research/obs-websocket-rce">OBS WebSocket to RCE</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sensecurity.io/time-in-a-bottle-or-knapsack/">Time in a bottle (or knapsack)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=WTH6f0R7uzo">How to Differentiate Yourself as a Bug Bounty Hunter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.disclosedonline.com/">Disclosed. Online</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackedin.net/">hacked-in</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.aim.security/lp/aim-labs-echoleak-blogpost">‘EchoLeak’</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://archive.codeblue.jp/2024/files/cb24_Piloting_Edge_Copilot_by_Jun_Kokatsu.pdf">Piloting Edge Copilot</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/assetnote/newtowner">Newtowner</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Jhaddix/status/1931834748793655539">Tips for agent prompting</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1932066642026012716">Firefox XSS vectors</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/kinugawamasato/status/1929635990316146899">Tweet from Masato Kinugawa</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/J0R1AN/status/1933463155763560881">Chrome debug() function</a></p>]]></description>
  <embed_id>ba66aa4f-fc99-45e9-a1dc-5f8056196d80</embed_id>
  <pubDate>Thu, 19 Jun 2025 11:00:42 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="64722079" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/54dacc49-f9cb-47b0-900a-7f93447ea52c/episode.mp3" />
  <itunes:title><![CDATA[Episode 127: Drama, PDF as JS Chaos, Bounty Profile Apps, And More]]></itunes:title>
  <itunes:duration>1:07:25</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 127: In this episode of Critical Thinking - Bug Bounty Podcast we address some recent bug bounty controversy before jumping into a slew of news items</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">Follow us on X</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>Today's Sponsor: <a target="_blank" rel="noopener noreferrer nofollow" href="http://hackerone.com/adobe">Adobe</a></p><p><strong>====== This Week In Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/recon-hackers-guide-google-dorking?utm_source=twitter&amp;utm_medium=social&amp;utm_campaign=guide-google-dorking">Hackers Guide to Google dorking</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/yeswecaido-plugin-bug-bounty-programs?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=blog-tool-yeswecaido">YesWeCaido</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge-of-the-month/dojo-42?utm_source=twitter&amp;utm_medium=social&amp;utm_campaign=dojo-challenge?">New Dojo Challenge</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/blog/smart-contracts-common-vulnerabilities-and-real-world-cases">Smart Contract BB tips</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/introducing-bugcrowd-red-team-as-a-service-rtaas/">Red Team AAS</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://getdisclosed.com/">Disclosed</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/xssdoctor/status/1932953259339083929">PDF csp bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.doyensec.com/2025/01/09/cspt-file-upload.html">Bypassing File Upload Restrictions To Exploit Client-Side Path Traversal</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jorianwoltjer.com/blog/p/research/obs-websocket-rce">OBS WebSocket to RCE</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sensecurity.io/time-in-a-bottle-or-knapsack/">Time in a bottle (or knapsack)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=WTH6f0R7uzo">How to Differentiate Yourself as a Bug Bounty Hunter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.disclosedonline.com/">Disclosed. Online</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackedin.net/">hacked-in</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.aim.security/lp/aim-labs-echoleak-blogpost">‘EchoLeak’</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://archive.codeblue.jp/2024/files/cb24_Piloting_Edge_Copilot_by_Jun_Kokatsu.pdf">Piloting Edge Copilot</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/assetnote/newtowner">Newtowner</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Jhaddix/status/1931834748793655539">Tips for agent prompting</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1932066642026012716">Firefox XSS vectors</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/kinugawamasato/status/1929635990316146899">Tweet from Masato Kinugawa</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/J0R1AN/status/1933463155763560881">Chrome debug() function</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 127: In this episode of Critical Thinking - Bug Bounty Podcast we address some recent bug bounty controversy before jumping into a slew of news items</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">Follow us on X</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>Today's Sponsor: <a target="_blank" rel="noopener noreferrer nofollow" href="http://hackerone.com/adobe">Adobe</a></p><p><strong>====== This Week In Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/recon-hackers-guide-google-dorking?utm_source=twitter&amp;utm_medium=social&amp;utm_campaign=guide-google-dorking">Hackers Guide to Google dorking</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/yeswecaido-plugin-bug-bounty-programs?utm_source=sponsor&amp;utm_medium=blog&amp;utm_campaign=blog-tool-yeswecaido">YesWeCaido</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge-of-the-month/dojo-42?utm_source=twitter&amp;utm_medium=social&amp;utm_campaign=dojo-challenge?">New Dojo Challenge</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/blog/smart-contracts-common-vulnerabilities-and-real-world-cases">Smart Contract BB tips</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/introducing-bugcrowd-red-team-as-a-service-rtaas/">Red Team AAS</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://getdisclosed.com/">Disclosed</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/xssdoctor/status/1932953259339083929">PDF csp bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.doyensec.com/2025/01/09/cspt-file-upload.html">Bypassing File Upload Restrictions To Exploit Client-Side Path Traversal</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jorianwoltjer.com/blog/p/research/obs-websocket-rce">OBS WebSocket to RCE</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sensecurity.io/time-in-a-bottle-or-knapsack/">Time in a bottle (or knapsack)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=WTH6f0R7uzo">How to Differentiate Yourself as a Bug Bounty Hunter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.disclosedonline.com/">Disclosed. Online</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackedin.net/">hacked-in</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.aim.security/lp/aim-labs-echoleak-blogpost">‘EchoLeak’</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://archive.codeblue.jp/2024/files/cb24_Piloting_Edge_Copilot_by_Jun_Kokatsu.pdf">Piloting Edge Copilot</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/assetnote/newtowner">Newtowner</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Jhaddix/status/1931834748793655539">Tips for agent prompting</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1932066642026012716">Firefox XSS vectors</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/kinugawamasato/status/1929635990316146899">Tweet from Masato Kinugawa</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/J0R1AN/status/1933463155763560881">Chrome debug() function</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 127: In this episode of Critical Thinking - Bug Bounty Podcast we address some recent bug bounty controversy before jumping into a slew of news itemsFollow us on XShoutout to YTCracker for the awesome intro music!Today's Sponsor: Adobe=====...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>127</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">bd280305-9ac8-410f-a047-189bf5bbfac4</guid>
  <title><![CDATA[Episode 126: Hacking AI Series: Vulnus ex Machina - Part 3]]></title>
  <description><![CDATA[<p>Episode<strong> </strong>126: In this episode of Critical Thinking - Bug Bounty Podcast we wrap up Rez0’s AI miniseries ‘<em>Vulnus Ex Machina</em>’. Part 3 includes a showcase of AI Vulns that Rez0 himself has found, and how much they paid out.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker Web Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-webcontrol">https://www.criticalthinkingpodcast.io/tl-webcontrol</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/wunderwuzzi23/status/1926867263451169116">Claude Code System Prompt</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/wunderwuzzi23/status/1926430567479857460">Attacking AI Agents</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sensecurity.io/probability-of-hacks/">Probability of Hacks</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hiddenlayer.com/innovation-hub/new-gemini-for-workspace-vulnerability/">New Gemini for Workspace Vulnerability Enabling Phishing &amp; Content Manipulation</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/hacking/2025/02/25/how-to-hack-ai-apps.html">How to Hack AI Agents and Applications</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:53) NahamCon Recap, Claude news, and wunderwuzzi writeups </p><p>(00:08:57) Probability of Hacks</p><p>(00:11:27) First AI Vulnerabilities</p><p>(00:18:57) AI Vulns on Google </p><p>(00:25:11) Invisible prompt Injection</p>]]></description>
  <embed_id>f4517364-a8da-4dab-9318-8148e7c337ab</embed_id>
  <pubDate>Thu, 12 Jun 2025 10:00:43 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="36994249" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/04a289d8-643d-4b7d-b676-cba7fd157706/episode.mp3" />
  <itunes:title><![CDATA[Episode 126: Hacking AI Series: Vulnus ex Machina - Part 3]]></itunes:title>
  <itunes:duration>38:32</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode<strong> </strong>126: In this episode of Critical Thinking - Bug Bounty Podcast we wrap up Rez0’s AI miniseries ‘<em>Vulnus Ex Machina</em>’. Part 3 includes a showcase of AI Vulns that Rez0 himself has found, and how much they paid out.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker Web Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-webcontrol">https://www.criticalthinkingpodcast.io/tl-webcontrol</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/wunderwuzzi23/status/1926867263451169116">Claude Code System Prompt</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/wunderwuzzi23/status/1926430567479857460">Attacking AI Agents</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sensecurity.io/probability-of-hacks/">Probability of Hacks</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hiddenlayer.com/innovation-hub/new-gemini-for-workspace-vulnerability/">New Gemini for Workspace Vulnerability Enabling Phishing &amp; Content Manipulation</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/hacking/2025/02/25/how-to-hack-ai-apps.html">How to Hack AI Agents and Applications</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:53) NahamCon Recap, Claude news, and wunderwuzzi writeups </p><p>(00:08:57) Probability of Hacks</p><p>(00:11:27) First AI Vulnerabilities</p><p>(00:18:57) AI Vulns on Google </p><p>(00:25:11) Invisible prompt Injection</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode<strong> </strong>126: In this episode of Critical Thinking - Bug Bounty Podcast we wrap up Rez0’s AI miniseries ‘<em>Vulnus Ex Machina</em>’. Part 3 includes a showcase of AI Vulns that Rez0 himself has found, and how much they paid out.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker Web Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-webcontrol">https://www.criticalthinkingpodcast.io/tl-webcontrol</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/wunderwuzzi23/status/1926867263451169116">Claude Code System Prompt</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/wunderwuzzi23/status/1926430567479857460">Attacking AI Agents</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sensecurity.io/probability-of-hacks/">Probability of Hacks</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hiddenlayer.com/innovation-hub/new-gemini-for-workspace-vulnerability/">New Gemini for Workspace Vulnerability Enabling Phishing &amp; Content Manipulation</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/hacking/2025/02/25/how-to-hack-ai-apps.html">How to Hack AI Agents and Applications</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:53) NahamCon Recap, Claude news, and wunderwuzzi writeups </p><p>(00:08:57) Probability of Hacks</p><p>(00:11:27) First AI Vulnerabilities</p><p>(00:18:57) AI Vulns on Google </p><p>(00:25:11) Invisible prompt Injection</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 126: In this episode of Critical Thinking - Bug Bounty Podcast we wrap up Rez0’s AI miniseries ‘Vulnus Ex Machina’. Part 3 includes a showcase of AI Vulns that Rez0 himself has found, and how much they paid out.Follow us on twitter at: http...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>126</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">4f42012d-29bb-4f04-a2cb-4178ccbbe340</guid>
  <title><![CDATA[Episode 125: How to Win Live Hacking Events ]]></title>
  <description><![CDATA[<p>Episode 125: In this episode of Critical Thinking - Bug Bounty Podcast Justin shares insights on how to succeed at live hacking events. We cover pre-event preparations, challenges of collaboration, on-site strategies, and the importance of maintaining a healthy mindset throughout the entire process.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs/decathlon">Decathlon Public Bug Bounty Program on YesWeHack</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jorianwoltjer.com/blog/p/hacking/ultimate-doubleclickjacking-poc">The Ultimate Double-Clickjacking PoC</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nightbloodz.github.io/grafana-CVE-2025-4123/">Grafana Full read SSRF and Account Takeover: CVE-2025-4123</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/NightBloodz/CVE-2025-4123">Grafana CVE-2025-4123 Exploit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://evanconnelly.com/post/my-first-100-hackerone-reports/">What I learned from my first 100 HackerOne Reports</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/personal/2025/05/13/root-for-your-friends.html">Root for your friends</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:30) The Ultimate Double-Clickjacking PoC, Grafana CVE, &amp; Evan Connelly's first 100 bugs</p><p>(00:10:23) How to win at Live Hacking Events</p><p>(00:11:53) Pre-event</p><p>(00:11:45) Scope Call</p><p>(00:33:11) Dupe window Ends</p><p>(00:36:00) Onsite &amp; and Day of Event</p><p>(00:42:46) Don't define your identity on the outcome</p>]]></description>
  <embed_id>1cb1fbc4-14a2-4c17-b2e4-a963d715a34e</embed_id>
  <pubDate>Thu, 05 Jun 2025 10:01:40 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="45186249" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/1486b6da-f842-4066-b193-1a86ee6529e1/episode.mp3" />
  <itunes:title><![CDATA[Episode 125: How to Win Live Hacking Events ]]></itunes:title>
  <itunes:duration>47:04</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 125: In this episode of Critical Thinking - Bug Bounty Podcast Justin shares insights on how to succeed at live hacking events. We cover pre-event preparations, challenges of collaboration, on-site strategies, and the importance of maintaining a healthy mindset throughout the entire process.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs/decathlon">Decathlon Public Bug Bounty Program on YesWeHack</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jorianwoltjer.com/blog/p/hacking/ultimate-doubleclickjacking-poc">The Ultimate Double-Clickjacking PoC</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nightbloodz.github.io/grafana-CVE-2025-4123/">Grafana Full read SSRF and Account Takeover: CVE-2025-4123</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/NightBloodz/CVE-2025-4123">Grafana CVE-2025-4123 Exploit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://evanconnelly.com/post/my-first-100-hackerone-reports/">What I learned from my first 100 HackerOne Reports</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/personal/2025/05/13/root-for-your-friends.html">Root for your friends</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:30) The Ultimate Double-Clickjacking PoC, Grafana CVE, &amp; Evan Connelly's first 100 bugs</p><p>(00:10:23) How to win at Live Hacking Events</p><p>(00:11:53) Pre-event</p><p>(00:11:45) Scope Call</p><p>(00:33:11) Dupe window Ends</p><p>(00:36:00) Onsite &amp; and Day of Event</p><p>(00:42:46) Don't define your identity on the outcome</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 125: In this episode of Critical Thinking - Bug Bounty Podcast Justin shares insights on how to succeed at live hacking events. We cover pre-event preparations, challenges of collaboration, on-site strategies, and the importance of maintaining a healthy mindset throughout the entire process.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs/decathlon">Decathlon Public Bug Bounty Program on YesWeHack</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jorianwoltjer.com/blog/p/hacking/ultimate-doubleclickjacking-poc">The Ultimate Double-Clickjacking PoC</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nightbloodz.github.io/grafana-CVE-2025-4123/">Grafana Full read SSRF and Account Takeover: CVE-2025-4123</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/NightBloodz/CVE-2025-4123">Grafana CVE-2025-4123 Exploit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://evanconnelly.com/post/my-first-100-hackerone-reports/">What I learned from my first 100 HackerOne Reports</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/personal/2025/05/13/root-for-your-friends.html">Root for your friends</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:30) The Ultimate Double-Clickjacking PoC, Grafana CVE, &amp; Evan Connelly's first 100 bugs</p><p>(00:10:23) How to win at Live Hacking Events</p><p>(00:11:53) Pre-event</p><p>(00:11:45) Scope Call</p><p>(00:33:11) Dupe window Ends</p><p>(00:36:00) Onsite &amp; and Day of Event</p><p>(00:42:46) Don't define your identity on the outcome</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 125: In this episode of Critical Thinking - Bug Bounty Podcast Justin shares insights on how to succeed at live hacking events. We cover pre-event preparations, challenges of collaboration, on-site strategies, and the importance of maintain...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>125</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">ce9e2001-b176-4f5c-b1fb-a21962ab165a</guid>
  <title><![CDATA[Episode 124: Bug Bounty Lifestyle = Less Hacking Time?]]></title>
  <description><![CDATA[<p>Episode 124: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph cover some news from around the community, hitting on Joseph’s Anthropic safety testing, Justin’s guest appearance on For Crying Out Cloud, and several fascinating tweets. Then they have a quick Full-time Bug Bounty check-in.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker Web Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-webcontrol">https://www.criticalthinkingpodcast.io/tl-webcontrol</a></p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs/louis-vuitton-malletier-public-bug-bounty-program">Louis Vuitton Public Bug Bounty Program</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47934">CVE-2025-47934 was discovered on one of our Bug Bounty program : OpenPGP.js</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/3115705">Stored XSS in File Upload Leads to Privilege Escalation and Full Workspace Takeover</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/J0R1AN/status/1925164620886536703/photo/1">Jorian tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.jaisal.dev/articles/cwazy-clipboardz">Clipjacking: Hacked by copying text - Clickjacking but better</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=eW6kk-5Jn6k">Crying out Cloud Appearance</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/wiz_io/status/1924463892111020363">Wiz Research takes 1st place in Pwn2Own AI category</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1922029698986455338">New XSS vector with image tag</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:10:50) Supabase</p><p>(00:13:47) Tweet-research from Jorian and Wyatt Walls.</p><p>(00:20:24) Anthropic safety testing challenge &amp; Wiz Podcast guest appearance</p><p>(00:27:44) New XSS vector, Google i/o, and coding agents</p><p>(00:35:48) Full Time Bug Bounty</p>]]></description>
  <embed_id>e175d83b-d1b5-4e46-bffc-46d209173a88</embed_id>
  <pubDate>Thu, 29 May 2025 10:01:36 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="43618491" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/58ffc12d-b9a0-43dd-9628-37b12bf8a5fc/episode.mp3" />
  <itunes:title><![CDATA[Episode 124: Bug Bounty Lifestyle = Less Hacking Time?]]></itunes:title>
  <itunes:duration>45:26</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 124: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph cover some news from around the community, hitting on Joseph’s Anthropic safety testing, Justin’s guest appearance on For Crying Out Cloud, and several fascinating tweets. Then they have a quick Full-time Bug Bounty check-in.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker Web Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-webcontrol">https://www.criticalthinkingpodcast.io/tl-webcontrol</a></p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs/louis-vuitton-malletier-public-bug-bounty-program">Louis Vuitton Public Bug Bounty Program</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47934">CVE-2025-47934 was discovered on one of our Bug Bounty program : OpenPGP.js</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/3115705">Stored XSS in File Upload Leads to Privilege Escalation and Full Workspace Takeover</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/J0R1AN/status/1925164620886536703/photo/1">Jorian tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.jaisal.dev/articles/cwazy-clipboardz">Clipjacking: Hacked by copying text - Clickjacking but better</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=eW6kk-5Jn6k">Crying out Cloud Appearance</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/wiz_io/status/1924463892111020363">Wiz Research takes 1st place in Pwn2Own AI category</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1922029698986455338">New XSS vector with image tag</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:10:50) Supabase</p><p>(00:13:47) Tweet-research from Jorian and Wyatt Walls.</p><p>(00:20:24) Anthropic safety testing challenge &amp; Wiz Podcast guest appearance</p><p>(00:27:44) New XSS vector, Google i/o, and coding agents</p><p>(00:35:48) Full Time Bug Bounty</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 124: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph cover some news from around the community, hitting on Joseph’s Anthropic safety testing, Justin’s guest appearance on For Crying Out Cloud, and several fascinating tweets. Then they have a quick Full-time Bug Bounty check-in.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker Web Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-webcontrol">https://www.criticalthinkingpodcast.io/tl-webcontrol</a></p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs/louis-vuitton-malletier-public-bug-bounty-program">Louis Vuitton Public Bug Bounty Program</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47934">CVE-2025-47934 was discovered on one of our Bug Bounty program : OpenPGP.js</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/3115705">Stored XSS in File Upload Leads to Privilege Escalation and Full Workspace Takeover</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/J0R1AN/status/1925164620886536703/photo/1">Jorian tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.jaisal.dev/articles/cwazy-clipboardz">Clipjacking: Hacked by copying text - Clickjacking but better</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=eW6kk-5Jn6k">Crying out Cloud Appearance</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/wiz_io/status/1924463892111020363">Wiz Research takes 1st place in Pwn2Own AI category</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1922029698986455338">New XSS vector with image tag</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:10:50) Supabase</p><p>(00:13:47) Tweet-research from Jorian and Wyatt Walls.</p><p>(00:20:24) Anthropic safety testing challenge &amp; Wiz Podcast guest appearance</p><p>(00:27:44) New XSS vector, Google i/o, and coding agents</p><p>(00:35:48) Full Time Bug Bounty</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 124: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph cover some news from around the community, hitting on Joseph’s Anthropic safety testing, Justin’s guest appearance on For Crying Out Cloud, and several fascina...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>124</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">7a4d3cdf-ec06-4ba1-9c5f-9e3d4c18cc63</guid>
  <title><![CDATA[Episode 123: Hacking AI Series: Vulnus ex Machina - Part 2]]></title>
  <description><![CDATA[<p>Episode 123: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with part 2 of Rez0’s miniseries. Today we talk about mastering Prompt Injection, taxonomy of impact, and both triggering traditional Vulns and exploiting AI-specific features.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker User Store</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io">https://www.criticalthinkingpodcast.io</a></p><p>/tl-userstore</p><p><strong>====== This Week in Bug Bounty ======</strong></p><p>Earning a HackerOne 2025 Live Hacking Invite</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/blog/earning-hackerone-2025-live-hacking-invite">https://www.hackerone.com/blog/earning-hackerone-2025-live-hacking-invite</a></p><p>HTTP header hacks: basic and advanced exploit techniques explored</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/http-header-exploitation">https://www.yeswehack.com/learn-bug-bounty/http-header-exploitation</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://Grep.app">Grep.app</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://vercel.com/blog/migrating-grep-from-create-react-app-to-next-js">https://vercel.com/blog/migrating-grep-from-create-react-app-to-next-js</a></p><p>Gemini 2.5 Pro prompt leak</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/elder_plinius/status/1913734789544214841">https://x.com/elder_plinius/status/1913734789544214841</a></p><p>Pliny's CL4R1T4S</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/elder-plinius/CL4R1T4S">https://github.com/elder-plinius/CL4R1T4S</a></p><p>O3</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/pdstat/status/1913701997141803329">https://x.com/pdstat/status/1913701997141803329</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:05:25) <a target="_blank" rel="noopener noreferrer nofollow" href="http://Grep.app">Grep.app</a>, O3, and Gemini 2.5 Pro prompt leak</p><p>(00:11:09) Delivery and impactful action</p><p>(00:20:44) Mastering Prompt Injection</p><p>(00:30:36) Traditional vulns in Tool Calls, and AI Apps</p><p>(00:37:32) Exploiting AI specific features</p>]]></description>
  <embed_id>f3463e96-5dde-4ac2-9286-ebae72917248</embed_id>
  <pubDate>Thu, 22 May 2025 10:01:32 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="42434407" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/e8389044-4fe9-4c8e-b84f-3054e4453f7e/episode.mp3" />
  <itunes:title><![CDATA[Episode 123: Hacking AI Series: Vulnus ex Machina - Part 2]]></itunes:title>
  <itunes:duration>44:12</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 123: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with part 2 of Rez0’s miniseries. Today we talk about mastering Prompt Injection, taxonomy of impact, and both triggering traditional Vulns and exploiting AI-specific features.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker User Store</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io">https://www.criticalthinkingpodcast.io</a></p><p>/tl-userstore</p><p><strong>====== This Week in Bug Bounty ======</strong></p><p>Earning a HackerOne 2025 Live Hacking Invite</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/blog/earning-hackerone-2025-live-hacking-invite">https://www.hackerone.com/blog/earning-hackerone-2025-live-hacking-invite</a></p><p>HTTP header hacks: basic and advanced exploit techniques explored</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/http-header-exploitation">https://www.yeswehack.com/learn-bug-bounty/http-header-exploitation</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://Grep.app">Grep.app</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://vercel.com/blog/migrating-grep-from-create-react-app-to-next-js">https://vercel.com/blog/migrating-grep-from-create-react-app-to-next-js</a></p><p>Gemini 2.5 Pro prompt leak</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/elder_plinius/status/1913734789544214841">https://x.com/elder_plinius/status/1913734789544214841</a></p><p>Pliny's CL4R1T4S</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/elder-plinius/CL4R1T4S">https://github.com/elder-plinius/CL4R1T4S</a></p><p>O3</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/pdstat/status/1913701997141803329">https://x.com/pdstat/status/1913701997141803329</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:05:25) <a target="_blank" rel="noopener noreferrer nofollow" href="http://Grep.app">Grep.app</a>, O3, and Gemini 2.5 Pro prompt leak</p><p>(00:11:09) Delivery and impactful action</p><p>(00:20:44) Mastering Prompt Injection</p><p>(00:30:36) Traditional vulns in Tool Calls, and AI Apps</p><p>(00:37:32) Exploiting AI specific features</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 123: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with part 2 of Rez0’s miniseries. Today we talk about mastering Prompt Injection, taxonomy of impact, and both triggering traditional Vulns and exploiting AI-specific features.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker User Store</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io">https://www.criticalthinkingpodcast.io</a></p><p>/tl-userstore</p><p><strong>====== This Week in Bug Bounty ======</strong></p><p>Earning a HackerOne 2025 Live Hacking Invite</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.hackerone.com/blog/earning-hackerone-2025-live-hacking-invite">https://www.hackerone.com/blog/earning-hackerone-2025-live-hacking-invite</a></p><p>HTTP header hacks: basic and advanced exploit techniques explored</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/http-header-exploitation">https://www.yeswehack.com/learn-bug-bounty/http-header-exploitation</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://Grep.app">Grep.app</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://vercel.com/blog/migrating-grep-from-create-react-app-to-next-js">https://vercel.com/blog/migrating-grep-from-create-react-app-to-next-js</a></p><p>Gemini 2.5 Pro prompt leak</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/elder_plinius/status/1913734789544214841">https://x.com/elder_plinius/status/1913734789544214841</a></p><p>Pliny's CL4R1T4S</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/elder-plinius/CL4R1T4S">https://github.com/elder-plinius/CL4R1T4S</a></p><p>O3</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/pdstat/status/1913701997141803329">https://x.com/pdstat/status/1913701997141803329</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:05:25) <a target="_blank" rel="noopener noreferrer nofollow" href="http://Grep.app">Grep.app</a>, O3, and Gemini 2.5 Pro prompt leak</p><p>(00:11:09) Delivery and impactful action</p><p>(00:20:44) Mastering Prompt Injection</p><p>(00:30:36) Traditional vulns in Tool Calls, and AI Apps</p><p>(00:37:32) Exploiting AI specific features</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 123: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with part 2 of Rez0’s miniseries. Today we talk about mastering Prompt Injection, taxonomy of impact, and both triggering traditional Vulns and exploiting AI-specific...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>123</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">c9b6268f-2efe-4368-9dc8-c2c16a9763ac</guid>
  <title><![CDATA[Episode 122: We Won Google's AI Hacking Event in Tokyo - Main Takeaways]]></title>
  <description><![CDATA[<p>Episode 122: In this episode of Critical Thinking - Bug Bounty Podcast your boys are MVH winners! First we’re joined by Zak, to discuss the Google LHE as well as surprising us with a bug of his own! Then, we sit down with Lupin and Monke for a winners roundtable and retrospective of the event.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Check out the CTBB Job Board: <a target="_blank" rel="noopener noreferrer nofollow" href="https://jobs.ctbb.show/">https://jobs.ctbb.show/</a></p><p>Today’s Guests:</p><p>Zak Bennett : <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/zak-bennett/">https://www.linkedin.com/in/zak-bennett/</a></p><p>Ciarán Cotter: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/monkehack">https://x.com/monkehack</a></p><p>Roni Carta: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xLupin">https://x.com/0xLupin</a></p><p><strong>====== Resources ======</strong></p><p>We hacked Google’s A.I Gemini and leaked its source code</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.landh.tech/blog/20250327-we-hacked-gemini-source-code">https://www.landh.tech/blog/20250327-we-hacked-gemini-source-code</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:03:02) An RCE via memory corruption</p><p>(00:07:45) Zak's role at Google and Google's AI LHE</p><p>(00:15:25) Different Components of AI Vulnerabilities</p><p>(00:24:58) MHV Winner Debrief</p><p>(01:08:47) Technical Takeaways And Team Strategies</p><p>(01:28:49) LHE Experience and Google VRP &amp; Abuse VRP</p>]]></description>
  <embed_id>e80e123a-05ee-43ff-9240-4a9a1be98716</embed_id>
  <pubDate>Thu, 15 May 2025 10:00:29 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="101282649" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/4ab8b586-6316-4a38-a845-cd47946614d2/episode.mp3" />
  <itunes:title><![CDATA[Episode 122: We Won Google's AI Hacking Event in Tokyo - Main Takeaways]]></itunes:title>
  <itunes:duration>1:45:30</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 122: In this episode of Critical Thinking - Bug Bounty Podcast your boys are MVH winners! First we’re joined by Zak, to discuss the Google LHE as well as surprising us with a bug of his own! Then, we sit down with Lupin and Monke for a winners roundtable and retrospective of the event.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Check out the CTBB Job Board: <a target="_blank" rel="noopener noreferrer nofollow" href="https://jobs.ctbb.show/">https://jobs.ctbb.show/</a></p><p>Today’s Guests:</p><p>Zak Bennett : <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/zak-bennett/">https://www.linkedin.com/in/zak-bennett/</a></p><p>Ciarán Cotter: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/monkehack">https://x.com/monkehack</a></p><p>Roni Carta: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xLupin">https://x.com/0xLupin</a></p><p><strong>====== Resources ======</strong></p><p>We hacked Google’s A.I Gemini and leaked its source code</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.landh.tech/blog/20250327-we-hacked-gemini-source-code">https://www.landh.tech/blog/20250327-we-hacked-gemini-source-code</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:03:02) An RCE via memory corruption</p><p>(00:07:45) Zak's role at Google and Google's AI LHE</p><p>(00:15:25) Different Components of AI Vulnerabilities</p><p>(00:24:58) MHV Winner Debrief</p><p>(01:08:47) Technical Takeaways And Team Strategies</p><p>(01:28:49) LHE Experience and Google VRP &amp; Abuse VRP</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 122: In this episode of Critical Thinking - Bug Bounty Podcast your boys are MVH winners! First we’re joined by Zak, to discuss the Google LHE as well as surprising us with a bug of his own! Then, we sit down with Lupin and Monke for a winners roundtable and retrospective of the event.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Check out the CTBB Job Board: <a target="_blank" rel="noopener noreferrer nofollow" href="https://jobs.ctbb.show/">https://jobs.ctbb.show/</a></p><p>Today’s Guests:</p><p>Zak Bennett : <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/zak-bennett/">https://www.linkedin.com/in/zak-bennett/</a></p><p>Ciarán Cotter: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/monkehack">https://x.com/monkehack</a></p><p>Roni Carta: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xLupin">https://x.com/0xLupin</a></p><p><strong>====== Resources ======</strong></p><p>We hacked Google’s A.I Gemini and leaked its source code</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.landh.tech/blog/20250327-we-hacked-gemini-source-code">https://www.landh.tech/blog/20250327-we-hacked-gemini-source-code</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:03:02) An RCE via memory corruption</p><p>(00:07:45) Zak's role at Google and Google's AI LHE</p><p>(00:15:25) Different Components of AI Vulnerabilities</p><p>(00:24:58) MHV Winner Debrief</p><p>(01:08:47) Technical Takeaways And Team Strategies</p><p>(01:28:49) LHE Experience and Google VRP &amp; Abuse VRP</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 122: In this episode of Critical Thinking - Bug Bounty Podcast your boys are MVH winners! First we’re joined by Zak, to discuss the Google LHE as well as surprising us with a bug of his own! Then, we sit down with Lupin and Monke for a winn...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>122</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">cff71562-cad3-4954-b599-73a2745e6d64</guid>
  <title><![CDATA[Episode 121: Slonser’s Image Injection 0-day -> ATO & New Caido Collab Plugin]]></title>
  <description><![CDATA[<p>Episode 121: In this episode of Critical Thinking - Bug Bounty Podcast we cover so much news and research that we ran out of room in the description...</p><p>Follow us on <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">X</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater </a>and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0 </a>on X:</p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">CTBB Discord!</a></p><p>We also have <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">hacker swag</a>!</p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/hacker-spotlight-rhynorater/">Hacker spotlight: Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bugcrowd.com/engagements/ultramobile-mbb-og2">Ultra Mobile  BB Program - Mobile Apps</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bugcrowd.com/engagements/ultramobile">Ultra Mobile BB Program - (Public)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/john-deere?type=team">John Deere Program</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.deere.com/en/stories/featured/hacker-heroes/">JD's's BB Program Boosts Cybersecurity</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge/play/5509cc2e-bd6c-4606-8cbb-f3ca1d25c732">Dojo #41 - Ruby treasure</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/slonser_/status/1919439373986107814">slonser 0-day in chrome</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast/status/1919501924862214577">CT Additional useful primitives</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@sharon.brizinov/how-i-made-64k-from-deleted-files-a-bug-bounty-story-c5bd3a6f5f9b">How I made $64k from deleted files</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/98">CTBB episode with Sharon Brizinov</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/subdomain_link_launcher">Rez0's Subdomain Link Launcher</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/simonw/status/1918451927207325774">Qwen3 Local Model</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.jaisal.dev/articles/mcp">May Cause Pwnage</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/KN0X55/status/1916180381742551238">import WAF bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/caido-community/drop">Caido Drop</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xacb/status/1915334267522912742">Andre's tweet about encoded word</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.nahamcon.com/">Nahamcon</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/elder_plinius/status/1913734789544214841">Gemini prompt leak</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1915488202405593136">SVG Onload Handlers</a></p>]]></description>
  <embed_id>096a97b3-75be-4625-a965-33f704326a5d</embed_id>
  <pubDate>Thu, 08 May 2025 10:00:25 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="55157090" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/f25fb4ee-8afe-45d7-a6e2-29a402082618/episode.mp3" />
  <itunes:title><![CDATA[Episode 121: Slonser’s Image Injection 0-day -> ATO & New Caido Collab Plugin]]></itunes:title>
  <itunes:duration>57:27</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 121: In this episode of Critical Thinking - Bug Bounty Podcast we cover so much news and research that we ran out of room in the description...</p><p>Follow us on <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">X</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater </a>and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0 </a>on X:</p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">CTBB Discord!</a></p><p>We also have <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">hacker swag</a>!</p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/hacker-spotlight-rhynorater/">Hacker spotlight: Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bugcrowd.com/engagements/ultramobile-mbb-og2">Ultra Mobile  BB Program - Mobile Apps</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bugcrowd.com/engagements/ultramobile">Ultra Mobile BB Program - (Public)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/john-deere?type=team">John Deere Program</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.deere.com/en/stories/featured/hacker-heroes/">JD's's BB Program Boosts Cybersecurity</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge/play/5509cc2e-bd6c-4606-8cbb-f3ca1d25c732">Dojo #41 - Ruby treasure</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/slonser_/status/1919439373986107814">slonser 0-day in chrome</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast/status/1919501924862214577">CT Additional useful primitives</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@sharon.brizinov/how-i-made-64k-from-deleted-files-a-bug-bounty-story-c5bd3a6f5f9b">How I made $64k from deleted files</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/98">CTBB episode with Sharon Brizinov</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/subdomain_link_launcher">Rez0's Subdomain Link Launcher</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/simonw/status/1918451927207325774">Qwen3 Local Model</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.jaisal.dev/articles/mcp">May Cause Pwnage</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/KN0X55/status/1916180381742551238">import WAF bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/caido-community/drop">Caido Drop</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xacb/status/1915334267522912742">Andre's tweet about encoded word</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.nahamcon.com/">Nahamcon</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/elder_plinius/status/1913734789544214841">Gemini prompt leak</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1915488202405593136">SVG Onload Handlers</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 121: In this episode of Critical Thinking - Bug Bounty Podcast we cover so much news and research that we ran out of room in the description...</p><p>Follow us on <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">X</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater </a>and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0 </a>on X:</p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">CTBB Discord!</a></p><p>We also have <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">hacker swag</a>!</p><p><strong>====== This Week in Bug Bounty ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/hacker-spotlight-rhynorater/">Hacker spotlight: Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bugcrowd.com/engagements/ultramobile-mbb-og2">Ultra Mobile  BB Program - Mobile Apps</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bugcrowd.com/engagements/ultramobile">Ultra Mobile BB Program - (Public)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/john-deere?type=team">John Deere Program</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.deere.com/en/stories/featured/hacker-heroes/">JD's's BB Program Boosts Cybersecurity</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://dojo-yeswehack.com/challenge/play/5509cc2e-bd6c-4606-8cbb-f3ca1d25c732">Dojo #41 - Ruby treasure</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/slonser_/status/1919439373986107814">slonser 0-day in chrome</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast/status/1919501924862214577">CT Additional useful primitives</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@sharon.brizinov/how-i-made-64k-from-deleted-files-a-bug-bounty-story-c5bd3a6f5f9b">How I made $64k from deleted files</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/98">CTBB episode with Sharon Brizinov</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/subdomain_link_launcher">Rez0's Subdomain Link Launcher</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/simonw/status/1918451927207325774">Qwen3 Local Model</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.jaisal.dev/articles/mcp">May Cause Pwnage</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/KN0X55/status/1916180381742551238">import WAF bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/caido-community/drop">Caido Drop</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xacb/status/1915334267522912742">Andre's tweet about encoded word</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.nahamcon.com/">Nahamcon</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/elder_plinius/status/1913734789544214841">Gemini prompt leak</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1915488202405593136">SVG Onload Handlers</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 121: In this episode of Critical Thinking - Bug Bounty Podcast we cover so much news and research that we ran out of room in the description...Follow us on XShoutout to YTCracker for the awesome intro music!====== Links ======Follow Rhynora...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>121</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">57f0c0f4-c32b-4c8d-8382-0dae67239074</guid>
  <title><![CDATA[Episode 120: SpaceRaccoon - From Day Zero to Zero Day]]></title>
  <description><![CDATA[<p>Episode 120: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner welcomes Eugene to talk (aka fanboy) about his new book, 'From Day Zero to Zero Day.' We walk through what to expect in each chapter, including Binary Analysis, Source and Sink Discovery, and Fuzzing everything.Then we give listeners a special deal on the book.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast"> https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at<a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord"> https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at<a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch"> https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker User Store</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io">https://www.criticalthinkingpodcast.io</a></p><p>/tl-userstore</p><p>Today’s guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/spaceraccoonsec">https://x.com/spaceraccoonsec</a></p><p><strong>====== Resources ======</strong></p><p>Buy SpaceRaccoon's Book: From Day Zero to Zero Day</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nostarch.com/zero-day">https://nostarch.com/zero-day</a></p><p>USE CODE 'ZERODAYDEAL' for 30% OFF</p><p>Pwning Millions of Smart Weighing Machines with API and Hardware Hacking</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://spaceraccoon.dev/pwning-millions-smart-weighing-machines-api-hardware-hacking/">https://spaceraccoon.dev/pwning-millions-smart-weighing-machines-api-hardware-hacking/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:04:58) From Day Zero to Zero Day</p><p>(00:12:06) Mapping Code to Attack Surface</p><p>(00:17:59) Day Zero and Taint Analysis</p><p>(00:22:43) Automated Variant Analysis &amp; Binary Taxonomy</p><p>(00:31:35) Source and Sink Discovery</p><p>(00:40:22) Hybrid Binary Analysis &amp; Quick and Dirty Fuzzing</p><p>(00:56:00) Coverage-Guided Fuzzing, Fuzzing Everything, &amp; Beyond Day Zero</p><p>(01:02:16) Bug bounty, Vuln research, &amp; Governmental work</p><p>(01:10:23) Source Code Review &amp; Pwning Millions of Smart Weighing Machines</p>]]></description>
  <embed_id>9b6c41e0-242c-49cc-a0e1-52e897e56dca</embed_id>
  <pubDate>Thu, 01 May 2025 10:01:20 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="93074340" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/baa25599-3fd3-4a3a-b71a-6414526160e7/episode.mp3" />
  <itunes:title><![CDATA[Episode 120: SpaceRaccoon - From Day Zero to Zero Day]]></itunes:title>
  <itunes:duration>1:36:57</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 120: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner welcomes Eugene to talk (aka fanboy) about his new book, 'From Day Zero to Zero Day.' We walk through what to expect in each chapter, including Binary Analysis, Source and Sink Discovery, and Fuzzing everything.Then we give listeners a special deal on the book.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast"> https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at<a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord"> https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at<a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch"> https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker User Store</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io">https://www.criticalthinkingpodcast.io</a></p><p>/tl-userstore</p><p>Today’s guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/spaceraccoonsec">https://x.com/spaceraccoonsec</a></p><p><strong>====== Resources ======</strong></p><p>Buy SpaceRaccoon's Book: From Day Zero to Zero Day</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nostarch.com/zero-day">https://nostarch.com/zero-day</a></p><p>USE CODE 'ZERODAYDEAL' for 30% OFF</p><p>Pwning Millions of Smart Weighing Machines with API and Hardware Hacking</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://spaceraccoon.dev/pwning-millions-smart-weighing-machines-api-hardware-hacking/">https://spaceraccoon.dev/pwning-millions-smart-weighing-machines-api-hardware-hacking/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:04:58) From Day Zero to Zero Day</p><p>(00:12:06) Mapping Code to Attack Surface</p><p>(00:17:59) Day Zero and Taint Analysis</p><p>(00:22:43) Automated Variant Analysis &amp; Binary Taxonomy</p><p>(00:31:35) Source and Sink Discovery</p><p>(00:40:22) Hybrid Binary Analysis &amp; Quick and Dirty Fuzzing</p><p>(00:56:00) Coverage-Guided Fuzzing, Fuzzing Everything, &amp; Beyond Day Zero</p><p>(01:02:16) Bug bounty, Vuln research, &amp; Governmental work</p><p>(01:10:23) Source Code Review &amp; Pwning Millions of Smart Weighing Machines</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 120: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner welcomes Eugene to talk (aka fanboy) about his new book, 'From Day Zero to Zero Day.' We walk through what to expect in each chapter, including Binary Analysis, Source and Sink Discovery, and Fuzzing everything.Then we give listeners a special deal on the book.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast"> https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at<a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord"> https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at<a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch"> https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker User Store</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io">https://www.criticalthinkingpodcast.io</a></p><p>/tl-userstore</p><p>Today’s guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/spaceraccoonsec">https://x.com/spaceraccoonsec</a></p><p><strong>====== Resources ======</strong></p><p>Buy SpaceRaccoon's Book: From Day Zero to Zero Day</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nostarch.com/zero-day">https://nostarch.com/zero-day</a></p><p>USE CODE 'ZERODAYDEAL' for 30% OFF</p><p>Pwning Millions of Smart Weighing Machines with API and Hardware Hacking</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://spaceraccoon.dev/pwning-millions-smart-weighing-machines-api-hardware-hacking/">https://spaceraccoon.dev/pwning-millions-smart-weighing-machines-api-hardware-hacking/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:04:58) From Day Zero to Zero Day</p><p>(00:12:06) Mapping Code to Attack Surface</p><p>(00:17:59) Day Zero and Taint Analysis</p><p>(00:22:43) Automated Variant Analysis &amp; Binary Taxonomy</p><p>(00:31:35) Source and Sink Discovery</p><p>(00:40:22) Hybrid Binary Analysis &amp; Quick and Dirty Fuzzing</p><p>(00:56:00) Coverage-Guided Fuzzing, Fuzzing Everything, &amp; Beyond Day Zero</p><p>(01:02:16) Bug bounty, Vuln research, &amp; Governmental work</p><p>(01:10:23) Source Code Review &amp; Pwning Millions of Smart Weighing Machines</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 120: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner welcomes Eugene to talk (aka fanboy) about his new book, 'From Day Zero to Zero Day.' We walk through what to expect in each chapter, including Binary Analysis, S...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>120</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">46665c9c-4634-4e2d-8266-e931c0b2f84c</guid>
  <title><![CDATA[Episode 119: Abusing Iframes from a client-side hacker]]></title>
  <description><![CDATA[<p>Episode 119: In this episode of Critical Thinking - Bug Bounty Podcast Justin does a mini deep dive into the world of iframes, starting with why they’re significant, their attributes, and how to attack them.</p><p><strong>CORRECTION: Some of my comments on the latest episode of the pod were woefully inaccurate about the `csp` attribute of an iframe. Def should have read the spec more thoroughly. Please see the </strong><a target="_blank" rel="noopener noreferrer nofollow" class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1loqt21" href="https://x.com/hashtag/corrections?src=hashtag_click"><strong>#corrections</strong></a><strong> channel in Discord for the deets.</strong></p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== Resources ======</strong></p><p>Episode with JR0ch17</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/61">ctbb.show/61</a></p><p>Exacerbating Cross-Site Scripting: The Iframe Sandwich</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://coopergyoung.com/exacerbating-cross-site-scripting-the-iframe-sandwich/">https://coopergyoung.com/exacerbating-cross-site-scripting-the-iframe-sandwich/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:20) Why are Iframes useful</p><p>(00:05:11) Attributes of Iframes</p><p>(00:21:39) Iframe Attacks</p><p>(00:29:53) Iframe Fun Facts</p>]]></description>
  <embed_id>59f4c0e2-3a34-4eb7-8dfe-3022234d6117</embed_id>
  <pubDate>Thu, 17 Apr 2025 10:01:33 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="32546335" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/05da8d63-03b9-4f37-af42-daec814ebde3/episode.mp3" />
  <itunes:title><![CDATA[Episode 119: Abusing Iframes from a client-side hacker]]></itunes:title>
  <itunes:duration>33:54</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 119: In this episode of Critical Thinking - Bug Bounty Podcast Justin does a mini deep dive into the world of iframes, starting with why they’re significant, their attributes, and how to attack them.</p><p><strong>CORRECTION: Some of my comments on the latest episode of the pod were woefully inaccurate about the `csp` attribute of an iframe. Def should have read the spec more thoroughly. Please see the </strong><a target="_blank" rel="noopener noreferrer nofollow" class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1loqt21" href="https://x.com/hashtag/corrections?src=hashtag_click"><strong>#corrections</strong></a><strong> channel in Discord for the deets.</strong></p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== Resources ======</strong></p><p>Episode with JR0ch17</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/61">ctbb.show/61</a></p><p>Exacerbating Cross-Site Scripting: The Iframe Sandwich</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://coopergyoung.com/exacerbating-cross-site-scripting-the-iframe-sandwich/">https://coopergyoung.com/exacerbating-cross-site-scripting-the-iframe-sandwich/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:20) Why are Iframes useful</p><p>(00:05:11) Attributes of Iframes</p><p>(00:21:39) Iframe Attacks</p><p>(00:29:53) Iframe Fun Facts</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 119: In this episode of Critical Thinking - Bug Bounty Podcast Justin does a mini deep dive into the world of iframes, starting with why they’re significant, their attributes, and how to attack them.</p><p><strong>CORRECTION: Some of my comments on the latest episode of the pod were woefully inaccurate about the `csp` attribute of an iframe. Def should have read the spec more thoroughly. Please see the </strong><a target="_blank" rel="noopener noreferrer nofollow" class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1loqt21" href="https://x.com/hashtag/corrections?src=hashtag_click"><strong>#corrections</strong></a><strong> channel in Discord for the deets.</strong></p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== Resources ======</strong></p><p>Episode with JR0ch17</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/61">ctbb.show/61</a></p><p>Exacerbating Cross-Site Scripting: The Iframe Sandwich</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://coopergyoung.com/exacerbating-cross-site-scripting-the-iframe-sandwich/">https://coopergyoung.com/exacerbating-cross-site-scripting-the-iframe-sandwich/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:20) Why are Iframes useful</p><p>(00:05:11) Attributes of Iframes</p><p>(00:21:39) Iframe Attacks</p><p>(00:29:53) Iframe Fun Facts</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 119: In this episode of Critical Thinking - Bug Bounty Podcast Justin does a mini deep dive into the world of iframes, starting with why they’re significant, their attributes, and how to attack them.CORRECTION: Some of my comments on the la...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>119</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">c25319d4-5c4a-49e4-ab3b-0adeb1279404</guid>
  <title><![CDATA[Episode 118:  Hacking Happy Hour: 0days on Tap and SQLi Shots]]></title>
  <description><![CDATA[<p>Episode 118: In this episode of Critical Thinking - Bug Bounty Podcast we cover a host of news, including clientside tidbits, “Credentialless” iframes, prototype pollution, and what constitutes a polyglot in llms.txt.</p><p>Follow us on <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">X</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0 </a>on X</p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>You can also find some <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">hacker swag</a>!</p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/p4fg">p4fg passed 1 Million!</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/3000510">/reports/:id.json - $25K Crit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/hacking-crypto-part-i/">Hacking Crypto pt1</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/payload-obfuscation-techniques-guide">The art of payload obfuscation</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/doing-the-due-diligence-analysing-the-next-js-middleware-bypass-cve-2025-29927/">Analyzing the Next.js Middleware Bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://merch.nahamsec.com/">Nahamsec's Merch store</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/llms.txt">llms.txt polyglot prompt injection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/research-and-things/react-router-and-the-remixed-path">React Router and the Remix’ed path</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/loose-types-sink-ships-pre-authentication-sql-injection-in-halo-itsm/">Pre-Authentication SQL Injection in Halo ITSM</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://spaceraccoon.dev/pwning-millions-smart-weighing-machines-api-hardware-hacking/">Pwning Millions of Smart Weighing Machines</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/tweetsbycolin/status/1905268522357571663">MCP Server Oauth</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/cline/status/1907186512506306572">Cline</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.mozilla.org/en-US/docs/Web/Security/IFrame_credentialless">“Credentialless” iframes</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://tinyxss.terjanq.me/">Tiny XSS Payloads</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://discord.com/channels/1110206757227216916/1174723465467662366/1354051658451259433">Types of Pollution</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:05:56) Next.js Middleware bypass &amp; Polyglots in llms.txt</p><p>(00:16:35) CPDoS on React Router</p><p>(00:24:26) Loose Types Sink Ships &amp; Pwning Smart Scales</p><p>(00:32:30) MCP Server Oauth &amp; Cline</p><p>(00:39:40) Clientside Tidbits &amp; Prototype Pollutions</p>]]></description>
  <embed_id>2bea3fb0-4e69-4633-b273-d58f6aa79883</embed_id>
  <pubDate>Thu, 10 Apr 2025 10:01:05 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="56146394" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/128d72e3-6a3d-4c32-b3d2-e12e13894c4a/episode.mp3" />
  <itunes:title><![CDATA[Episode 118:  Hacking Happy Hour: 0days on Tap and SQLi Shots]]></itunes:title>
  <itunes:duration>58:29</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 118: In this episode of Critical Thinking - Bug Bounty Podcast we cover a host of news, including clientside tidbits, “Credentialless” iframes, prototype pollution, and what constitutes a polyglot in llms.txt.</p><p>Follow us on <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">X</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0 </a>on X</p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>You can also find some <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">hacker swag</a>!</p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/p4fg">p4fg passed 1 Million!</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/3000510">/reports/:id.json - $25K Crit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/hacking-crypto-part-i/">Hacking Crypto pt1</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/payload-obfuscation-techniques-guide">The art of payload obfuscation</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/doing-the-due-diligence-analysing-the-next-js-middleware-bypass-cve-2025-29927/">Analyzing the Next.js Middleware Bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://merch.nahamsec.com/">Nahamsec's Merch store</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/llms.txt">llms.txt polyglot prompt injection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/research-and-things/react-router-and-the-remixed-path">React Router and the Remix’ed path</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/loose-types-sink-ships-pre-authentication-sql-injection-in-halo-itsm/">Pre-Authentication SQL Injection in Halo ITSM</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://spaceraccoon.dev/pwning-millions-smart-weighing-machines-api-hardware-hacking/">Pwning Millions of Smart Weighing Machines</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/tweetsbycolin/status/1905268522357571663">MCP Server Oauth</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/cline/status/1907186512506306572">Cline</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.mozilla.org/en-US/docs/Web/Security/IFrame_credentialless">“Credentialless” iframes</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://tinyxss.terjanq.me/">Tiny XSS Payloads</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://discord.com/channels/1110206757227216916/1174723465467662366/1354051658451259433">Types of Pollution</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:05:56) Next.js Middleware bypass &amp; Polyglots in llms.txt</p><p>(00:16:35) CPDoS on React Router</p><p>(00:24:26) Loose Types Sink Ships &amp; Pwning Smart Scales</p><p>(00:32:30) MCP Server Oauth &amp; Cline</p><p>(00:39:40) Clientside Tidbits &amp; Prototype Pollutions</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 118: In this episode of Critical Thinking - Bug Bounty Podcast we cover a host of news, including clientside tidbits, “Credentialless” iframes, prototype pollution, and what constitutes a polyglot in llms.txt.</p><p>Follow us on <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">X</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0 </a>on X</p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>You can also find some <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">hacker swag</a>!</p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/p4fg">p4fg passed 1 Million!</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/3000510">/reports/:id.json - $25K Crit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bugcrowd.com/blog/hacking-crypto-part-i/">Hacking Crypto pt1</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/payload-obfuscation-techniques-guide">The art of payload obfuscation</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/doing-the-due-diligence-analysing-the-next-js-middleware-bypass-cve-2025-29927/">Analyzing the Next.js Middleware Bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://merch.nahamsec.com/">Nahamsec's Merch store</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/llms.txt">llms.txt polyglot prompt injection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/research-and-things/react-router-and-the-remixed-path">React Router and the Remix’ed path</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/assetnote-security-research-center/loose-types-sink-ships-pre-authentication-sql-injection-in-halo-itsm/">Pre-Authentication SQL Injection in Halo ITSM</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://spaceraccoon.dev/pwning-millions-smart-weighing-machines-api-hardware-hacking/">Pwning Millions of Smart Weighing Machines</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/tweetsbycolin/status/1905268522357571663">MCP Server Oauth</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/cline/status/1907186512506306572">Cline</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.mozilla.org/en-US/docs/Web/Security/IFrame_credentialless">“Credentialless” iframes</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://tinyxss.terjanq.me/">Tiny XSS Payloads</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://discord.com/channels/1110206757227216916/1174723465467662366/1354051658451259433">Types of Pollution</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:05:56) Next.js Middleware bypass &amp; Polyglots in llms.txt</p><p>(00:16:35) CPDoS on React Router</p><p>(00:24:26) Loose Types Sink Ships &amp; Pwning Smart Scales</p><p>(00:32:30) MCP Server Oauth &amp; Cline</p><p>(00:39:40) Clientside Tidbits &amp; Prototype Pollutions</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 118: In this episode of Critical Thinking - Bug Bounty Podcast we cover a host of news, including clientside tidbits, “Credentialless” iframes, prototype pollution, and what constitutes a polyglot in llms.txt.Follow us on XShoutout to YTCra...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>118</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">ca8addb2-682e-4813-aa4f-82b22046896b</guid>
  <title><![CDATA[Episode 117: Hacking AI Series: Vulnus ex Machina - Part 1]]></title>
  <description><![CDATA[<p>Episode 117: In this episode of Critical Thinking - Bug Bounty Podcast Joseph introduces Vulus Ex Machina: A 3-part mini-series on hacking AI applications. In this part, he lays the groundwork and focuses on AI reconnaissance. </p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== Resources ======</strong></p><p>Building Reliable Web Agents</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/pk_iv/status/1904178892723941777">https://x.com/pk_iv/status/1904178892723941777</a></p><p>17 security checks from VIBE to PRODUCTION</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Kaamiiaar/status/1902342578185630000">https://x.com/Kaamiiaar/status/1902342578185630000</a></p><p>How to Hack AI Agents and Applications</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/hacking/2025/02/25/how-to-hack-ai-apps.html">https://josephthacker.com/hacking/2025/02/25/how-to-hack-ai-apps.html</a></p><p>AI Crash Course Repo</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/henrythe9th/ai-crash-course">https://github.com/henrythe9th/ai-crash-course</a></p><p>Deep Dive into LLMs like ChatGPT</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=7xTGNNLPyMI">https://www.youtube.com/watch?v=7xTGNNLPyMI</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:54) AI News</p><p>(00:08:09) How to Hack AI Agents and Applications</p><p>(00:14:26) The Recon Process</p><p>(00:25:06) Initial Probing &amp; Steering</p>]]></description>
  <embed_id>fa3a8cbd-9e70-4648-88c3-14df7dbcfcfd</embed_id>
  <pubDate>Thu, 03 Apr 2025 10:01:04 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="31042510" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/3f1325be-c989-44e0-bb1e-1061edc11943/episode.mp3" />
  <itunes:title><![CDATA[Episode 117: Hacking AI Series: Vulnus ex Machina - Part 1]]></itunes:title>
  <itunes:duration>32:20</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 117: In this episode of Critical Thinking - Bug Bounty Podcast Joseph introduces Vulus Ex Machina: A 3-part mini-series on hacking AI applications. In this part, he lays the groundwork and focuses on AI reconnaissance. </p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== Resources ======</strong></p><p>Building Reliable Web Agents</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/pk_iv/status/1904178892723941777">https://x.com/pk_iv/status/1904178892723941777</a></p><p>17 security checks from VIBE to PRODUCTION</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Kaamiiaar/status/1902342578185630000">https://x.com/Kaamiiaar/status/1902342578185630000</a></p><p>How to Hack AI Agents and Applications</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/hacking/2025/02/25/how-to-hack-ai-apps.html">https://josephthacker.com/hacking/2025/02/25/how-to-hack-ai-apps.html</a></p><p>AI Crash Course Repo</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/henrythe9th/ai-crash-course">https://github.com/henrythe9th/ai-crash-course</a></p><p>Deep Dive into LLMs like ChatGPT</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=7xTGNNLPyMI">https://www.youtube.com/watch?v=7xTGNNLPyMI</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:54) AI News</p><p>(00:08:09) How to Hack AI Agents and Applications</p><p>(00:14:26) The Recon Process</p><p>(00:25:06) Initial Probing &amp; Steering</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 117: In this episode of Critical Thinking - Bug Bounty Podcast Joseph introduces Vulus Ex Machina: A 3-part mini-series on hacking AI applications. In this part, he lays the groundwork and focuses on AI reconnaissance. </p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== Resources ======</strong></p><p>Building Reliable Web Agents</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/pk_iv/status/1904178892723941777">https://x.com/pk_iv/status/1904178892723941777</a></p><p>17 security checks from VIBE to PRODUCTION</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Kaamiiaar/status/1902342578185630000">https://x.com/Kaamiiaar/status/1902342578185630000</a></p><p>How to Hack AI Agents and Applications</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://josephthacker.com/hacking/2025/02/25/how-to-hack-ai-apps.html">https://josephthacker.com/hacking/2025/02/25/how-to-hack-ai-apps.html</a></p><p>AI Crash Course Repo</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/henrythe9th/ai-crash-course">https://github.com/henrythe9th/ai-crash-course</a></p><p>Deep Dive into LLMs like ChatGPT</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=7xTGNNLPyMI">https://www.youtube.com/watch?v=7xTGNNLPyMI</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:54) AI News</p><p>(00:08:09) How to Hack AI Agents and Applications</p><p>(00:14:26) The Recon Process</p><p>(00:25:06) Initial Probing &amp; Steering</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 117: In this episode of Critical Thinking - Bug Bounty Podcast Joseph introduces Vulus Ex Machina: A 3-part mini-series on hacking AI applications. In this part, he lays the groundwork and focuses on AI reconnaissance. Follow us on twitter ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>117</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">f2efb2ce-1185-4834-8da9-4f51a58864a9</guid>
  <title><![CDATA[Episode 116: Auth Bypasses and Google VRP Writeups]]></title>
  <description><![CDATA[<p>Episode 116: In this episode of Critical Thinking - Bug Bounty Podcast Justin gives a quick rundown of Portswigger’s SAML Roulette writeup, as well as some Google VRP reports, and a Next.js middleware exploit.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor: ThreatLocker Cloud Control - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.threatlocker.com/platform/cloud-control">https://www.threatlocker.com/platform/cloud-control</a></p><p><strong>====== Resources ======</strong></p><p>SAML roulette: the hacker always wins</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/saml-roulette-the-hacker-always-wins">https://portswigger.net/research/saml-roulette-the-hacker-always-wins</a></p><p>Loophole of getting Google Form associated with Google Spreadsheet with no editor/owner access</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/reports/vrp/yBeFmSrJi">https://bughunters.google.com/reports/vrp/yBeFmSrJi</a></p><p>Loophole to see the editors of a Google Document with no granted access(owner/editor) with just the fileid (can be obtained from publicly shared links with 0 access)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/reports/vrp/7EhAw2hur">https://bughunters.google.com/reports/vrp/7EhAw2hur</a></p><p>Cloud Tools for Eclipse - Chaining misconfigured OAuth callback redirection with open redirect vulnerability to leak Google OAuth Tokens with full GCP Permissions</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/reports/vrp/F8GFYGv4g">https://bughunters.google.com/reports/vrp/F8GFYGv4g</a></p><p>Next.js, cache, and chains: the stale elixir</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir">https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir</a></p><p>Next.js and the corrupt middleware: the authorizing artifact</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware">https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:59) SAML roulette</p><p>(00:13:08) Google bugs</p><p>(00:20:16) Next.js and the corrupt middleware</p>]]></description>
  <embed_id>d4f75636-22ae-4730-af22-c8a6b82ac0ae</embed_id>
  <pubDate>Thu, 27 Mar 2025 10:00:58 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="25730667" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/c31d013f-d670-4204-b436-314d9f855fac/episode.mp3" />
  <itunes:title><![CDATA[Episode 116: Auth Bypasses and Google VRP Writeups]]></itunes:title>
  <itunes:duration>26:48</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 116: In this episode of Critical Thinking - Bug Bounty Podcast Justin gives a quick rundown of Portswigger’s SAML Roulette writeup, as well as some Google VRP reports, and a Next.js middleware exploit.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor: ThreatLocker Cloud Control - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.threatlocker.com/platform/cloud-control">https://www.threatlocker.com/platform/cloud-control</a></p><p><strong>====== Resources ======</strong></p><p>SAML roulette: the hacker always wins</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/saml-roulette-the-hacker-always-wins">https://portswigger.net/research/saml-roulette-the-hacker-always-wins</a></p><p>Loophole of getting Google Form associated with Google Spreadsheet with no editor/owner access</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/reports/vrp/yBeFmSrJi">https://bughunters.google.com/reports/vrp/yBeFmSrJi</a></p><p>Loophole to see the editors of a Google Document with no granted access(owner/editor) with just the fileid (can be obtained from publicly shared links with 0 access)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/reports/vrp/7EhAw2hur">https://bughunters.google.com/reports/vrp/7EhAw2hur</a></p><p>Cloud Tools for Eclipse - Chaining misconfigured OAuth callback redirection with open redirect vulnerability to leak Google OAuth Tokens with full GCP Permissions</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/reports/vrp/F8GFYGv4g">https://bughunters.google.com/reports/vrp/F8GFYGv4g</a></p><p>Next.js, cache, and chains: the stale elixir</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir">https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir</a></p><p>Next.js and the corrupt middleware: the authorizing artifact</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware">https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:59) SAML roulette</p><p>(00:13:08) Google bugs</p><p>(00:20:16) Next.js and the corrupt middleware</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 116: In this episode of Critical Thinking - Bug Bounty Podcast Justin gives a quick rundown of Portswigger’s SAML Roulette writeup, as well as some Google VRP reports, and a Next.js middleware exploit.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor: ThreatLocker Cloud Control - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.threatlocker.com/platform/cloud-control">https://www.threatlocker.com/platform/cloud-control</a></p><p><strong>====== Resources ======</strong></p><p>SAML roulette: the hacker always wins</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/saml-roulette-the-hacker-always-wins">https://portswigger.net/research/saml-roulette-the-hacker-always-wins</a></p><p>Loophole of getting Google Form associated with Google Spreadsheet with no editor/owner access</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/reports/vrp/yBeFmSrJi">https://bughunters.google.com/reports/vrp/yBeFmSrJi</a></p><p>Loophole to see the editors of a Google Document with no granted access(owner/editor) with just the fileid (can be obtained from publicly shared links with 0 access)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/reports/vrp/7EhAw2hur">https://bughunters.google.com/reports/vrp/7EhAw2hur</a></p><p>Cloud Tools for Eclipse - Chaining misconfigured OAuth callback redirection with open redirect vulnerability to leak Google OAuth Tokens with full GCP Permissions</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/reports/vrp/F8GFYGv4g">https://bughunters.google.com/reports/vrp/F8GFYGv4g</a></p><p>Next.js, cache, and chains: the stale elixir</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir">https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir</a></p><p>Next.js and the corrupt middleware: the authorizing artifact</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware">https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:59) SAML roulette</p><p>(00:13:08) Google bugs</p><p>(00:20:16) Next.js and the corrupt middleware</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 116: In this episode of Critical Thinking - Bug Bounty Podcast Justin gives a quick rundown of Portswigger’s SAML Roulette writeup, as well as some Google VRP reports, and a Next.js middleware exploit.Follow us on twitter at: https://x.com/...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>116</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">043ceb75-8580-4bfc-a41b-d6f50613a0ef</guid>
  <title><![CDATA[Episode 115: Mentee to Career Hacker - Mokusou (So Sakaguchi)]]></title>
  <description><![CDATA[<p>Episode 115: In this episode of Critical Thinking - Bug Bounty Podcast Justin and So Sakaguchi sit down to walk through some recent bugs, before having a live mentorship session. They also talk about Reflector, and finish up by doing a bonus podcast segment in Japanese!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor: ThreatLocker Cloud Control - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.threatlocker.com/platform/cloud-control">https://www.threatlocker.com/platform/cloud-control</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Mokusou4">https://x.com/Mokusou4</a></p><p><strong>====== Resources ======</strong></p><p>So's last appearance in episode 40</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/40">ctbb.show/40</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:04:11) So's Facebook Bug</p><p>(00:14:37) So and Justin's Google Bug</p><p>(00:33:39) Live Mentorship Session</p><p>(00:56:29) Reflector</p><p>(01:13:22) Bonus - Podcast in Japanese</p>]]></description>
  <embed_id>faa37344-acd9-4546-aa19-a880641bf677</embed_id>
  <pubDate>Thu, 20 Mar 2025 10:01:33 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="96930440" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/b1429d53-261a-47a9-b3ac-1c96ff9ba4bf/episode.mp3" />
  <itunes:title><![CDATA[Episode 115: Mentee to Career Hacker - Mokusou (So Sakaguchi)]]></itunes:title>
  <itunes:duration>1:40:58</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 115: In this episode of Critical Thinking - Bug Bounty Podcast Justin and So Sakaguchi sit down to walk through some recent bugs, before having a live mentorship session. They also talk about Reflector, and finish up by doing a bonus podcast segment in Japanese!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor: ThreatLocker Cloud Control - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.threatlocker.com/platform/cloud-control">https://www.threatlocker.com/platform/cloud-control</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Mokusou4">https://x.com/Mokusou4</a></p><p><strong>====== Resources ======</strong></p><p>So's last appearance in episode 40</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/40">ctbb.show/40</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:04:11) So's Facebook Bug</p><p>(00:14:37) So and Justin's Google Bug</p><p>(00:33:39) Live Mentorship Session</p><p>(00:56:29) Reflector</p><p>(01:13:22) Bonus - Podcast in Japanese</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 115: In this episode of Critical Thinking - Bug Bounty Podcast Justin and So Sakaguchi sit down to walk through some recent bugs, before having a live mentorship session. They also talk about Reflector, and finish up by doing a bonus podcast segment in Japanese!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor: ThreatLocker Cloud Control - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.threatlocker.com/platform/cloud-control">https://www.threatlocker.com/platform/cloud-control</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Mokusou4">https://x.com/Mokusou4</a></p><p><strong>====== Resources ======</strong></p><p>So's last appearance in episode 40</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/40">ctbb.show/40</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:04:11) So's Facebook Bug</p><p>(00:14:37) So and Justin's Google Bug</p><p>(00:33:39) Live Mentorship Session</p><p>(00:56:29) Reflector</p><p>(01:13:22) Bonus - Podcast in Japanese</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 115: In this episode of Critical Thinking - Bug Bounty Podcast Justin and So Sakaguchi sit down to walk through some recent bugs, before having a live mentorship session. They also talk about Reflector, and finish up by doing a bonus podcas...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>115</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">627116f6-e8a0-4c16-a208-4b270c926b9c</guid>
  <title><![CDATA[Episode 114: Single Page Application Hacking Playbook]]></title>
  <description><![CDATA[<p>Episode 114: In this episode of Critical Thinking - Bug Bounty Podcast we’re diving into SPA and how to attack them.We also cover a host of news items, including some bug write-ups, AI updates, and a new tool called Hackadvisor.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.threatlocker.com/platform/cloud-control">ThreatLocker Cloud Control</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://vitorfalcao.com/posts/hacking-high-profile-targets/">Hacking High-Profile Bug Bounty Targets: Deep Dive into a Client-Side Chain</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/trufflesec/status/1895170902872223752">Research finds 12,000 ‘Live’ API Keys and Passwords in DeepSeek's Training Data</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackadvisor.io/programs">Hackadvisor</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/yousukezan/status/1894703104421191835">WP Extensions</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://notebooklm.google/">Notebook LM</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/J0R1AN/status/1893667396658893125">Pressing Buttons with Popups</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/RenwaX23/status/1893709501393489976">Response to @RenwaX23</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xAsm0d3us/status/1896187800258830666">Prompt Injection Attacks for Dummies</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/shadow-repeater-ai-enhanced-manual-testing">Shadow Repeater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/microsoft/parallel-prettier">parallel-prettier</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:15) Bug Write-up from @busf4ctor</p><p>(00:09:44) Scanning Common Crawl</p><p>(00:16:30) Hackadvisor and WP/Chrome Extension News</p><p>(00:24:15) Notebook LM, and Recent AI Updates</p><p>(00:31:58) Write-up from @J0R1AN and Related POC from @RenwaX23</p><p>(00:38:10) Prompt Injection Attacks for Dummies</p><p>(00:42:29) ShadowRepeater</p><p>(00:47:04) Single-page applications</p>]]></description>
  <embed_id>75b69453-df35-4b9c-ba18-a90b66c5fc48</embed_id>
  <pubDate>Thu, 13 Mar 2025 10:00:25 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="79122006" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/6bbd066f-38b2-405d-8833-93eb57fd03cd/episode.mp3" />
  <itunes:title><![CDATA[Episode 114: Single Page Application Hacking Playbook]]></itunes:title>
  <itunes:duration>1:22:25</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 114: In this episode of Critical Thinking - Bug Bounty Podcast we’re diving into SPA and how to attack them.We also cover a host of news items, including some bug write-ups, AI updates, and a new tool called Hackadvisor.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.threatlocker.com/platform/cloud-control">ThreatLocker Cloud Control</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://vitorfalcao.com/posts/hacking-high-profile-targets/">Hacking High-Profile Bug Bounty Targets: Deep Dive into a Client-Side Chain</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/trufflesec/status/1895170902872223752">Research finds 12,000 ‘Live’ API Keys and Passwords in DeepSeek's Training Data</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackadvisor.io/programs">Hackadvisor</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/yousukezan/status/1894703104421191835">WP Extensions</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://notebooklm.google/">Notebook LM</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/J0R1AN/status/1893667396658893125">Pressing Buttons with Popups</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/RenwaX23/status/1893709501393489976">Response to @RenwaX23</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xAsm0d3us/status/1896187800258830666">Prompt Injection Attacks for Dummies</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/shadow-repeater-ai-enhanced-manual-testing">Shadow Repeater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/microsoft/parallel-prettier">parallel-prettier</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:15) Bug Write-up from @busf4ctor</p><p>(00:09:44) Scanning Common Crawl</p><p>(00:16:30) Hackadvisor and WP/Chrome Extension News</p><p>(00:24:15) Notebook LM, and Recent AI Updates</p><p>(00:31:58) Write-up from @J0R1AN and Related POC from @RenwaX23</p><p>(00:38:10) Prompt Injection Attacks for Dummies</p><p>(00:42:29) ShadowRepeater</p><p>(00:47:04) Single-page applications</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 114: In this episode of Critical Thinking - Bug Bounty Podcast we’re diving into SPA and how to attack them.We also cover a host of news items, including some bug write-ups, AI updates, and a new tool called Hackadvisor.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.threatlocker.com/platform/cloud-control">ThreatLocker Cloud Control</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://vitorfalcao.com/posts/hacking-high-profile-targets/">Hacking High-Profile Bug Bounty Targets: Deep Dive into a Client-Side Chain</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/trufflesec/status/1895170902872223752">Research finds 12,000 ‘Live’ API Keys and Passwords in DeepSeek's Training Data</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackadvisor.io/programs">Hackadvisor</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/yousukezan/status/1894703104421191835">WP Extensions</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://notebooklm.google/">Notebook LM</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/J0R1AN/status/1893667396658893125">Pressing Buttons with Popups</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/RenwaX23/status/1893709501393489976">Response to @RenwaX23</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xAsm0d3us/status/1896187800258830666">Prompt Injection Attacks for Dummies</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/shadow-repeater-ai-enhanced-manual-testing">Shadow Repeater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/microsoft/parallel-prettier">parallel-prettier</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:15) Bug Write-up from @busf4ctor</p><p>(00:09:44) Scanning Common Crawl</p><p>(00:16:30) Hackadvisor and WP/Chrome Extension News</p><p>(00:24:15) Notebook LM, and Recent AI Updates</p><p>(00:31:58) Write-up from @J0R1AN and Related POC from @RenwaX23</p><p>(00:38:10) Prompt Injection Attacks for Dummies</p><p>(00:42:29) ShadowRepeater</p><p>(00:47:04) Single-page applications</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 114: In this episode of Critical Thinking - Bug Bounty Podcast we’re diving into SPA and how to attack them.We also cover a host of news items, including some bug write-ups, AI updates, and a new tool called Hackadvisor.Follow us on twitter...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>114</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">133cd3f8-2217-466a-8aa5-b84b2ed348a5</guid>
  <title><![CDATA[Episode 113: Best Technical Takeaways from Portswigger Top 10 2024]]></title>
  <description><![CDATA[<p>Episode 113: In this episode of Critical Thinking - Bug Bounty Podcast we’re breaking down the Portswigger Top 10 from 2024. There’s some bangers in here!</p><p>Follow us on X at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0</a> on X: </p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">CTBB Discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">hacker swag</a>!</p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://snyk.io/articles/hijacking-oauth-flows-via-cookie-tossing/">Hijacking OAUTH flows via Cookie Tossing</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nokline.github.io/bugbounty/2024/02/04/ChatGPT-ATO.html">ChatGPT Account Takeover - Wildcard Web Cache Deception</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.voorivex.team/oauth-non-happy-path-to-ato">OAuth Non-Happy Path to ATO</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/">CVE-2024-4367 - Arbitrary JavaScript execution in PDF.js</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.paulosyibelo.com/2024/12/doubleclickjacking-what.html">DoubleClickjacking: A New Era of UI Redressing</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.orange.tw/posts/2025-01-worstfit-unveiling-hidden-transformers-in-windows-ansi/">WorstFit: Unveiling Hidden Transformers in Windows ANSI</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf">SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.orange.tw/posts/2024-08-confusion-attacks-en/">Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/ethical-hacking/middleware-middleware-everywhere-and-lots-of-misconfigurations-to-fix/">Middleware, middleware everywhere – and lots of misconfigurations to fix</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:09:56) Hijacking OAuth flows via Cookie Tossing</p><p>(00:17:30) ChatGPT Account Takeover</p><p>(00:25:28) OAuth Non-Happy Path to ATO</p><p>(00:29:24) CVE-2024-4367</p><p>(00:37:37) DoubleClickjacking:</p><p>(00:44:54) Exploring the DOMPurify library</p><p>(00:48:01) WorstFit</p><p>(00:56:29) Unveiling TE.0 HTTP Request Smuggling</p><p>(01:06:40) SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level  </p><p>(01:14:05) Confusion Attacks</p>]]></description>
  <embed_id>15514070-cf55-4bd3-a204-d2812f742632</embed_id>
  <pubDate>Thu, 06 Mar 2025 11:01:36 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="85746263" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/99c2940f-5e3f-45a0-be85-93fb85701f51/episode.mp3" />
  <itunes:title><![CDATA[Episode 113: Best Technical Takeaways from Portswigger Top 10 2024]]></itunes:title>
  <itunes:duration>1:29:19</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 113: In this episode of Critical Thinking - Bug Bounty Podcast we’re breaking down the Portswigger Top 10 from 2024. There’s some bangers in here!</p><p>Follow us on X at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0</a> on X: </p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">CTBB Discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">hacker swag</a>!</p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://snyk.io/articles/hijacking-oauth-flows-via-cookie-tossing/">Hijacking OAUTH flows via Cookie Tossing</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nokline.github.io/bugbounty/2024/02/04/ChatGPT-ATO.html">ChatGPT Account Takeover - Wildcard Web Cache Deception</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.voorivex.team/oauth-non-happy-path-to-ato">OAuth Non-Happy Path to ATO</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/">CVE-2024-4367 - Arbitrary JavaScript execution in PDF.js</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.paulosyibelo.com/2024/12/doubleclickjacking-what.html">DoubleClickjacking: A New Era of UI Redressing</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.orange.tw/posts/2025-01-worstfit-unveiling-hidden-transformers-in-windows-ansi/">WorstFit: Unveiling Hidden Transformers in Windows ANSI</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf">SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.orange.tw/posts/2024-08-confusion-attacks-en/">Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/ethical-hacking/middleware-middleware-everywhere-and-lots-of-misconfigurations-to-fix/">Middleware, middleware everywhere – and lots of misconfigurations to fix</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:09:56) Hijacking OAuth flows via Cookie Tossing</p><p>(00:17:30) ChatGPT Account Takeover</p><p>(00:25:28) OAuth Non-Happy Path to ATO</p><p>(00:29:24) CVE-2024-4367</p><p>(00:37:37) DoubleClickjacking:</p><p>(00:44:54) Exploring the DOMPurify library</p><p>(00:48:01) WorstFit</p><p>(00:56:29) Unveiling TE.0 HTTP Request Smuggling</p><p>(01:06:40) SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level  </p><p>(01:14:05) Confusion Attacks</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 113: In this episode of Critical Thinking - Bug Bounty Podcast we’re breaking down the Portswigger Top 10 from 2024. There’s some bangers in here!</p><p>Follow us on X at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">Rez0</a> on X: </p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">CTBB Discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">hacker swag</a>!</p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://snyk.io/articles/hijacking-oauth-flows-via-cookie-tossing/">Hijacking OAUTH flows via Cookie Tossing</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nokline.github.io/bugbounty/2024/02/04/ChatGPT-ATO.html">ChatGPT Account Takeover - Wildcard Web Cache Deception</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.voorivex.team/oauth-non-happy-path-to-ato">OAuth Non-Happy Path to ATO</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/">CVE-2024-4367 - Arbitrary JavaScript execution in PDF.js</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.paulosyibelo.com/2024/12/doubleclickjacking-what.html">DoubleClickjacking: A New Era of UI Redressing</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.orange.tw/posts/2025-01-worstfit-unveiling-hidden-transformers-in-windows-ansi/">WorstFit: Unveiling Hidden Transformers in Windows ANSI</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf">SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.orange.tw/posts/2024-08-confusion-attacks-en/">Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/ethical-hacking/middleware-middleware-everywhere-and-lots-of-misconfigurations-to-fix/">Middleware, middleware everywhere – and lots of misconfigurations to fix</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:09:56) Hijacking OAuth flows via Cookie Tossing</p><p>(00:17:30) ChatGPT Account Takeover</p><p>(00:25:28) OAuth Non-Happy Path to ATO</p><p>(00:29:24) CVE-2024-4367</p><p>(00:37:37) DoubleClickjacking:</p><p>(00:44:54) Exploring the DOMPurify library</p><p>(00:48:01) WorstFit</p><p>(00:56:29) Unveiling TE.0 HTTP Request Smuggling</p><p>(01:06:40) SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level  </p><p>(01:14:05) Confusion Attacks</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 113: In this episode of Critical Thinking - Bug Bounty Podcast we’re breaking down the Portswigger Top 10 from 2024. There’s some bangers in here!Follow us on X at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send u...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>113</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">271df055-2cb2-4dd4-8161-22ea53b73da6</guid>
  <title><![CDATA[Episode 112: Interview with Ciarán Cotter (MonkeHack) -  Critical Lab Researcher and Full-time Hunter]]></title>
  <description><![CDATA[<p>Episode 112: In this episode of Critical Thinking - Bug Bounty Podcast Joseph Thacker is joined by Ciarán Cotter (Monke) to share his bug hunting journey and give us the rundown on some recent client-side and server-side bugs. Then they discuss WebSockets, SaaS security, and cover some AI news including Grok 3, Nuclei -AI Flag, and some articles by Johann Rehberger.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guest - Ciarán Cotter</p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/monkehack">https://x.com/monkehack</a></li></ul><p><strong>====== Resources ======</strong></p><p>Msty</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://msty.app/">https://msty.app/</a></p><p>From Day Zero to Zero Day</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nostarch.com/zero-day">https://nostarch.com/zero-day</a></p><p>Nuclei - ai flag</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/pdiscoveryio/status/1890082913900982763">https://x.com/pdiscoveryio/status/1890082913900982763</a></p><p>ChatGPT Operator: Prompt Injection Exploits &amp; Defenses</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2025/chatgpt-operator-prompt-injection-exploits/">https://embracethered.com/blog/posts/2025/chatgpt-operator-prompt-injection-exploits/</a></p><p>Hacking Gemini's Memory with Prompt Injection and Delayed Tool Invocation</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2025/gemini-memory-persistence-prompt-injection/">https://embracethered.com/blog/posts/2025/gemini-memory-persistence-prompt-injection/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:04) Bug Rundowns</p><p>(00:13:05) Monke's Bug Bounty Background</p><p>(00:20:03) Websocket Research</p><p>(00:34:01) Connecting Hackers with Companies</p><p>(00:34:56) Grok 3, Msty, From Day Zero to Zero Day</p><p>(00:42:58) Full time Bug Bounty, SaaS security, and Threat Modeling while AFK</p><p>(00:54:49) Nuclei - ai flag, ChatGPT Operator, and Hacking Gemini's Memory</p>]]></description>
  <embed_id>8371781b-6e56-44c3-a006-195d1238526a</embed_id>
  <pubDate>Thu, 27 Feb 2025 11:01:23 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="64914312" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/b47eba50-5590-44d7-9af7-7b0b8344f8f3/episode.mp3" />
  <itunes:title><![CDATA[Episode 112: Interview with Ciarán Cotter (MonkeHack) -  Critical Lab Researcher and Full-time Hunter]]></itunes:title>
  <itunes:duration>1:07:37</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 112: In this episode of Critical Thinking - Bug Bounty Podcast Joseph Thacker is joined by Ciarán Cotter (Monke) to share his bug hunting journey and give us the rundown on some recent client-side and server-side bugs. Then they discuss WebSockets, SaaS security, and cover some AI news including Grok 3, Nuclei -AI Flag, and some articles by Johann Rehberger.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guest - Ciarán Cotter</p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/monkehack">https://x.com/monkehack</a></li></ul><p><strong>====== Resources ======</strong></p><p>Msty</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://msty.app/">https://msty.app/</a></p><p>From Day Zero to Zero Day</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nostarch.com/zero-day">https://nostarch.com/zero-day</a></p><p>Nuclei - ai flag</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/pdiscoveryio/status/1890082913900982763">https://x.com/pdiscoveryio/status/1890082913900982763</a></p><p>ChatGPT Operator: Prompt Injection Exploits &amp; Defenses</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2025/chatgpt-operator-prompt-injection-exploits/">https://embracethered.com/blog/posts/2025/chatgpt-operator-prompt-injection-exploits/</a></p><p>Hacking Gemini's Memory with Prompt Injection and Delayed Tool Invocation</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2025/gemini-memory-persistence-prompt-injection/">https://embracethered.com/blog/posts/2025/gemini-memory-persistence-prompt-injection/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:04) Bug Rundowns</p><p>(00:13:05) Monke's Bug Bounty Background</p><p>(00:20:03) Websocket Research</p><p>(00:34:01) Connecting Hackers with Companies</p><p>(00:34:56) Grok 3, Msty, From Day Zero to Zero Day</p><p>(00:42:58) Full time Bug Bounty, SaaS security, and Threat Modeling while AFK</p><p>(00:54:49) Nuclei - ai flag, ChatGPT Operator, and Hacking Gemini's Memory</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 112: In this episode of Critical Thinking - Bug Bounty Podcast Joseph Thacker is joined by Ciarán Cotter (Monke) to share his bug hunting journey and give us the rundown on some recent client-side and server-side bugs. Then they discuss WebSockets, SaaS security, and cover some AI news including Grok 3, Nuclei -AI Flag, and some articles by Johann Rehberger.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Guest - Ciarán Cotter</p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/monkehack">https://x.com/monkehack</a></li></ul><p><strong>====== Resources ======</strong></p><p>Msty</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://msty.app/">https://msty.app/</a></p><p>From Day Zero to Zero Day</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nostarch.com/zero-day">https://nostarch.com/zero-day</a></p><p>Nuclei - ai flag</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/pdiscoveryio/status/1890082913900982763">https://x.com/pdiscoveryio/status/1890082913900982763</a></p><p>ChatGPT Operator: Prompt Injection Exploits &amp; Defenses</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2025/chatgpt-operator-prompt-injection-exploits/">https://embracethered.com/blog/posts/2025/chatgpt-operator-prompt-injection-exploits/</a></p><p>Hacking Gemini's Memory with Prompt Injection and Delayed Tool Invocation</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2025/gemini-memory-persistence-prompt-injection/">https://embracethered.com/blog/posts/2025/gemini-memory-persistence-prompt-injection/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:04) Bug Rundowns</p><p>(00:13:05) Monke's Bug Bounty Background</p><p>(00:20:03) Websocket Research</p><p>(00:34:01) Connecting Hackers with Companies</p><p>(00:34:56) Grok 3, Msty, From Day Zero to Zero Day</p><p>(00:42:58) Full time Bug Bounty, SaaS security, and Threat Modeling while AFK</p><p>(00:54:49) Nuclei - ai flag, ChatGPT Operator, and Hacking Gemini's Memory</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 112: In this episode of Critical Thinking - Bug Bounty Podcast Joseph Thacker is joined by Ciarán Cotter (Monke) to share his bug hunting journey and give us the rundown on some recent client-side and server-side bugs. Then they discuss Web...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>112</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">c00848a2-7637-4223-96f0-38f1b965eaa5</guid>
  <title><![CDATA[Episode 111: How to Bypass DOMPurify in Bug Bounty with Kevin Mizu]]></title>
  <description><![CDATA[<p>Episode 111: In this episode of Critical Thinking - Bug Bounty Podcast Justin interviews Kevin Mizu to showcase his knowledge regarding DOMPurify and its misconfigurations. We walk through some of Kevin’s research, highlighting things like Dangerous allow-lists and URI Attributes, DOMPurify hooks, node manipulation, and DOM Clobbering.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== Resources ======</strong></p><p>Exploring the DOMPurify library: Bypasses and Fixes (1/2)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mizu.re/post/exploring-the-dompurify-library-bypasses-and-fixes">https://mizu.re/post/exploring-the-dompurify-library-bypasses-and-fixes</a></p><p>Exploring the DOMPurify library: Hunting for Misconfigurations (2/2)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mizu.re/post/exploring-the-dompurify-library-hunting-for-misconfigurations">https://mizu.re/post/exploring-the-dompurify-library-hunting-for-misconfigurations</a></p><p>Dom-Explorer tool</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.github.io/Dom-Explorer/shared?id=772a440c-b0c2-4991-be71-3e271cf7954f">https://yeswehack.github.io/Dom-Explorer/shared?id=772a440c-b0c2-4991-be71-3e271cf7954f</a></p><p>CT Episode 61: A Hacker on Wall Street - JR0ch17</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/episode-61-a-hacker-on-wall-street-jr0ch17/">https://www.criticalthinkingpodcast.io/episode-61-a-hacker-on-wall-street-jr0ch17/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:44) Kevin Mizu - Background and Bring-a-bug</p><p>(00:15:09) DOMPurify</p><p>(00:29:04) Misconfigurations - Dangerous allow-lists</p><p>(00:39:09) Dangerous URI attributes configuration</p><p>(00:46:08) Bad usage</p><p>(00:59:55) DOMPurify Hooks: before, after, and upon SanitizeAttribute</p><p>(01:29:15) Node manipulation, nodeName namespace case confusion, &amp; DOM Clobbering DOS</p><p>(01:36:51) Misc concepts for future research</p>]]></description>
  <embed_id>65083e4e-4088-4198-b15e-c4cf3a420b74</embed_id>
  <pubDate>Thu, 20 Feb 2025 11:01:35 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="104882524" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/d78221f3-def6-453c-a124-63e9ab51432e/episode.mp3" />
  <itunes:title><![CDATA[Episode 111: How to Bypass DOMPurify in Bug Bounty with Kevin Mizu]]></itunes:title>
  <itunes:duration>1:49:15</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 111: In this episode of Critical Thinking - Bug Bounty Podcast Justin interviews Kevin Mizu to showcase his knowledge regarding DOMPurify and its misconfigurations. We walk through some of Kevin’s research, highlighting things like Dangerous allow-lists and URI Attributes, DOMPurify hooks, node manipulation, and DOM Clobbering.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== Resources ======</strong></p><p>Exploring the DOMPurify library: Bypasses and Fixes (1/2)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mizu.re/post/exploring-the-dompurify-library-bypasses-and-fixes">https://mizu.re/post/exploring-the-dompurify-library-bypasses-and-fixes</a></p><p>Exploring the DOMPurify library: Hunting for Misconfigurations (2/2)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mizu.re/post/exploring-the-dompurify-library-hunting-for-misconfigurations">https://mizu.re/post/exploring-the-dompurify-library-hunting-for-misconfigurations</a></p><p>Dom-Explorer tool</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.github.io/Dom-Explorer/shared?id=772a440c-b0c2-4991-be71-3e271cf7954f">https://yeswehack.github.io/Dom-Explorer/shared?id=772a440c-b0c2-4991-be71-3e271cf7954f</a></p><p>CT Episode 61: A Hacker on Wall Street - JR0ch17</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/episode-61-a-hacker-on-wall-street-jr0ch17/">https://www.criticalthinkingpodcast.io/episode-61-a-hacker-on-wall-street-jr0ch17/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:44) Kevin Mizu - Background and Bring-a-bug</p><p>(00:15:09) DOMPurify</p><p>(00:29:04) Misconfigurations - Dangerous allow-lists</p><p>(00:39:09) Dangerous URI attributes configuration</p><p>(00:46:08) Bad usage</p><p>(00:59:55) DOMPurify Hooks: before, after, and upon SanitizeAttribute</p><p>(01:29:15) Node manipulation, nodeName namespace case confusion, &amp; DOM Clobbering DOS</p><p>(01:36:51) Misc concepts for future research</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 111: In this episode of Critical Thinking - Bug Bounty Podcast Justin interviews Kevin Mizu to showcase his knowledge regarding DOMPurify and its misconfigurations. We walk through some of Kevin’s research, highlighting things like Dangerous allow-lists and URI Attributes, DOMPurify hooks, node manipulation, and DOM Clobbering.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== Resources ======</strong></p><p>Exploring the DOMPurify library: Bypasses and Fixes (1/2)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mizu.re/post/exploring-the-dompurify-library-bypasses-and-fixes">https://mizu.re/post/exploring-the-dompurify-library-bypasses-and-fixes</a></p><p>Exploring the DOMPurify library: Hunting for Misconfigurations (2/2)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mizu.re/post/exploring-the-dompurify-library-hunting-for-misconfigurations">https://mizu.re/post/exploring-the-dompurify-library-hunting-for-misconfigurations</a></p><p>Dom-Explorer tool</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.github.io/Dom-Explorer/shared?id=772a440c-b0c2-4991-be71-3e271cf7954f">https://yeswehack.github.io/Dom-Explorer/shared?id=772a440c-b0c2-4991-be71-3e271cf7954f</a></p><p>CT Episode 61: A Hacker on Wall Street - JR0ch17</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/episode-61-a-hacker-on-wall-street-jr0ch17/">https://www.criticalthinkingpodcast.io/episode-61-a-hacker-on-wall-street-jr0ch17/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:44) Kevin Mizu - Background and Bring-a-bug</p><p>(00:15:09) DOMPurify</p><p>(00:29:04) Misconfigurations - Dangerous allow-lists</p><p>(00:39:09) Dangerous URI attributes configuration</p><p>(00:46:08) Bad usage</p><p>(00:59:55) DOMPurify Hooks: before, after, and upon SanitizeAttribute</p><p>(01:29:15) Node manipulation, nodeName namespace case confusion, &amp; DOM Clobbering DOS</p><p>(01:36:51) Misc concepts for future research</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 111: In this episode of Critical Thinking - Bug Bounty Podcast Justin interviews Kevin Mizu to showcase his knowledge regarding DOMPurify and its misconfigurations. We walk through some of Kevin’s research, highlighting things like Dangerou...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>111</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">d200577d-13ea-449b-8829-0a5d7079ffbe</guid>
  <title><![CDATA[Episode 110: Oauth Gadget Correlation and Common Attacks]]></title>
  <description><![CDATA[<p>Episode 110: In this episode of Critical Thinking - Bug Bounty Podcast we hit some quick news items including a DOMPurify 3.2.3 Bypass, O3 mini updates, and a cool postLogger Chrome Extension. Then, we hone in on OAuth vulnerabilities, API keys, and innovative techniques hackers use to exploit these systems.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ensy.zip/posts/dompurify-323-bypass/">DOMPurify 3.2.3 Bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/jasonzhou1993/status/1886397963012132902">Jason Zhou's post about O3 mini</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.ophionsecurity.com/post/cisco-webex-connect-vulnerability-unauthenticated-access-to-all-chats">Live Chat Blog #2: Cisco Webex Connect</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ndevtk/status/1858412811019502040">postLogger Chrome Extension</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://chromewebstore.google.com/detail/postlogger/aodfhblfhpcdadgcnpkfibjgjdoenoja">postLogger Webstore Link</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.doyensec.com/2025/01/30/oauth-common-vulnerabilities.html">Common OAuth Vulnerabilities</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.descope.com/blog/post/noauth">nOAuth: How Microsoft OAuth Misconfiguration Can Lead to Full Account Takeover</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://rikeshbaniya.medium.com/account-takeover-using-sso-logins-fa35f28a358b">Account Takeover using SSO Logins</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/kgreshake?lang=en">Kai Greshake</a></p><p></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:44) DOMPurify 3.2.3 Bypass</p><p>(00:06:37) O3 mini</p><p>(00:10:29) Ophion Security: Cisco Webex Connect</p><p>(00:15:54) Discord Community News</p><p>(00:19:12) postLogger Chrome Extension</p><p>(00:21:04) Common OAuth Vulnerabilities &amp; Lessons learned from Google’s APIs</p>]]></description>
  <embed_id>6fe6077d-55e5-49aa-9fb1-4c3ea6c4e240</embed_id>
  <pubDate>Thu, 13 Feb 2025 11:01:16 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="47698184" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/278ac810-5286-4ef1-accd-c903ed327cd1/episode.mp3" />
  <itunes:title><![CDATA[Episode 110: Oauth Gadget Correlation and Common Attacks]]></itunes:title>
  <itunes:duration>49:41</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 110: In this episode of Critical Thinking - Bug Bounty Podcast we hit some quick news items including a DOMPurify 3.2.3 Bypass, O3 mini updates, and a cool postLogger Chrome Extension. Then, we hone in on OAuth vulnerabilities, API keys, and innovative techniques hackers use to exploit these systems.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ensy.zip/posts/dompurify-323-bypass/">DOMPurify 3.2.3 Bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/jasonzhou1993/status/1886397963012132902">Jason Zhou's post about O3 mini</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.ophionsecurity.com/post/cisco-webex-connect-vulnerability-unauthenticated-access-to-all-chats">Live Chat Blog #2: Cisco Webex Connect</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ndevtk/status/1858412811019502040">postLogger Chrome Extension</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://chromewebstore.google.com/detail/postlogger/aodfhblfhpcdadgcnpkfibjgjdoenoja">postLogger Webstore Link</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.doyensec.com/2025/01/30/oauth-common-vulnerabilities.html">Common OAuth Vulnerabilities</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.descope.com/blog/post/noauth">nOAuth: How Microsoft OAuth Misconfiguration Can Lead to Full Account Takeover</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://rikeshbaniya.medium.com/account-takeover-using-sso-logins-fa35f28a358b">Account Takeover using SSO Logins</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/kgreshake?lang=en">Kai Greshake</a></p><p></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:44) DOMPurify 3.2.3 Bypass</p><p>(00:06:37) O3 mini</p><p>(00:10:29) Ophion Security: Cisco Webex Connect</p><p>(00:15:54) Discord Community News</p><p>(00:19:12) postLogger Chrome Extension</p><p>(00:21:04) Common OAuth Vulnerabilities &amp; Lessons learned from Google’s APIs</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 110: In this episode of Critical Thinking - Bug Bounty Podcast we hit some quick news items including a DOMPurify 3.2.3 Bypass, O3 mini updates, and a cool postLogger Chrome Extension. Then, we hone in on OAuth vulnerabilities, API keys, and innovative techniques hackers use to exploit these systems.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ensy.zip/posts/dompurify-323-bypass/">DOMPurify 3.2.3 Bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/jasonzhou1993/status/1886397963012132902">Jason Zhou's post about O3 mini</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.ophionsecurity.com/post/cisco-webex-connect-vulnerability-unauthenticated-access-to-all-chats">Live Chat Blog #2: Cisco Webex Connect</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ndevtk/status/1858412811019502040">postLogger Chrome Extension</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://chromewebstore.google.com/detail/postlogger/aodfhblfhpcdadgcnpkfibjgjdoenoja">postLogger Webstore Link</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.doyensec.com/2025/01/30/oauth-common-vulnerabilities.html">Common OAuth Vulnerabilities</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.descope.com/blog/post/noauth">nOAuth: How Microsoft OAuth Misconfiguration Can Lead to Full Account Takeover</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://rikeshbaniya.medium.com/account-takeover-using-sso-logins-fa35f28a358b">Account Takeover using SSO Logins</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/kgreshake?lang=en">Kai Greshake</a></p><p></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:01:44) DOMPurify 3.2.3 Bypass</p><p>(00:06:37) O3 mini</p><p>(00:10:29) Ophion Security: Cisco Webex Connect</p><p>(00:15:54) Discord Community News</p><p>(00:19:12) postLogger Chrome Extension</p><p>(00:21:04) Common OAuth Vulnerabilities &amp; Lessons learned from Google’s APIs</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 110: In this episode of Critical Thinking - Bug Bounty Podcast we hit some quick news items including a DOMPurify 3.2.3 Bypass, O3 mini updates, and a cool postLogger Chrome Extension. Then, we hone in on OAuth vulnerabilities, API keys, an...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>110</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">d5356f66-8706-4211-afd5-84bac61bc08e</guid>
  <title><![CDATA[Episode 109: Creative Recon - Alternative Techniques]]></title>
  <description><![CDATA[<p>Episode 109: In this episode of Critical Thinking - Bug Bounty Podcast we start off with a quick recap of some of the DeepSeek Drama that’s been going down, and discuss AI in CAPTCHA and 2FA as well. Then we switch to cover some other news before settling in to talk about Alternative Recon Techniques</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker. <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-mdr">Check out their Managed Detection and Response!</a></p><p><strong>====== Resources ======</strong></p><p>Resources</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak">Wiz Research Uncovers Exposed DeepSeek Database</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/BApp_Store/status/1884648661058990310">Bypass Bot Detection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/sw33tLie/status/1883630595747758384">Tweet from sw33tLie</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/rsc/2fa">rsc 2fa</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/stealing-httponly-cookies-with-the-cookie-sandwich-technique">Stealing HttpOnly cookies with the cookie sandwich technique</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://douglas.day/2025/01/20/collaborativechains.html">Report Pointers for Collaborative Chains</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://flatt.tech/research/posts/clone2leak-your-git-credentials-belong-to-us/">Clone2Leak: Your Git Credentials Belong To Us</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/hackermondev/45a3cdfa52246f1d1201c1e8cdef6117">Deanonymization via cache</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/GoogleChrome/related-website-sets">GoogleChrome related-website-sets</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:03) DeepSeek debacle and Bypass Bot Detection</p><p>(00:23:48) Stealing HttpOnly cookies with the cookie sandwich technique</p><p>(00:30:54) Report Pointers for Collaborative Chains</p><p>(00:34:43) Clone2Leak: Your Git Credentials Belong To Us</p><p>(00:40:04) Deanonymization for Signal and Discord</p><p>(00:41:53) Alternative Recon Techniques</p>]]></description>
  <embed_id>7a564a24-4fdf-4700-b88e-2662c943c2fc</embed_id>
  <pubDate>Thu, 06 Feb 2025 11:00:55 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="59234275" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/4342807f-3036-4140-a881-f182eac844b1/episode.mp3" />
  <itunes:title><![CDATA[Episode 109: Creative Recon - Alternative Techniques]]></itunes:title>
  <itunes:duration>1:01:42</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 109: In this episode of Critical Thinking - Bug Bounty Podcast we start off with a quick recap of some of the DeepSeek Drama that’s been going down, and discuss AI in CAPTCHA and 2FA as well. Then we switch to cover some other news before settling in to talk about Alternative Recon Techniques</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker. <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-mdr">Check out their Managed Detection and Response!</a></p><p><strong>====== Resources ======</strong></p><p>Resources</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak">Wiz Research Uncovers Exposed DeepSeek Database</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/BApp_Store/status/1884648661058990310">Bypass Bot Detection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/sw33tLie/status/1883630595747758384">Tweet from sw33tLie</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/rsc/2fa">rsc 2fa</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/stealing-httponly-cookies-with-the-cookie-sandwich-technique">Stealing HttpOnly cookies with the cookie sandwich technique</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://douglas.day/2025/01/20/collaborativechains.html">Report Pointers for Collaborative Chains</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://flatt.tech/research/posts/clone2leak-your-git-credentials-belong-to-us/">Clone2Leak: Your Git Credentials Belong To Us</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/hackermondev/45a3cdfa52246f1d1201c1e8cdef6117">Deanonymization via cache</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/GoogleChrome/related-website-sets">GoogleChrome related-website-sets</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:03) DeepSeek debacle and Bypass Bot Detection</p><p>(00:23:48) Stealing HttpOnly cookies with the cookie sandwich technique</p><p>(00:30:54) Report Pointers for Collaborative Chains</p><p>(00:34:43) Clone2Leak: Your Git Credentials Belong To Us</p><p>(00:40:04) Deanonymization for Signal and Discord</p><p>(00:41:53) Alternative Recon Techniques</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 109: In this episode of Critical Thinking - Bug Bounty Podcast we start off with a quick recap of some of the DeepSeek Drama that’s been going down, and discuss AI in CAPTCHA and 2FA as well. Then we switch to cover some other news before settling in to talk about Alternative Recon Techniques</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts Rhynorater and Rez0 on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater"><strong>https://x.com/Rhynorater</strong></a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__"><strong>https://x.com/rez0__</strong></a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker. <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-mdr">Check out their Managed Detection and Response!</a></p><p><strong>====== Resources ======</strong></p><p>Resources</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak">Wiz Research Uncovers Exposed DeepSeek Database</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/BApp_Store/status/1884648661058990310">Bypass Bot Detection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/sw33tLie/status/1883630595747758384">Tweet from sw33tLie</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/rsc/2fa">rsc 2fa</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/stealing-httponly-cookies-with-the-cookie-sandwich-technique">Stealing HttpOnly cookies with the cookie sandwich technique</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://douglas.day/2025/01/20/collaborativechains.html">Report Pointers for Collaborative Chains</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://flatt.tech/research/posts/clone2leak-your-git-credentials-belong-to-us/">Clone2Leak: Your Git Credentials Belong To Us</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/hackermondev/45a3cdfa52246f1d1201c1e8cdef6117">Deanonymization via cache</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/GoogleChrome/related-website-sets">GoogleChrome related-website-sets</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:02:03) DeepSeek debacle and Bypass Bot Detection</p><p>(00:23:48) Stealing HttpOnly cookies with the cookie sandwich technique</p><p>(00:30:54) Report Pointers for Collaborative Chains</p><p>(00:34:43) Clone2Leak: Your Git Credentials Belong To Us</p><p>(00:40:04) Deanonymization for Signal and Discord</p><p>(00:41:53) Alternative Recon Techniques</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 109: In this episode of Critical Thinking - Bug Bounty Podcast we start off with a quick recap of some of the DeepSeek Drama that’s been going down, and discuss AI in CAPTCHA and 2FA as well. Then we switch to cover some other news before s...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>109</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">07bf4cbb-e2b3-405e-b949-1f28f4e3db17</guid>
  <title><![CDATA[Episode 108: How to Hack Salesforce, ServiceNow, and Other SaaS Products With Aaron Costello]]></title>
  <description><![CDATA[<p>Episode 108: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph bring on Aaron Costello to discuss SaaS security and misconfigurations as a bug class. He also gives some in-depth examples from Salesforce, ServiceNow, and Power Pages.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor: AppOmni. Get AppOmni's Definitive Guide to SaaS Security <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/AppOmni">https://www.criticalthinkingpodcast.io/AppOmni</a></p><p>Today’s Guest:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ConspiracyProof">https://x.com/ConspiracyProof</a></p><p><strong>====== Resources ======</strong></p><p>Aaron's Blog</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.enumerated.ie/">https://www.enumerated.ie/</a></p><p>Data Exposure and ServiceNow: The Elephant in the ITSM Room</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.enumerated.ie/index/servicenow-data-exposure">https://www.enumerated.ie/index/servicenow-data-exposure</a></p><p>Salesforce Lightning - An in-depth look at exploitation vectors for the everyday community</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.enumerated.ie/index/salesforce">https://www.enumerated.ie/index/salesforce</a></p><p>Lightning Components: A Treatise on Apex</p><p>Security from an External Perspective</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://go.appomni.com/hubfs/Collateral/AppOmni_Labs_White_Paper_Apex_Security.pdf?utm_campaign=Network%20Computing&amp;utm_source=referral&amp;utm_content=network_computing">https://go.appomni.com/hubfs/Collateral/AppOmni_Labs_White_Paper_Apex_Security.pdf?utm_campaign=Network%20Computing&amp;utm_source=referral&amp;utm_content=network_computing</a></p><p>Microsoft Power Pages: Data Exposure Reviewed</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://appomni.com/ao-labs/microsoft-power-pages-data-exposure-reviewed/">https://appomni.com/ao-labs/microsoft-power-pages-data-exposure-reviewed/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:03:00) Aaron Costello, Arbitrary File Upload, &amp; App Cache Manifest Poison bug</p><p>(00:13:37) SAAS Misconfigurations as a bug class</p><p>(00:43:27) SalesForce Misconfigurations</p><p>(01:11:30) Microsoft Power Pages</p>]]></description>
  <embed_id>874bb529-fd7d-4a85-944a-990ae14270a1</embed_id>
  <pubDate>Thu, 30 Jan 2025 11:00:47 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="87490384" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/0c8cb4f6-1cbb-47e3-8025-236ce9c20bb5/episode.mp3" />
  <itunes:title><![CDATA[Episode 108: How to Hack Salesforce, ServiceNow, and Other SaaS Products With Aaron Costello]]></itunes:title>
  <itunes:duration>1:31:08</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 108: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph bring on Aaron Costello to discuss SaaS security and misconfigurations as a bug class. He also gives some in-depth examples from Salesforce, ServiceNow, and Power Pages.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor: AppOmni. Get AppOmni's Definitive Guide to SaaS Security <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/AppOmni">https://www.criticalthinkingpodcast.io/AppOmni</a></p><p>Today’s Guest:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ConspiracyProof">https://x.com/ConspiracyProof</a></p><p><strong>====== Resources ======</strong></p><p>Aaron's Blog</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.enumerated.ie/">https://www.enumerated.ie/</a></p><p>Data Exposure and ServiceNow: The Elephant in the ITSM Room</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.enumerated.ie/index/servicenow-data-exposure">https://www.enumerated.ie/index/servicenow-data-exposure</a></p><p>Salesforce Lightning - An in-depth look at exploitation vectors for the everyday community</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.enumerated.ie/index/salesforce">https://www.enumerated.ie/index/salesforce</a></p><p>Lightning Components: A Treatise on Apex</p><p>Security from an External Perspective</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://go.appomni.com/hubfs/Collateral/AppOmni_Labs_White_Paper_Apex_Security.pdf?utm_campaign=Network%20Computing&amp;utm_source=referral&amp;utm_content=network_computing">https://go.appomni.com/hubfs/Collateral/AppOmni_Labs_White_Paper_Apex_Security.pdf?utm_campaign=Network%20Computing&amp;utm_source=referral&amp;utm_content=network_computing</a></p><p>Microsoft Power Pages: Data Exposure Reviewed</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://appomni.com/ao-labs/microsoft-power-pages-data-exposure-reviewed/">https://appomni.com/ao-labs/microsoft-power-pages-data-exposure-reviewed/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:03:00) Aaron Costello, Arbitrary File Upload, &amp; App Cache Manifest Poison bug</p><p>(00:13:37) SAAS Misconfigurations as a bug class</p><p>(00:43:27) SalesForce Misconfigurations</p><p>(01:11:30) Microsoft Power Pages</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 108: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph bring on Aaron Costello to discuss SaaS security and misconfigurations as a bug class. He also gives some in-depth examples from Salesforce, ServiceNow, and Power Pages.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor: AppOmni. Get AppOmni's Definitive Guide to SaaS Security <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/AppOmni">https://www.criticalthinkingpodcast.io/AppOmni</a></p><p>Today’s Guest:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ConspiracyProof">https://x.com/ConspiracyProof</a></p><p><strong>====== Resources ======</strong></p><p>Aaron's Blog</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.enumerated.ie/">https://www.enumerated.ie/</a></p><p>Data Exposure and ServiceNow: The Elephant in the ITSM Room</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.enumerated.ie/index/servicenow-data-exposure">https://www.enumerated.ie/index/servicenow-data-exposure</a></p><p>Salesforce Lightning - An in-depth look at exploitation vectors for the everyday community</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.enumerated.ie/index/salesforce">https://www.enumerated.ie/index/salesforce</a></p><p>Lightning Components: A Treatise on Apex</p><p>Security from an External Perspective</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://go.appomni.com/hubfs/Collateral/AppOmni_Labs_White_Paper_Apex_Security.pdf?utm_campaign=Network%20Computing&amp;utm_source=referral&amp;utm_content=network_computing">https://go.appomni.com/hubfs/Collateral/AppOmni_Labs_White_Paper_Apex_Security.pdf?utm_campaign=Network%20Computing&amp;utm_source=referral&amp;utm_content=network_computing</a></p><p>Microsoft Power Pages: Data Exposure Reviewed</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://appomni.com/ao-labs/microsoft-power-pages-data-exposure-reviewed/">https://appomni.com/ao-labs/microsoft-power-pages-data-exposure-reviewed/</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:03:00) Aaron Costello, Arbitrary File Upload, &amp; App Cache Manifest Poison bug</p><p>(00:13:37) SAAS Misconfigurations as a bug class</p><p>(00:43:27) SalesForce Misconfigurations</p><p>(01:11:30) Microsoft Power Pages</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 108: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph bring on Aaron Costello to discuss SaaS security and misconfigurations as a bug class. He also gives some in-depth examples from Salesforce, ServiceNow, and Po...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>108</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">a69eab15-50f2-4769-ab97-02e828ed1cb7</guid>
  <title><![CDATA[Episode 107: Bypassing Cross-Origin Browser Headers]]></title>
  <description><![CDATA[<p>Episode 107: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph are tackling the subject of cross-origin security headers. They also cover some news items including Google’s OAuth login flaw, RAINK, and gift card hacking.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker. Check out their Managed Detection and Response! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-mdr">https://www.criticalthinkingpodcast.io/tl-mdr</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/pulse/proud-dads-tale-two-bug-hunting-daughters-responsible-dustin-kirkland-hxwec/">A Proud Dad's Tale of Two Bug Hunting Daughters and Their Responsible Disclosures</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/trufflesec/status/1878932090366153159">Google’s OAuth login flaw</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__/status/1879249379393253382">Rez0's Ai tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__/status/1879557690101260681">Rez0's Follow-up</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/BishopFox/raink?tab=readme-ov-file">Raink from BishopFox</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://securityrise.com/posts/gift-card-security-research/">Gift cards security research</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/albinowax/status/1879550220876599493">Top 10 web hacking techniques of 2024</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://andrewlock.net/understanding-security-headers-part-1-cross-origin-opener-policy-preventing-attacks-from-popups/">Cross-Origin-Opener-Policy: preventing attacks from popups</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:05:13) Hacking with your kids</p><p>(00:09:46) H1/bc pentests</p><p>(00:12:23) Google’s OAuth login flaw</p><p>(00:18:01) Raink &amp; Rez0's AI tweets</p><p>(00:28:46) Giftcard hacking &amp; Portswigger top 10 voting</p><p>(00:34:23) Cross Origin Web Headers</p>]]></description>
  <embed_id>efc5e9bd-81d5-4806-b859-81c12fbf7de9</embed_id>
  <pubDate>Thu, 23 Jan 2025 11:01:45 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="63634137" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/0de76470-0b1f-434a-a3b3-115665fdcf47/episode.mp3" />
  <itunes:title><![CDATA[Episode 107: Bypassing Cross-Origin Browser Headers]]></itunes:title>
  <itunes:duration>1:06:17</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 107: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph are tackling the subject of cross-origin security headers. They also cover some news items including Google’s OAuth login flaw, RAINK, and gift card hacking.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker. Check out their Managed Detection and Response! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-mdr">https://www.criticalthinkingpodcast.io/tl-mdr</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/pulse/proud-dads-tale-two-bug-hunting-daughters-responsible-dustin-kirkland-hxwec/">A Proud Dad's Tale of Two Bug Hunting Daughters and Their Responsible Disclosures</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/trufflesec/status/1878932090366153159">Google’s OAuth login flaw</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__/status/1879249379393253382">Rez0's Ai tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__/status/1879557690101260681">Rez0's Follow-up</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/BishopFox/raink?tab=readme-ov-file">Raink from BishopFox</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://securityrise.com/posts/gift-card-security-research/">Gift cards security research</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/albinowax/status/1879550220876599493">Top 10 web hacking techniques of 2024</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://andrewlock.net/understanding-security-headers-part-1-cross-origin-opener-policy-preventing-attacks-from-popups/">Cross-Origin-Opener-Policy: preventing attacks from popups</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:05:13) Hacking with your kids</p><p>(00:09:46) H1/bc pentests</p><p>(00:12:23) Google’s OAuth login flaw</p><p>(00:18:01) Raink &amp; Rez0's AI tweets</p><p>(00:28:46) Giftcard hacking &amp; Portswigger top 10 voting</p><p>(00:34:23) Cross Origin Web Headers</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 107: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph are tackling the subject of cross-origin security headers. They also cover some news items including Google’s OAuth login flaw, RAINK, and gift card hacking.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker">https://x.com/realytcracker</a> for the awesome intro music!</p><p><strong>====== Links ======</strong></p><p>Follow your hosts on Twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><strong>====== Ways to Support CTBBPodcast ======</strong></p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today’s Sponsor - ThreatLocker. Check out their Managed Detection and Response! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-mdr">https://www.criticalthinkingpodcast.io/tl-mdr</a></p><p><strong>====== Resources ======</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/pulse/proud-dads-tale-two-bug-hunting-daughters-responsible-dustin-kirkland-hxwec/">A Proud Dad's Tale of Two Bug Hunting Daughters and Their Responsible Disclosures</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/trufflesec/status/1878932090366153159">Google’s OAuth login flaw</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__/status/1879249379393253382">Rez0's Ai tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__/status/1879557690101260681">Rez0's Follow-up</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/BishopFox/raink?tab=readme-ov-file">Raink from BishopFox</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://securityrise.com/posts/gift-card-security-research/">Gift cards security research</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/albinowax/status/1879550220876599493">Top 10 web hacking techniques of 2024</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://andrewlock.net/understanding-security-headers-part-1-cross-origin-opener-policy-preventing-attacks-from-popups/">Cross-Origin-Opener-Policy: preventing attacks from popups</a></p><p><strong>====== Timestamps ======</strong></p><p>(00:00:00) Introduction</p><p>(00:05:13) Hacking with your kids</p><p>(00:09:46) H1/bc pentests</p><p>(00:12:23) Google’s OAuth login flaw</p><p>(00:18:01) Raink &amp; Rez0's AI tweets</p><p>(00:28:46) Giftcard hacking &amp; Portswigger top 10 voting</p><p>(00:34:23) Cross Origin Web Headers</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 107: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph are tackling the subject of cross-origin security headers. They also cover some news items including Google’s OAuth login flaw, RAINK, and gift card hacking.Fo...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>107</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">f3749f20-c35b-4f28-9837-ffb8276f1edc</guid>
  <title><![CDATA[Episode 106: Announcing our new cohost...]]></title>
  <description><![CDATA[<p>Episode 106: In this episode of Critical Thinking - Bug Bounty Podcast we are pleased to announce our new co-host of the podcast: Joseph Thacker Aka Rez0! We discuss Joseph's transition to full-time bug bounty hunting, his goals, and what he’s looking forward to bringing to the pod. We also cover some news items including doubleclickjacking, character set attacks, SVG XSS, and more.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Rez0 on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p><strong>Resources</strong></p><p>DoubleClickjacking: A New Era of UI Redressing</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.paulosyibelo.com/2024/12/doubleclickjacking-what.html">https://www.paulosyibelo.com/2024/12/doubleclickjacking-what.html</a></p><p>XBOW Validation Benchmarks</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/xbow-engineering/validation-benchmarks">https://github.com/xbow-engineering/validation-benchmarks</a></p><p>Jorian tweet</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/J0R1AN/status/1871586792455163975">https://x.com/J0R1AN/status/1871586792455163975</a></p><p>Simplified Payload</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger-labs.net/xss/charset.php?x=%1b$B%1b(B%3Ca%20href=javas%1B(Jcript:alert(1)%3Etest%3C/a%3E&amp;charset=">https://portswigger-labs.net/xss/charset.php?x=%1b$B%1b(B%3Ca%20href=javas%1B(Jcript:alert(1)%3Etest%3C/a%3E&amp;charset=</a></p><p>SVG XSS Payload</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1876953751245783534">https://x.com/garethheyes/status/1876953751245783534</a></p><p>curl-cffi</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://pypi.org/project/curl-cffi/">https://pypi.org/project/curl-cffi/</a></p><p>Bypassing File Upload Restrictions To Exploit CSPT</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.doyensec.com/2025/01/09/cspt-file-upload.html">https://blog.doyensec.com/2025/01/09/cspt-file-upload.html</a></p><p>AI-Crash-Course</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/henrythe9th/AI-Crash-Course?tab=readme-ov-file">https://github.com/henrythe9th/AI-Crash-Course?tab=readme-ov-file</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:02:15) Rez0's journey to Full-time hunter, Tool developer, and new Co-host</p><p>(00:21:04) DoubleClickjacking</p><p>(00:31:48) XBOW Validation Benchmarks, Charset Thoughts, and SVG XSS</p><p>(00:42:28) curl-cffi, CSPT, and AI Crash Course</p>]]></description>
  <embed_id>0e8246fc-0ecf-4b9b-8f6f-5b5e9bddbade</embed_id>
  <pubDate>Thu, 16 Jan 2025 11:00:25 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="55842126" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/fb9a44a4-af63-4d52-9d2b-eab79d3c44b9/episode.mp3" />
  <itunes:title><![CDATA[Episode 106: Announcing our new cohost...]]></itunes:title>
  <itunes:duration>58:10</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 106: In this episode of Critical Thinking - Bug Bounty Podcast we are pleased to announce our new co-host of the podcast: Joseph Thacker Aka Rez0! We discuss Joseph's transition to full-time bug bounty hunting, his goals, and what he’s looking forward to bringing to the pod. We also cover some news items including doubleclickjacking, character set attacks, SVG XSS, and more.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Rez0 on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p><strong>Resources</strong></p><p>DoubleClickjacking: A New Era of UI Redressing</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.paulosyibelo.com/2024/12/doubleclickjacking-what.html">https://www.paulosyibelo.com/2024/12/doubleclickjacking-what.html</a></p><p>XBOW Validation Benchmarks</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/xbow-engineering/validation-benchmarks">https://github.com/xbow-engineering/validation-benchmarks</a></p><p>Jorian tweet</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/J0R1AN/status/1871586792455163975">https://x.com/J0R1AN/status/1871586792455163975</a></p><p>Simplified Payload</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger-labs.net/xss/charset.php?x=%1b$B%1b(B%3Ca%20href=javas%1B(Jcript:alert(1)%3Etest%3C/a%3E&amp;charset=">https://portswigger-labs.net/xss/charset.php?x=%1b$B%1b(B%3Ca%20href=javas%1B(Jcript:alert(1)%3Etest%3C/a%3E&amp;charset=</a></p><p>SVG XSS Payload</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1876953751245783534">https://x.com/garethheyes/status/1876953751245783534</a></p><p>curl-cffi</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://pypi.org/project/curl-cffi/">https://pypi.org/project/curl-cffi/</a></p><p>Bypassing File Upload Restrictions To Exploit CSPT</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.doyensec.com/2025/01/09/cspt-file-upload.html">https://blog.doyensec.com/2025/01/09/cspt-file-upload.html</a></p><p>AI-Crash-Course</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/henrythe9th/AI-Crash-Course?tab=readme-ov-file">https://github.com/henrythe9th/AI-Crash-Course?tab=readme-ov-file</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:02:15) Rez0's journey to Full-time hunter, Tool developer, and new Co-host</p><p>(00:21:04) DoubleClickjacking</p><p>(00:31:48) XBOW Validation Benchmarks, Charset Thoughts, and SVG XSS</p><p>(00:42:28) curl-cffi, CSPT, and AI Crash Course</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 106: In this episode of Critical Thinking - Bug Bounty Podcast we are pleased to announce our new co-host of the podcast: Joseph Thacker Aka Rez0! We discuss Joseph's transition to full-time bug bounty hunting, his goals, and what he’s looking forward to bringing to the pod. We also cover some news items including doubleclickjacking, character set attacks, SVG XSS, and more.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Rez0 on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p><strong>Resources</strong></p><p>DoubleClickjacking: A New Era of UI Redressing</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.paulosyibelo.com/2024/12/doubleclickjacking-what.html">https://www.paulosyibelo.com/2024/12/doubleclickjacking-what.html</a></p><p>XBOW Validation Benchmarks</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/xbow-engineering/validation-benchmarks">https://github.com/xbow-engineering/validation-benchmarks</a></p><p>Jorian tweet</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/J0R1AN/status/1871586792455163975">https://x.com/J0R1AN/status/1871586792455163975</a></p><p>Simplified Payload</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger-labs.net/xss/charset.php?x=%1b$B%1b(B%3Ca%20href=javas%1B(Jcript:alert(1)%3Etest%3C/a%3E&amp;charset=">https://portswigger-labs.net/xss/charset.php?x=%1b$B%1b(B%3Ca%20href=javas%1B(Jcript:alert(1)%3Etest%3C/a%3E&amp;charset=</a></p><p>SVG XSS Payload</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1876953751245783534">https://x.com/garethheyes/status/1876953751245783534</a></p><p>curl-cffi</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://pypi.org/project/curl-cffi/">https://pypi.org/project/curl-cffi/</a></p><p>Bypassing File Upload Restrictions To Exploit CSPT</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.doyensec.com/2025/01/09/cspt-file-upload.html">https://blog.doyensec.com/2025/01/09/cspt-file-upload.html</a></p><p>AI-Crash-Course</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/henrythe9th/AI-Crash-Course?tab=readme-ov-file">https://github.com/henrythe9th/AI-Crash-Course?tab=readme-ov-file</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:02:15) Rez0's journey to Full-time hunter, Tool developer, and new Co-host</p><p>(00:21:04) DoubleClickjacking</p><p>(00:31:48) XBOW Validation Benchmarks, Charset Thoughts, and SVG XSS</p><p>(00:42:28) curl-cffi, CSPT, and AI Crash Course</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 106: In this episode of Critical Thinking - Bug Bounty Podcast we are pleased to announce our new co-host of the podcast: Joseph Thacker Aka Rez0! We discuss Joseph's transition to full-time bug bounty hunting, his goals, and what he’s look...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>106</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">849f7ce4-2387-460d-b842-3cbf37339de6</guid>
  <title><![CDATA[Episode 105: Best Critical Thinking Moments from 2024]]></title>
  <description><![CDATA[<p>Episode 105: In this episode of Critical Thinking - Bug Bounty Podcast we're back with another Best-of episode recapping some of our top moments of 2024.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Ssend us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Rez0 on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p>Today’s Sponsor - ThreatLocker. Check out their Elevation Control!<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect"> </a><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-ec">https://www.criticalthinkingpodcast.io/tl-ec</a></p><p><strong>Resources</strong></p><p>Episode 53</p><p>ctbb.show/53</p><p>Episode 59</p><p>ctbb.show/59</p><p>Episode 65</p><p>ctbb.show/65</p><p>Episode 69</p><p>ctbb.show/69</p><p>Episode 80</p><p>ctbb.show/80</p><p>Episode 81</p><p>ctbb.show/81</p><p>Episode 86</p><p>ctbb.show/86</p><p>Episode 87</p><p>ctbb.show/87</p><p>Episode 91</p><p>ctbb.show/91</p><p>Episode 93</p><p>ctbb.show/93</p><p>Episode 99</p><p>ctbb.show/99</p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:03:59) Episode 53</p><p>(00:17:12) Episode 59</p><p>(00:32:45) Episode 65</p><p>(00:48:08) Episode 69</p><p>(01:02:37) Episode 80</p><p>(01:18:09) Episode 81</p><p>(01:28:59) Episode 86</p><p>(01:41:04) Episode 87</p><p>(01:54:48) Episode 91</p><p>(02:01:48) Episode 93</p><p>(02:09:37) Episode 99</p>]]></description>
  <embed_id>ac0accec-6e75-4aac-a778-9322cf9ac9f8</embed_id>
  <pubDate>Thu, 09 Jan 2025 11:01:04 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="132274186" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/e59b112f-1c17-4ea6-9c91-81d5ef1ef05d/episode.mp3" />
  <itunes:title><![CDATA[Episode 105: Best Critical Thinking Moments from 2024]]></itunes:title>
  <itunes:duration>2:17:47</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 105: In this episode of Critical Thinking - Bug Bounty Podcast we're back with another Best-of episode recapping some of our top moments of 2024.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Ssend us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Rez0 on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p>Today’s Sponsor - ThreatLocker. Check out their Elevation Control!<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect"> </a><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-ec">https://www.criticalthinkingpodcast.io/tl-ec</a></p><p><strong>Resources</strong></p><p>Episode 53</p><p>ctbb.show/53</p><p>Episode 59</p><p>ctbb.show/59</p><p>Episode 65</p><p>ctbb.show/65</p><p>Episode 69</p><p>ctbb.show/69</p><p>Episode 80</p><p>ctbb.show/80</p><p>Episode 81</p><p>ctbb.show/81</p><p>Episode 86</p><p>ctbb.show/86</p><p>Episode 87</p><p>ctbb.show/87</p><p>Episode 91</p><p>ctbb.show/91</p><p>Episode 93</p><p>ctbb.show/93</p><p>Episode 99</p><p>ctbb.show/99</p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:03:59) Episode 53</p><p>(00:17:12) Episode 59</p><p>(00:32:45) Episode 65</p><p>(00:48:08) Episode 69</p><p>(01:02:37) Episode 80</p><p>(01:18:09) Episode 81</p><p>(01:28:59) Episode 86</p><p>(01:41:04) Episode 87</p><p>(01:54:48) Episode 91</p><p>(02:01:48) Episode 93</p><p>(02:09:37) Episode 99</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 105: In this episode of Critical Thinking - Bug Bounty Podcast we're back with another Best-of episode recapping some of our top moments of 2024.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Ssend us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Rez0 on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p>Today’s Sponsor - ThreatLocker. Check out their Elevation Control!<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect"> </a><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-ec">https://www.criticalthinkingpodcast.io/tl-ec</a></p><p><strong>Resources</strong></p><p>Episode 53</p><p>ctbb.show/53</p><p>Episode 59</p><p>ctbb.show/59</p><p>Episode 65</p><p>ctbb.show/65</p><p>Episode 69</p><p>ctbb.show/69</p><p>Episode 80</p><p>ctbb.show/80</p><p>Episode 81</p><p>ctbb.show/81</p><p>Episode 86</p><p>ctbb.show/86</p><p>Episode 87</p><p>ctbb.show/87</p><p>Episode 91</p><p>ctbb.show/91</p><p>Episode 93</p><p>ctbb.show/93</p><p>Episode 99</p><p>ctbb.show/99</p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:03:59) Episode 53</p><p>(00:17:12) Episode 59</p><p>(00:32:45) Episode 65</p><p>(00:48:08) Episode 69</p><p>(01:02:37) Episode 80</p><p>(01:18:09) Episode 81</p><p>(01:28:59) Episode 86</p><p>(01:41:04) Episode 87</p><p>(01:54:48) Episode 91</p><p>(02:01:48) Episode 93</p><p>(02:09:37) Episode 99</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 105: In this episode of Critical Thinking - Bug Bounty Podcast we're back with another Best-of episode recapping some of our top moments of 2024.Follow us on twitter at: @ctbbpodcastSsend us any feedback here: info@criticalthinkingpodcast.i...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>105</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">dedfa953-ee09-47ea-a89b-68e7880aa6ac</guid>
  <title><![CDATA[Episode 104: 2024 Hacker Stats & 2025 Goals]]></title>
  <description><![CDATA[<p>Episode 104: In this episode of Critical Thinking - Bug Bounty Podcast Justin reflects upon the past year and walks through some of the bug bounty goals he had for 2024, and how he feels like he did. Then he sets some goals for 2025, as well as some exciting CT news for the coming year.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Rez0 on X:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://x.com/rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p><strong>Resources</strong></p><p>CTBB Full Time Guild</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/ft">ctbb.show/ft</a></p><p>Critical Research Lab</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/crl">ctbb.show/crl</a></p><p>CT Episode 51 - 2024 Goals</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/episode-51-hacker-stats-2023-2024-goals/">https://www.criticalthinkingpodcast.io/episode-51-hacker-stats-2023-2024-goals/</a></p><p>Personal BB inventory and goals</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/blog">https://ctbb.show/blog</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) introduction</p><p>(00:00:57) Critical Thinking 2025 Announcements</p><p>(00:04:21) Personal Inventory of 2024</p><p>(00:24:05) Goals for 2025</p>]]></description>
  <embed_id>4326c0f2-19f8-4068-ba6d-cb277aaefd04</embed_id>
  <pubDate>Thu, 02 Jan 2025 11:00:28 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="27842487" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/818bae26-424c-49e1-abac-17581f0136d9/episode.mp3" />
  <itunes:title><![CDATA[Episode 104: 2024 Hacker Stats & 2025 Goals]]></itunes:title>
  <itunes:duration>29:00</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 104: In this episode of Critical Thinking - Bug Bounty Podcast Justin reflects upon the past year and walks through some of the bug bounty goals he had for 2024, and how he feels like he did. Then he sets some goals for 2025, as well as some exciting CT news for the coming year.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Rez0 on X:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://x.com/rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p><strong>Resources</strong></p><p>CTBB Full Time Guild</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/ft">ctbb.show/ft</a></p><p>Critical Research Lab</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/crl">ctbb.show/crl</a></p><p>CT Episode 51 - 2024 Goals</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/episode-51-hacker-stats-2023-2024-goals/">https://www.criticalthinkingpodcast.io/episode-51-hacker-stats-2023-2024-goals/</a></p><p>Personal BB inventory and goals</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/blog">https://ctbb.show/blog</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) introduction</p><p>(00:00:57) Critical Thinking 2025 Announcements</p><p>(00:04:21) Personal Inventory of 2024</p><p>(00:24:05) Goals for 2025</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 104: In this episode of Critical Thinking - Bug Bounty Podcast Justin reflects upon the past year and walks through some of the bug bounty goals he had for 2024, and how he feels like he did. Then he sets some goals for 2025, as well as some exciting CT news for the coming year.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Rez0 on X:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://x.com/rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p><strong>Resources</strong></p><p>CTBB Full Time Guild</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/ft">ctbb.show/ft</a></p><p>Critical Research Lab</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/crl">ctbb.show/crl</a></p><p>CT Episode 51 - 2024 Goals</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/episode-51-hacker-stats-2023-2024-goals/">https://www.criticalthinkingpodcast.io/episode-51-hacker-stats-2023-2024-goals/</a></p><p>Personal BB inventory and goals</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/blog">https://ctbb.show/blog</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) introduction</p><p>(00:00:57) Critical Thinking 2025 Announcements</p><p>(00:04:21) Personal Inventory of 2024</p><p>(00:24:05) Goals for 2025</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 104: In this episode of Critical Thinking - Bug Bounty Podcast Justin reflects upon the past year and walks through some of the bug bounty goals he had for 2024, and how he feels like he did. Then he sets some goals for 2025, as well as som...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>104</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">758c3ad7-5343-4ea3-ae8f-85c6e4bbd653</guid>
  <title><![CDATA[Episode 103: Getting ANSI about Unicode Normalization]]></title>
  <description><![CDATA[<p>Episode 103: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph delve into the vulnerabilities associated with ANSI codes and large language models (LLMs), as well as talk through some new research and the value of micro-blogging in general.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">CTBB Discord</a>!</p><p>We offer Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">SWAG store</a>!</p><p>Join our <a target="_blank" rel="noopener noreferrer nofollow" href="https://shiftwaitlist.com/">Shift waitlist</a>!</p><p>Today’s Sponsor - ThreatLocker. Check out their Elevation Control!<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect"> </a><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-ec">https://www.criticalthinkingpodcast.io/tl-ec</a></p><p><strong>Resources</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nastystereo.com/security/rails-_json-juggling-attack.html">_json Juggling Attack</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nastystereo.com/security/cross-site-post-without-content-type.html">Cross-Site POST Requests Without a Content-Type Header</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://worst.fit/#">Worst Fit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://worst.fit/assets/EU-24-Tsai-WorstFit-Unveiling-Hidden-Transformers-in-Windows-ANSI.pdf">Orange Tsai on Worst Fit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://grayduck.mn/2024/11/21/handling-cookies-is-a-minefield/">Handling Cookies is a Minefield</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2024/terminal-dillmas-prompt-injection-ansi-sequences/">Terminal DiLLMa</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jorianwoltjer.com/blog/p/hacking/xs-leaking-flags-with-css-a-ctfd-0day">XS-Leaking flags with CSS: A CTFd 0day</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arxiv.org/html/2410.20911v1?utm_source=danielmiessler.com&amp;utm_medium=newsletter&amp;utm_campaign=ul-no-458-ollama-vulnerabilities-rating-ai-using-ai-the-mantis-hack-back-framework">Hacking Back the AI-Hacker</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/">Johann Computer use demo</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://douglas.day/2024/12/13/HowIBecameTheMostValuableHacker.html">How I Became The Most Valuable Hacker</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:01:39) _json Juggling Attack and Cross-Site POST Requests Without a Content-Type Header</p><p>(00:10:55) Worst Fit and Unicode Mapping</p><p>(00:20:08) Handling Cookies is a Minefield</p><p>(00:28:11) Terminal DiLLMa &amp; CTFd 0day</p><p>(00:41:18) Hacking Back the AI-Hacker</p><p>(00:47:30) Becoming Most Valuable Hacker</p>]]></description>
  <embed_id>30fdc48e-a831-4f27-bd6d-d6d4c672fbd6</embed_id>
  <pubDate>Thu, 26 Dec 2024 11:00:37 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="58082251" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/b12090d8-2b80-4d1f-b833-fb8aad2ec8e9/episode.mp3" />
  <itunes:title><![CDATA[Episode 103: Getting ANSI about Unicode Normalization]]></itunes:title>
  <itunes:duration>1:00:30</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 103: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph delve into the vulnerabilities associated with ANSI codes and large language models (LLMs), as well as talk through some new research and the value of micro-blogging in general.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">CTBB Discord</a>!</p><p>We offer Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">SWAG store</a>!</p><p>Join our <a target="_blank" rel="noopener noreferrer nofollow" href="https://shiftwaitlist.com/">Shift waitlist</a>!</p><p>Today’s Sponsor - ThreatLocker. Check out their Elevation Control!<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect"> </a><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-ec">https://www.criticalthinkingpodcast.io/tl-ec</a></p><p><strong>Resources</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nastystereo.com/security/rails-_json-juggling-attack.html">_json Juggling Attack</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nastystereo.com/security/cross-site-post-without-content-type.html">Cross-Site POST Requests Without a Content-Type Header</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://worst.fit/#">Worst Fit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://worst.fit/assets/EU-24-Tsai-WorstFit-Unveiling-Hidden-Transformers-in-Windows-ANSI.pdf">Orange Tsai on Worst Fit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://grayduck.mn/2024/11/21/handling-cookies-is-a-minefield/">Handling Cookies is a Minefield</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2024/terminal-dillmas-prompt-injection-ansi-sequences/">Terminal DiLLMa</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jorianwoltjer.com/blog/p/hacking/xs-leaking-flags-with-css-a-ctfd-0day">XS-Leaking flags with CSS: A CTFd 0day</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arxiv.org/html/2410.20911v1?utm_source=danielmiessler.com&amp;utm_medium=newsletter&amp;utm_campaign=ul-no-458-ollama-vulnerabilities-rating-ai-using-ai-the-mantis-hack-back-framework">Hacking Back the AI-Hacker</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/">Johann Computer use demo</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://douglas.day/2024/12/13/HowIBecameTheMostValuableHacker.html">How I Became The Most Valuable Hacker</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:01:39) _json Juggling Attack and Cross-Site POST Requests Without a Content-Type Header</p><p>(00:10:55) Worst Fit and Unicode Mapping</p><p>(00:20:08) Handling Cookies is a Minefield</p><p>(00:28:11) Terminal DiLLMa &amp; CTFd 0day</p><p>(00:41:18) Hacking Back the AI-Hacker</p><p>(00:47:30) Becoming Most Valuable Hacker</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 103: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph delve into the vulnerabilities associated with ANSI codes and large language models (LLMs), as well as talk through some new research and the value of micro-blogging in general.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">CTBB Discord</a>!</p><p>We offer Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">SWAG store</a>!</p><p>Join our <a target="_blank" rel="noopener noreferrer nofollow" href="https://shiftwaitlist.com/">Shift waitlist</a>!</p><p>Today’s Sponsor - ThreatLocker. Check out their Elevation Control!<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect"> </a><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-ec">https://www.criticalthinkingpodcast.io/tl-ec</a></p><p><strong>Resources</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nastystereo.com/security/rails-_json-juggling-attack.html">_json Juggling Attack</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nastystereo.com/security/cross-site-post-without-content-type.html">Cross-Site POST Requests Without a Content-Type Header</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://worst.fit/#">Worst Fit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://worst.fit/assets/EU-24-Tsai-WorstFit-Unveiling-Hidden-Transformers-in-Windows-ANSI.pdf">Orange Tsai on Worst Fit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://grayduck.mn/2024/11/21/handling-cookies-is-a-minefield/">Handling Cookies is a Minefield</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2024/terminal-dillmas-prompt-injection-ansi-sequences/">Terminal DiLLMa</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jorianwoltjer.com/blog/p/hacking/xs-leaking-flags-with-css-a-ctfd-0day">XS-Leaking flags with CSS: A CTFd 0day</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arxiv.org/html/2410.20911v1?utm_source=danielmiessler.com&amp;utm_medium=newsletter&amp;utm_campaign=ul-no-458-ollama-vulnerabilities-rating-ai-using-ai-the-mantis-hack-back-framework">Hacking Back the AI-Hacker</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/">Johann Computer use demo</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://douglas.day/2024/12/13/HowIBecameTheMostValuableHacker.html">How I Became The Most Valuable Hacker</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:01:39) _json Juggling Attack and Cross-Site POST Requests Without a Content-Type Header</p><p>(00:10:55) Worst Fit and Unicode Mapping</p><p>(00:20:08) Handling Cookies is a Minefield</p><p>(00:28:11) Terminal DiLLMa &amp; CTFd 0day</p><p>(00:41:18) Hacking Back the AI-Hacker</p><p>(00:47:30) Becoming Most Valuable Hacker</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 103: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph delve into the vulnerabilities associated with ANSI codes and large language models (LLMs), as well as talk through some new research and the value of micro-bl...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>103</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">3918b8e6-db40-44c2-9d98-b74d51d7981f</guid>
  <title><![CDATA[Episode 102: Building Web Hacking Micro Agents with Jason Haddix]]></title>
  <description><![CDATA[<p>Episode 102: In this episode of Critical Thinking - Bug Bounty Podcast Justin grabs Jason Haddix to help brainstorm the concept of AI micro-agents in hacking, particularly in terms of web fuzzing, WAF bypasses, report writing, and more.They discuss the importance of contextual knowledge, the cost implications, and the strengths of different LLM Models.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p>Today’s Guest - <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Jhaddix">https://x.com/Jhaddix</a></p><p><strong>Resources</strong></p><p>Keynote: Red, Blue, and Purple AI - Jason Haddix</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=XHeTn7uWVQM">https://www.youtube.com/watch?v=XHeTn7uWVQM</a></p><p>Attention in transformers,</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=eMlx5fFNoYc">https://www.youtube.com/watch?v=eMlx5fFNoYc</a></p><p>Shift</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://shiftwaitlist.com/">https://shiftwaitlist.com/</a></p><p>The Darkest Side of Bug Bounty</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=6SNy0u6pYOc">https://www.youtube.com/watch?v=6SNy0u6pYOc</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:01:25) Micro-agents and Weird Machine Tricks</p><p>(00:11:05) Web fuzzing with AI</p><p>(00:18:15) Brainstorming Shift and micro-agents</p><p>(00:34:40) Strengths of different AI Models, and using AI to write reports</p><p>(00:54:21) The Darkest Side of Bug Bounty</p>]]></description>
  <embed_id>0481fa49-2eb7-4ec3-9557-3d048ef4b043</embed_id>
  <pubDate>Thu, 19 Dec 2024 11:01:37 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="60306218" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/58ad58bb-c755-4172-97e8-067fb72e2593/episode.mp3" />
  <itunes:title><![CDATA[Episode 102: Building Web Hacking Micro Agents with Jason Haddix]]></itunes:title>
  <itunes:duration>1:02:49</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 102: In this episode of Critical Thinking - Bug Bounty Podcast Justin grabs Jason Haddix to help brainstorm the concept of AI micro-agents in hacking, particularly in terms of web fuzzing, WAF bypasses, report writing, and more.They discuss the importance of contextual knowledge, the cost implications, and the strengths of different LLM Models.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p>Today’s Guest - <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Jhaddix">https://x.com/Jhaddix</a></p><p><strong>Resources</strong></p><p>Keynote: Red, Blue, and Purple AI - Jason Haddix</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=XHeTn7uWVQM">https://www.youtube.com/watch?v=XHeTn7uWVQM</a></p><p>Attention in transformers,</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=eMlx5fFNoYc">https://www.youtube.com/watch?v=eMlx5fFNoYc</a></p><p>Shift</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://shiftwaitlist.com/">https://shiftwaitlist.com/</a></p><p>The Darkest Side of Bug Bounty</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=6SNy0u6pYOc">https://www.youtube.com/watch?v=6SNy0u6pYOc</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:01:25) Micro-agents and Weird Machine Tricks</p><p>(00:11:05) Web fuzzing with AI</p><p>(00:18:15) Brainstorming Shift and micro-agents</p><p>(00:34:40) Strengths of different AI Models, and using AI to write reports</p><p>(00:54:21) The Darkest Side of Bug Bounty</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 102: In this episode of Critical Thinking - Bug Bounty Podcast Justin grabs Jason Haddix to help brainstorm the concept of AI micro-agents in hacking, particularly in terms of web fuzzing, WAF bypasses, report writing, and more.They discuss the importance of contextual knowledge, the cost implications, and the strengths of different LLM Models.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p>Today’s Guest - <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Jhaddix">https://x.com/Jhaddix</a></p><p><strong>Resources</strong></p><p>Keynote: Red, Blue, and Purple AI - Jason Haddix</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=XHeTn7uWVQM">https://www.youtube.com/watch?v=XHeTn7uWVQM</a></p><p>Attention in transformers,</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=eMlx5fFNoYc">https://www.youtube.com/watch?v=eMlx5fFNoYc</a></p><p>Shift</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://shiftwaitlist.com/">https://shiftwaitlist.com/</a></p><p>The Darkest Side of Bug Bounty</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=6SNy0u6pYOc">https://www.youtube.com/watch?v=6SNy0u6pYOc</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:01:25) Micro-agents and Weird Machine Tricks</p><p>(00:11:05) Web fuzzing with AI</p><p>(00:18:15) Brainstorming Shift and micro-agents</p><p>(00:34:40) Strengths of different AI Models, and using AI to write reports</p><p>(00:54:21) The Darkest Side of Bug Bounty</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 102: In this episode of Critical Thinking - Bug Bounty Podcast Justin grabs Jason Haddix to help brainstorm the concept of AI micro-agents in hacking, particularly in terms of web fuzzing, WAF bypasses, report writing, and more.They discuss...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>102</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">2fc10f54-789e-4768-aae7-6245f7a72f91</guid>
  <title><![CDATA[Episode 101: CTBB Hijacked: Rez0__ on AI Attack Vectors with Johann Rehberger]]></title>
  <description><![CDATA[<p>Episode 101: In this episode of Critical Thinking - Bug Bounty Podcast we’ve been hijacked! Rez0 takes control of this episode, and sits down with Johann Rehberger to discuss the intricacies of AI application vulnerabilities. They talk through the importance of understanding system prompts, and various obfuscation techniques used to bypass security measures, the best AI platforms, and the evolving landscape of AI security.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker. Check out their Elevation Control!<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect"> </a><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-ec">https://www.criticalthinkingpodcast.io/tl-ec</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/wunderwuzzi23">https://x.com/wunderwuzzi23</a></p><p><strong>Resources</strong></p><p>Johann's blog</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/">https://embracethered.com/blog/</a></p><p>zombais</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/">https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/</a></p><p>Copirate</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling/">https://embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling/</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:01:59) Biggest things to look for in AI hacking</p><p>(00:11:58) Best AI companies to hack on</p><p>(00:15:59) URL Redirects and Obfuscation Techniques</p><p>(00:24:05) Copirate</p><p>(00:35:50) prompt injection guardrails and threats</p>]]></description>
  <embed_id>05b3c31f-e608-4c4b-aa6a-676c04c39a1d</embed_id>
  <pubDate>Thu, 12 Dec 2024 11:00:22 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="49346488" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/69aa30e3-21ad-427c-8ade-63e284bf6bb6/episode.mp3" />
  <itunes:title><![CDATA[Episode 101: CTBB Hijacked: Rez0__ on AI Attack Vectors with Johann Rehberger]]></itunes:title>
  <itunes:duration>51:24</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 101: In this episode of Critical Thinking - Bug Bounty Podcast we’ve been hijacked! Rez0 takes control of this episode, and sits down with Johann Rehberger to discuss the intricacies of AI application vulnerabilities. They talk through the importance of understanding system prompts, and various obfuscation techniques used to bypass security measures, the best AI platforms, and the evolving landscape of AI security.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker. Check out their Elevation Control!<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect"> </a><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-ec">https://www.criticalthinkingpodcast.io/tl-ec</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/wunderwuzzi23">https://x.com/wunderwuzzi23</a></p><p><strong>Resources</strong></p><p>Johann's blog</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/">https://embracethered.com/blog/</a></p><p>zombais</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/">https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/</a></p><p>Copirate</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling/">https://embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling/</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:01:59) Biggest things to look for in AI hacking</p><p>(00:11:58) Best AI companies to hack on</p><p>(00:15:59) URL Redirects and Obfuscation Techniques</p><p>(00:24:05) Copirate</p><p>(00:35:50) prompt injection guardrails and threats</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 101: In this episode of Critical Thinking - Bug Bounty Podcast we’ve been hijacked! Rez0 takes control of this episode, and sits down with Johann Rehberger to discuss the intricacies of AI application vulnerabilities. They talk through the importance of understanding system prompts, and various obfuscation techniques used to bypass security measures, the best AI platforms, and the evolving landscape of AI security.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker. Check out their Elevation Control!<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect"> </a><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-ec">https://www.criticalthinkingpodcast.io/tl-ec</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/wunderwuzzi23">https://x.com/wunderwuzzi23</a></p><p><strong>Resources</strong></p><p>Johann's blog</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/">https://embracethered.com/blog/</a></p><p>zombais</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/">https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/</a></p><p>Copirate</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling/">https://embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling/</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:01:59) Biggest things to look for in AI hacking</p><p>(00:11:58) Best AI companies to hack on</p><p>(00:15:59) URL Redirects and Obfuscation Techniques</p><p>(00:24:05) Copirate</p><p>(00:35:50) prompt injection guardrails and threats</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 101: In this episode of Critical Thinking - Bug Bounty Podcast we’ve been hijacked! Rez0 takes control of this episode, and sits down with Johann Rehberger to discuss the intricacies of AI application vulnerabilities. They talk through the ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>101</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">fa81bef3-a969-4ab5-85de-744c030bcfd6</guid>
  <title><![CDATA[Ep 100 - 8 Fav Bugs of 2024, Farewell Joel, Hello Shift - Cursor of Hacking]]></title>
  <description><![CDATA[<p>Episode 100: In this episode of Critical Thinking - Bug Bounty Podcast we have a mixed bag. We celebrate 100 episodes of Critical Thinking, but also bid farewell to Joel, who will be leaving the show as a co-host, but returning as guest. Then we hear from a bunch of friends about their 'best bug of the year', before capping the episode with the announcement of a new AI tool we've been working on!</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Resources</p><p>Delorean</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/jselvi/Delorean">https://github.com/jselvi/Delorean</a></p><p>Shift</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://shiftwaitlist.com">shiftwaitlist.com</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:07:32) Nagli</p><p>(00:19:09) Shubs</p><p>(00:35:00) Matt Brown</p><p>(00:39:42) Matanber</p><p>(00:57:52) Douglas Day</p><p>(01:05:18) Alex Chapman</p><p>(01:15:02) Nahamsec</p><p>(01:25:45) Rez0</p><p>(01:28:20) Shift Announcement</p>]]></description>
  <embed_id>ebb537e7-7314-419a-a41a-6b3b9b33d944</embed_id>
  <pubDate>Thu, 05 Dec 2024 11:00:58 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="97601969" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/0611328f-0c12-4aab-9be0-8c79ab74a4cb/episode.mp3" />
  <itunes:title><![CDATA[Ep 100 - 8 Fav Bugs of 2024, Farewell Joel, Hello Shift - Cursor of Hacking]]></itunes:title>
  <itunes:duration>1:41:40</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 100: In this episode of Critical Thinking - Bug Bounty Podcast we have a mixed bag. We celebrate 100 episodes of Critical Thinking, but also bid farewell to Joel, who will be leaving the show as a co-host, but returning as guest. Then we hear from a bunch of friends about their 'best bug of the year', before capping the episode with the announcement of a new AI tool we've been working on!</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Resources</p><p>Delorean</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/jselvi/Delorean">https://github.com/jselvi/Delorean</a></p><p>Shift</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://shiftwaitlist.com">shiftwaitlist.com</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:07:32) Nagli</p><p>(00:19:09) Shubs</p><p>(00:35:00) Matt Brown</p><p>(00:39:42) Matanber</p><p>(00:57:52) Douglas Day</p><p>(01:05:18) Alex Chapman</p><p>(01:15:02) Nahamsec</p><p>(01:25:45) Rez0</p><p>(01:28:20) Shift Announcement</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 100: In this episode of Critical Thinking - Bug Bounty Podcast we have a mixed bag. We celebrate 100 episodes of Critical Thinking, but also bid farewell to Joel, who will be leaving the show as a co-host, but returning as guest. Then we hear from a bunch of friends about their 'best bug of the year', before capping the episode with the announcement of a new AI tool we've been working on!</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Resources</p><p>Delorean</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/jselvi/Delorean">https://github.com/jselvi/Delorean</a></p><p>Shift</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://shiftwaitlist.com">shiftwaitlist.com</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:07:32) Nagli</p><p>(00:19:09) Shubs</p><p>(00:35:00) Matt Brown</p><p>(00:39:42) Matanber</p><p>(00:57:52) Douglas Day</p><p>(01:05:18) Alex Chapman</p><p>(01:15:02) Nahamsec</p><p>(01:25:45) Rez0</p><p>(01:28:20) Shift Announcement</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 100: In this episode of Critical Thinking - Bug Bounty Podcast we have a mixed bag. We celebrate 100 episodes of Critical Thinking, but also bid farewell to Joel, who will be leaving the show as a co-host, but returning as guest. Then we he...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>100</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">f59ce7d6-63b3-4ab0-8dfa-abba949e483b</guid>
  <title><![CDATA[Episode 99: Back to the Basics - Web Fundamental to 100k a Year in Bug Bounty ]]></title>
  <description><![CDATA[<p>Episode 99: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Roni dissect an old thread of Justin's talking about how best to start bug bounty with the goal of making $100k in the first year.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - AssetNote: Check out their ASMR board (no not that kind!)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://assetnote.io/asmr">https://assetnote.io/asmr</a></p><p>Today’s Guest - <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xLupin">https://x.com/0xLupin</a></p><p><strong>Resources</strong></p><p>Justin's Twitter Thread</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater/status/1699395452481769867">https://x.com/Rhynorater/status/1699395452481769867</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:03:00) Web Fundamentals Education</p><p>(00:46:01) Threat Modeling and Hacking Goals</p><p>(01:18:58) Vuln Types and finding Specialization</p>]]></description>
  <embed_id>3cea71f4-9c67-4c8f-80ea-0b8bdde7b88a</embed_id>
  <pubDate>Thu, 28 Nov 2024 11:00:43 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="98786877" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/f4729de4-4b94-4b44-aa0e-ca7ef188f172/episode.mp3" />
  <itunes:title><![CDATA[Episode 99: Back to the Basics - Web Fundamental to 100k a Year in Bug Bounty ]]></itunes:title>
  <itunes:duration>1:42:54</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 99: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Roni dissect an old thread of Justin's talking about how best to start bug bounty with the goal of making $100k in the first year.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - AssetNote: Check out their ASMR board (no not that kind!)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://assetnote.io/asmr">https://assetnote.io/asmr</a></p><p>Today’s Guest - <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xLupin">https://x.com/0xLupin</a></p><p><strong>Resources</strong></p><p>Justin's Twitter Thread</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater/status/1699395452481769867">https://x.com/Rhynorater/status/1699395452481769867</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:03:00) Web Fundamentals Education</p><p>(00:46:01) Threat Modeling and Hacking Goals</p><p>(01:18:58) Vuln Types and finding Specialization</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 99: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Roni dissect an old thread of Justin's talking about how best to start bug bounty with the goal of making $100k in the first year.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - AssetNote: Check out their ASMR board (no not that kind!)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://assetnote.io/asmr">https://assetnote.io/asmr</a></p><p>Today’s Guest - <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xLupin">https://x.com/0xLupin</a></p><p><strong>Resources</strong></p><p>Justin's Twitter Thread</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater/status/1699395452481769867">https://x.com/Rhynorater/status/1699395452481769867</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:03:00) Web Fundamentals Education</p><p>(00:46:01) Threat Modeling and Hacking Goals</p><p>(01:18:58) Vuln Types and finding Specialization</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 99: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Roni dissect an old thread of Justin's talking about how best to start bug bounty with the goal of making $100k in the first year.Follow us on twitter at: @ctbbpodcast...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>99</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">3ee459ce-8238-44eb-849e-58ac165e0c09</guid>
  <title><![CDATA[Episode 98: Team 82 Sharon Brizinov - The Live Hacking Polymath]]></title>
  <description><![CDATA[<p>Episode 98: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner sits down with Sharon,to discuss his journey from early iOS development to leading a research team at Claroty. They address the differences between HackerOne and Pwn2Own, and talk through some intricacies of IoT security, and some less common IoT attack surfaces.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker: Check out Network Control!</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>And AssetNote: Check out their ASMR board (no not that kind!)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://assetnote.io/asmr">https://assetnote.io/asmr</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://sharonbrizinov.com/">https://sharonbrizinov.com/</a></p><p><strong>Resources</strong></p><p>The Claroty Research Team</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://claroty.com/team82">https://claroty.com/team82</a></p><p>Pwntools</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Gallopsled/pwntools">https://github.com/Gallopsled/pwntools</a></p><p>Scan My SMS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://scanmysms.com">http://scanmysms.com</a></p><p>Gotta Catch 'Em All: Phishing, Smishing, and the birth of ScanMySMS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=EhNsXXbDp3U">https://www.youtube.com/watch?v=EhNsXXbDp3U</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:03:31) Sharon's Origin Story</p><p>(00:21:58) Transition to Bug Bounty and Pwn2Own vs HackerOne</p><p>(00:47:05) IoT/ICS Hacking Methodology</p><p>(01:10:13) Cloud to Device Communication</p><p>(01:18:15) Bug replication and uncommon attack surfaces</p><p>(01:30:58) Documentation tracker, reCaptcha bypass, and ScanMySMS</p>]]></description>
  <embed_id>a3c92d9d-79c4-4f49-9a61-274ac673ab34</embed_id>
  <pubDate>Thu, 21 Nov 2024 11:01:10 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="99794159" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/423bb3f1-9cea-4564-ba5e-72dc5ded482c/episode.mp3" />
  <itunes:title><![CDATA[Episode 98: Team 82 Sharon Brizinov - The Live Hacking Polymath]]></itunes:title>
  <itunes:duration>1:43:57</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 98: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner sits down with Sharon,to discuss his journey from early iOS development to leading a research team at Claroty. They address the differences between HackerOne and Pwn2Own, and talk through some intricacies of IoT security, and some less common IoT attack surfaces.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker: Check out Network Control!</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>And AssetNote: Check out their ASMR board (no not that kind!)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://assetnote.io/asmr">https://assetnote.io/asmr</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://sharonbrizinov.com/">https://sharonbrizinov.com/</a></p><p><strong>Resources</strong></p><p>The Claroty Research Team</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://claroty.com/team82">https://claroty.com/team82</a></p><p>Pwntools</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Gallopsled/pwntools">https://github.com/Gallopsled/pwntools</a></p><p>Scan My SMS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://scanmysms.com">http://scanmysms.com</a></p><p>Gotta Catch 'Em All: Phishing, Smishing, and the birth of ScanMySMS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=EhNsXXbDp3U">https://www.youtube.com/watch?v=EhNsXXbDp3U</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:03:31) Sharon's Origin Story</p><p>(00:21:58) Transition to Bug Bounty and Pwn2Own vs HackerOne</p><p>(00:47:05) IoT/ICS Hacking Methodology</p><p>(01:10:13) Cloud to Device Communication</p><p>(01:18:15) Bug replication and uncommon attack surfaces</p><p>(01:30:58) Documentation tracker, reCaptcha bypass, and ScanMySMS</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 98: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner sits down with Sharon,to discuss his journey from early iOS development to leading a research team at Claroty. They address the differences between HackerOne and Pwn2Own, and talk through some intricacies of IoT security, and some less common IoT attack surfaces.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker: Check out Network Control!</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>And AssetNote: Check out their ASMR board (no not that kind!)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://assetnote.io/asmr">https://assetnote.io/asmr</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://sharonbrizinov.com/">https://sharonbrizinov.com/</a></p><p><strong>Resources</strong></p><p>The Claroty Research Team</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://claroty.com/team82">https://claroty.com/team82</a></p><p>Pwntools</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Gallopsled/pwntools">https://github.com/Gallopsled/pwntools</a></p><p>Scan My SMS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://scanmysms.com">http://scanmysms.com</a></p><p>Gotta Catch 'Em All: Phishing, Smishing, and the birth of ScanMySMS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=EhNsXXbDp3U">https://www.youtube.com/watch?v=EhNsXXbDp3U</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:03:31) Sharon's Origin Story</p><p>(00:21:58) Transition to Bug Bounty and Pwn2Own vs HackerOne</p><p>(00:47:05) IoT/ICS Hacking Methodology</p><p>(01:10:13) Cloud to Device Communication</p><p>(01:18:15) Bug replication and uncommon attack surfaces</p><p>(01:30:58) Documentation tracker, reCaptcha bypass, and ScanMySMS</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 98: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner sits down with Sharon,to discuss his journey from early iOS development to leading a research team at Claroty. They address the differences between HackerOne and P...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>98</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">67924ec4-3c6f-4458-a816-13aa4eebc483</guid>
  <title><![CDATA[Episode 97: Bcrypt Hash Input Truncation & Mobile Device Threat Modeling]]></title>
  <description><![CDATA[<p>Episode 97: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel jump into some cool news items, including a recent Okta Bcrypt vulnerability, insights into crypto bugs, and some intricacies of Android and Chrome security. They also explore the latest research from Portswigger on payload concealment techniques, and the introduction of the Lightyear tool for PHP exploits.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker: Check out Network Control!</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>And AssetNote: Check out their ASMR board (no not that kind!)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://assetnote.io/asmr">https://assetnote.io/asmr</a></p><p><strong>Resources</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/bcrypt/status/1852575080989257893">Okta bcrypt</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ndevtk.github.io/writeups/2024/08/01/awas/">Android Web Attack Surface Writeups</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/concealing-payloads-in-url-credentials">Concealing payloads in URL credentials</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ambionics/status/1853358125283152207">Dumping PHP files with Lightyear</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/php/php-src/issues/10453">Limit maximum number of filter chains</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/dom-explorer-tool-parse-html?utm_source=twitter&amp;utm_medium=social&amp;utm_campaign=dom-explorer-tool">Dom-Explorer tool launched</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/avlidienbrunn/multihtmlparse">MultiHTMLParse</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/tom_doerr/status/1852810041339896314">JSON Crack</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Static-Flow">Caido/Burp notes plugin</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:02:43) Okta Release and bcrypt</p><p>(00:10:26) Android Web Attack Surface Writeups</p><p>(00:20:21) More Portswigger Research</p><p>(00:28:29) Lightyear and PHP filter chains</p><p>(00:35:09) Dom-Explorer</p><p>(00:45:24) The JSON Debate</p><p>(00:49:59) Notes plugin for Burp and Caido</p>]]></description>
  <embed_id>3d780d59-3c1b-4499-b0dc-e43e7966426f</embed_id>
  <pubDate>Thu, 14 Nov 2024 11:01:21 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="50962316" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/a1b52abe-c4b8-4d68-a36e-b928098d3245/episode.mp3" />
  <itunes:title><![CDATA[Episode 97: Bcrypt Hash Input Truncation & Mobile Device Threat Modeling]]></itunes:title>
  <itunes:duration>53:05</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 97: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel jump into some cool news items, including a recent Okta Bcrypt vulnerability, insights into crypto bugs, and some intricacies of Android and Chrome security. They also explore the latest research from Portswigger on payload concealment techniques, and the introduction of the Lightyear tool for PHP exploits.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker: Check out Network Control!</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>And AssetNote: Check out their ASMR board (no not that kind!)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://assetnote.io/asmr">https://assetnote.io/asmr</a></p><p><strong>Resources</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/bcrypt/status/1852575080989257893">Okta bcrypt</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ndevtk.github.io/writeups/2024/08/01/awas/">Android Web Attack Surface Writeups</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/concealing-payloads-in-url-credentials">Concealing payloads in URL credentials</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ambionics/status/1853358125283152207">Dumping PHP files with Lightyear</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/php/php-src/issues/10453">Limit maximum number of filter chains</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/dom-explorer-tool-parse-html?utm_source=twitter&amp;utm_medium=social&amp;utm_campaign=dom-explorer-tool">Dom-Explorer tool launched</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/avlidienbrunn/multihtmlparse">MultiHTMLParse</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/tom_doerr/status/1852810041339896314">JSON Crack</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Static-Flow">Caido/Burp notes plugin</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:02:43) Okta Release and bcrypt</p><p>(00:10:26) Android Web Attack Surface Writeups</p><p>(00:20:21) More Portswigger Research</p><p>(00:28:29) Lightyear and PHP filter chains</p><p>(00:35:09) Dom-Explorer</p><p>(00:45:24) The JSON Debate</p><p>(00:49:59) Notes plugin for Burp and Caido</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 97: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel jump into some cool news items, including a recent Okta Bcrypt vulnerability, insights into crypto bugs, and some intricacies of Android and Chrome security. They also explore the latest research from Portswigger on payload concealment techniques, and the introduction of the Lightyear tool for PHP exploits.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker: Check out Network Control!</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-nc">https://www.criticalthinkingpodcast.io/tl-nc</a></p><p>And AssetNote: Check out their ASMR board (no not that kind!)</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://assetnote.io/asmr">https://assetnote.io/asmr</a></p><p><strong>Resources</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/bcrypt/status/1852575080989257893">Okta bcrypt</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ndevtk.github.io/writeups/2024/08/01/awas/">Android Web Attack Surface Writeups</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/concealing-payloads-in-url-credentials">Concealing payloads in URL credentials</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ambionics/status/1853358125283152207">Dumping PHP files with Lightyear</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/php/php-src/issues/10453">Limit maximum number of filter chains</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/dom-explorer-tool-parse-html?utm_source=twitter&amp;utm_medium=social&amp;utm_campaign=dom-explorer-tool">Dom-Explorer tool launched</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/avlidienbrunn/multihtmlparse">MultiHTMLParse</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/tom_doerr/status/1852810041339896314">JSON Crack</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Static-Flow">Caido/Burp notes plugin</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:02:43) Okta Release and bcrypt</p><p>(00:10:26) Android Web Attack Surface Writeups</p><p>(00:20:21) More Portswigger Research</p><p>(00:28:29) Lightyear and PHP filter chains</p><p>(00:35:09) Dom-Explorer</p><p>(00:45:24) The JSON Debate</p><p>(00:49:59) Notes plugin for Burp and Caido</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 97: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel jump into some cool news items, including a recent Okta Bcrypt vulnerability, insights into crypto bugs, and some intricacies of Android and Chrome security. They...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>97</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">226a15c4-7991-4a53-8cf6-374e0c76e917</guid>
  <title><![CDATA[Episode 96: Cookies & Caching with MatanBer]]></title>
  <description><![CDATA[<p>Episode 96: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with Matanber to hit some stuff we ran out of time on last episode. We talk about advanced cookie parsing techniques and exploitation methods, Safari's unique behaviors regarding cookie handling and debugging methods, and some of the writeups from the HeroCTF v6.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MtnBer">https://x.com/MtnBer</a></p><p>Resources:</p><p>Cookie Bugs - Smuggling &amp; Injection</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.ankursundara.com/cookie-bugs/#:~:text=Cookie%20Smuggling">https://blog.ankursundara.com/cookie-bugs/#:~:text=Cookie%20Smuggling</a></p><p>iOS Webkit Debug Proxy</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/google/ios-webkit-debug-proxy">https://github.com/google/ios-webkit-debug-proxy</a></p><p>HeroCTF v6 Writeups</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mizu.re/post/heroctf-v6-writeups">https://mizu.re/post/heroctf-v6-writeups</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:01:29) Cookie exploits</p><p>(00:21:32) Matan's Safari Adventure</p><p>(00:29:49) HeroCTF 6 writeups</p>]]></description>
  <embed_id>cb4576d6-4603-43ee-a2cb-6579a248a031</embed_id>
  <pubDate>Thu, 07 Nov 2024 11:01:34 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="47186473" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/439ef418-59b0-4956-9443-62c1a0f4b318/episode.mp3" />
  <itunes:title><![CDATA[Episode 96: Cookies & Caching with MatanBer]]></itunes:title>
  <itunes:duration>49:09</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 96: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with Matanber to hit some stuff we ran out of time on last episode. We talk about advanced cookie parsing techniques and exploitation methods, Safari's unique behaviors regarding cookie handling and debugging methods, and some of the writeups from the HeroCTF v6.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MtnBer">https://x.com/MtnBer</a></p><p>Resources:</p><p>Cookie Bugs - Smuggling &amp; Injection</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.ankursundara.com/cookie-bugs/#:~:text=Cookie%20Smuggling">https://blog.ankursundara.com/cookie-bugs/#:~:text=Cookie%20Smuggling</a></p><p>iOS Webkit Debug Proxy</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/google/ios-webkit-debug-proxy">https://github.com/google/ios-webkit-debug-proxy</a></p><p>HeroCTF v6 Writeups</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mizu.re/post/heroctf-v6-writeups">https://mizu.re/post/heroctf-v6-writeups</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:01:29) Cookie exploits</p><p>(00:21:32) Matan's Safari Adventure</p><p>(00:29:49) HeroCTF 6 writeups</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 96: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with Matanber to hit some stuff we ran out of time on last episode. We talk about advanced cookie parsing techniques and exploitation methods, Safari's unique behaviors regarding cookie handling and debugging methods, and some of the writeups from the HeroCTF v6.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MtnBer">https://x.com/MtnBer</a></p><p>Resources:</p><p>Cookie Bugs - Smuggling &amp; Injection</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.ankursundara.com/cookie-bugs/#:~:text=Cookie%20Smuggling">https://blog.ankursundara.com/cookie-bugs/#:~:text=Cookie%20Smuggling</a></p><p>iOS Webkit Debug Proxy</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/google/ios-webkit-debug-proxy">https://github.com/google/ios-webkit-debug-proxy</a></p><p>HeroCTF v6 Writeups</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mizu.re/post/heroctf-v6-writeups">https://mizu.re/post/heroctf-v6-writeups</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:01:29) Cookie exploits</p><p>(00:21:32) Matan's Safari Adventure</p><p>(00:29:49) HeroCTF 6 writeups</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 96: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with Matanber to hit some stuff we ran out of time on last episode. We talk about advanced cookie parsing techniques and exploitation methods, Safari's unique behavior...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>96</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">4ffac734-6403-4634-9567-6d1044f12b69</guid>
  <title><![CDATA[Episode 95: Attacking Chrome Extensions with MatanBer - Big Impact on the Client-Side]]></title>
  <description><![CDATA[<p>Episode 95: In this episode of Critical Thinking - Bug Bounty Podcast In this episode, Justin is joined by MatanBer to delve into the intricacies of browser extensions. We talk about the structure and threat models, and cover things like service workers, extension pages, and isolated worlds.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - AssetNote. Listen to their podcast <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/sspod">https://www.criticalthinkingpodcast.io/sspod</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MtnBer">https://x.com/MtnBer</a></p><p><strong>Resources</strong></p><p>Universal Code Execution by Chaining Messages in Browser Extensions</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://spaceraccoon.dev/universal-code-execution-browser-extensions/">https://spaceraccoon.dev/universal-code-execution-browser-extensions/</a></p><p>DOMLogger++</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/kevin-mizu/domloggerpp">https://github.com/kevin-mizu/domloggerpp</a></p><p>BBRE Metamask bug</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/HnI0w156rtw?si=QixP8SX6JuRFz6PA">https://youtu.be/HnI0w156rtw?si=QixP8SX6JuRFz6PA</a></p><p>Bench Press: Leaking Text Nodes with CSS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.pspaul.de/posts/bench-press-leaking-text-nodes-with-css/">https://blog.pspaul.de/posts/bench-press-leaking-text-nodes-with-css/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:08) Structure &amp; Threat Model for Browser Extension</p><p>(00:28:28) Extension Attack scenarios</p><p>(01:01:26) Attacking Extension Pages</p><p>(01:26:35) Attacking Service Workers</p><p>(01:46:23) Getting source code and dynamic debugging</p>]]></description>
  <embed_id>9a20517e-2b0c-4242-a350-af1dd6e1cef7</embed_id>
  <pubDate>Thu, 31 Oct 2024 10:01:55 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="111730245" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/52eff438-b768-48a7-bf38-91b300f1f25d/episode.mp3" />
  <itunes:title><![CDATA[Episode 95: Attacking Chrome Extensions with MatanBer - Big Impact on the Client-Side]]></itunes:title>
  <itunes:duration>1:56:23</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 95: In this episode of Critical Thinking - Bug Bounty Podcast In this episode, Justin is joined by MatanBer to delve into the intricacies of browser extensions. We talk about the structure and threat models, and cover things like service workers, extension pages, and isolated worlds.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - AssetNote. Listen to their podcast <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/sspod">https://www.criticalthinkingpodcast.io/sspod</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MtnBer">https://x.com/MtnBer</a></p><p><strong>Resources</strong></p><p>Universal Code Execution by Chaining Messages in Browser Extensions</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://spaceraccoon.dev/universal-code-execution-browser-extensions/">https://spaceraccoon.dev/universal-code-execution-browser-extensions/</a></p><p>DOMLogger++</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/kevin-mizu/domloggerpp">https://github.com/kevin-mizu/domloggerpp</a></p><p>BBRE Metamask bug</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/HnI0w156rtw?si=QixP8SX6JuRFz6PA">https://youtu.be/HnI0w156rtw?si=QixP8SX6JuRFz6PA</a></p><p>Bench Press: Leaking Text Nodes with CSS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.pspaul.de/posts/bench-press-leaking-text-nodes-with-css/">https://blog.pspaul.de/posts/bench-press-leaking-text-nodes-with-css/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:08) Structure &amp; Threat Model for Browser Extension</p><p>(00:28:28) Extension Attack scenarios</p><p>(01:01:26) Attacking Extension Pages</p><p>(01:26:35) Attacking Service Workers</p><p>(01:46:23) Getting source code and dynamic debugging</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 95: In this episode of Critical Thinking - Bug Bounty Podcast In this episode, Justin is joined by MatanBer to delve into the intricacies of browser extensions. We talk about the structure and threat models, and cover things like service workers, extension pages, and isolated worlds.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - AssetNote. Listen to their podcast <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/sspod">https://www.criticalthinkingpodcast.io/sspod</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MtnBer">https://x.com/MtnBer</a></p><p><strong>Resources</strong></p><p>Universal Code Execution by Chaining Messages in Browser Extensions</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://spaceraccoon.dev/universal-code-execution-browser-extensions/">https://spaceraccoon.dev/universal-code-execution-browser-extensions/</a></p><p>DOMLogger++</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/kevin-mizu/domloggerpp">https://github.com/kevin-mizu/domloggerpp</a></p><p>BBRE Metamask bug</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/HnI0w156rtw?si=QixP8SX6JuRFz6PA">https://youtu.be/HnI0w156rtw?si=QixP8SX6JuRFz6PA</a></p><p>Bench Press: Leaking Text Nodes with CSS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.pspaul.de/posts/bench-press-leaking-text-nodes-with-css/">https://blog.pspaul.de/posts/bench-press-leaking-text-nodes-with-css/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:08) Structure &amp; Threat Model for Browser Extension</p><p>(00:28:28) Extension Attack scenarios</p><p>(01:01:26) Attacking Extension Pages</p><p>(01:26:35) Attacking Service Workers</p><p>(01:46:23) Getting source code and dynamic debugging</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 95: In this episode of Critical Thinking - Bug Bounty Podcast In this episode, Justin is joined by MatanBer to delve into the intricacies of browser extensions. We talk about the structure and threat models, and cover things like service wo...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>95</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">80246c85-5f6b-417f-bc2b-a9f45d18b779</guid>
  <title><![CDATA[Episode 94: Zendesk Fiasco & the CTBB Naughty List]]></title>
  <description><![CDATA[<p>Episode 94: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel give their perspectives on the recent Zendesk fiasco and the ethical considerations surrounding it. They also highlight the launch of AuthzAI and some research from Ophion Security</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - AssetNote. Listen to their podcast <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/sspod">https://www.criticalthinkingpodcast.io/sspod</a></p><p>Resources:</p><p>New music drop from our Boi YT</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker/status/1847599657569956099">https://x.com/realytcracker/status/1847599657569956099</a></p><p>AuthzAI</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://authzai.com/">https://authzai.com/</a> </p><p>Ron Chan</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ngalongc">https://x.com/ngalongc</a></p><p>Misconfigured User Auth Leads to Customer Messages</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.ophionsecurity.com/post/live-chat-blog-1-misconfigured-user-auth-leads-to-customer-messages">https://www.ophionsecurity.com/post/live-chat-blog-1-misconfigured-user-auth-leads-to-customer-messages</a></p><p>Zendesk Write-up</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52">https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52</a></p><p>Response from Zendesk</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52?permalink_comment_id=5232589#gistcomment-5232589">https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52?permalink_comment_id=5232589#gistcomment-5232589</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:05:29) AuthzAI and the return of Ron Chan</p><p>(00:13:50) Ophion Security Research</p><p>(00:18:12) Zendesk Drama</p>]]></description>
  <embed_id>398e2026-fbb4-479a-9ea4-577843fe1db8</embed_id>
  <pubDate>Thu, 24 Oct 2024 11:00:14 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="47506211" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/223a6ea4-f791-4e15-9cd9-c8f3a5f06ce9/episode.mp3" />
  <itunes:title><![CDATA[Episode 94: Zendesk Fiasco & the CTBB Naughty List]]></itunes:title>
  <itunes:duration>49:29</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 94: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel give their perspectives on the recent Zendesk fiasco and the ethical considerations surrounding it. They also highlight the launch of AuthzAI and some research from Ophion Security</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - AssetNote. Listen to their podcast <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/sspod">https://www.criticalthinkingpodcast.io/sspod</a></p><p>Resources:</p><p>New music drop from our Boi YT</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker/status/1847599657569956099">https://x.com/realytcracker/status/1847599657569956099</a></p><p>AuthzAI</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://authzai.com/">https://authzai.com/</a> </p><p>Ron Chan</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ngalongc">https://x.com/ngalongc</a></p><p>Misconfigured User Auth Leads to Customer Messages</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.ophionsecurity.com/post/live-chat-blog-1-misconfigured-user-auth-leads-to-customer-messages">https://www.ophionsecurity.com/post/live-chat-blog-1-misconfigured-user-auth-leads-to-customer-messages</a></p><p>Zendesk Write-up</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52">https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52</a></p><p>Response from Zendesk</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52?permalink_comment_id=5232589#gistcomment-5232589">https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52?permalink_comment_id=5232589#gistcomment-5232589</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:05:29) AuthzAI and the return of Ron Chan</p><p>(00:13:50) Ophion Security Research</p><p>(00:18:12) Zendesk Drama</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 94: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel give their perspectives on the recent Zendesk fiasco and the ethical considerations surrounding it. They also highlight the launch of AuthzAI and some research from Ophion Security</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - AssetNote. Listen to their podcast <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/sspod">https://www.criticalthinkingpodcast.io/sspod</a></p><p>Resources:</p><p>New music drop from our Boi YT</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/realytcracker/status/1847599657569956099">https://x.com/realytcracker/status/1847599657569956099</a></p><p>AuthzAI</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://authzai.com/">https://authzai.com/</a> </p><p>Ron Chan</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ngalongc">https://x.com/ngalongc</a></p><p>Misconfigured User Auth Leads to Customer Messages</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.ophionsecurity.com/post/live-chat-blog-1-misconfigured-user-auth-leads-to-customer-messages">https://www.ophionsecurity.com/post/live-chat-blog-1-misconfigured-user-auth-leads-to-customer-messages</a></p><p>Zendesk Write-up</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52">https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52</a></p><p>Response from Zendesk</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52?permalink_comment_id=5232589#gistcomment-5232589">https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52?permalink_comment_id=5232589#gistcomment-5232589</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:05:29) AuthzAI and the return of Ron Chan</p><p>(00:13:50) Ophion Security Research</p><p>(00:18:12) Zendesk Drama</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 94: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel give their perspectives on the recent Zendesk fiasco and the ethical considerations surrounding it. They also highlight the launch of AuthzAI and some research fr...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>94</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">8bd546c2-7d0b-44e8-adba-dc732b1bbf37</guid>
  <title><![CDATA[Episode 93: A Chat with Dr. Bouman - Life as a Hacker and a Doctor]]></title>
  <description><![CDATA[<p>Episode 93: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Dr. Jonathan Bouman to discuss his unique journey as both a Hacker and a Healthcare Professional. We talk through how he balances his dual careers, some ethical considerations of hacking in the context of healthcare, and highlight some experiences he’s had with Amazon's bug bounty program.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker. Checkout their ThreatLocker Detect! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect">https://www.criticalthinkingpodcast.io/tl-detect</a></p><p>Today’s Guest - <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/jonathanbouman?lang=en">https://x.com/jonathanbouman?lang=en</a></p><p><strong>Resources</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github">Anyone can Access Deleted and Private Repository Data on GitHub</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/filesender/filesender/blob/development/templates/exception.php">Filesender Github</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@jonathanbouman/remote-code-execution-at-ws1-aholdusa-com-compromising-logins-of-ahold-delhaize-usa-employees-c7c9aca7e05d">Remote Code execution at ws1.aholdusa .com</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/niklashigi/apk-mitm">APK-MITM</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@jonathanbouman/bricks-huisarts-v2-3-12-94166-vulnerable-to-executable-uploads-in-e-consultation-send-by-patients-631f6152cf8e">Hacking Dutch healthcare system</a></p><p>Fitness Youtube Channels</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/channel/UCpQ34afVgk8cRQBjSJ1xuJQ">https://www.youtube.com/channel/UCpQ34afVgk8cRQBjSJ1xuJQ</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/@BullyJuice">https://www.youtube.com/@BullyJuice</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:07:28) Medicine and Hacking</p><p>(00:19:36) Hacking on Amazon</p><p>(00:34:33) Collaboration and consistency </p><p>(00:44:13) SSTI Methodology</p><p>(01:06:10) iOS Hacking Methodology</p><p>(01:13:23) Hacking Healthcare</p><p>(01:32:19) Health tips for hacking</p>]]></description>
  <embed_id>6a98c9cc-6813-47f5-b8a8-3afb13c5a033</embed_id>
  <pubDate>Thu, 17 Oct 2024 11:01:03 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="97426007" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/f00d1041-e01f-4e04-9ef7-9ed12ffd8712/episode.mp3" />
  <itunes:title><![CDATA[Episode 93: A Chat with Dr. Bouman - Life as a Hacker and a Doctor]]></itunes:title>
  <itunes:duration>1:41:29</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 93: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Dr. Jonathan Bouman to discuss his unique journey as both a Hacker and a Healthcare Professional. We talk through how he balances his dual careers, some ethical considerations of hacking in the context of healthcare, and highlight some experiences he’s had with Amazon's bug bounty program.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker. Checkout their ThreatLocker Detect! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect">https://www.criticalthinkingpodcast.io/tl-detect</a></p><p>Today’s Guest - <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/jonathanbouman?lang=en">https://x.com/jonathanbouman?lang=en</a></p><p><strong>Resources</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github">Anyone can Access Deleted and Private Repository Data on GitHub</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/filesender/filesender/blob/development/templates/exception.php">Filesender Github</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@jonathanbouman/remote-code-execution-at-ws1-aholdusa-com-compromising-logins-of-ahold-delhaize-usa-employees-c7c9aca7e05d">Remote Code execution at ws1.aholdusa .com</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/niklashigi/apk-mitm">APK-MITM</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@jonathanbouman/bricks-huisarts-v2-3-12-94166-vulnerable-to-executable-uploads-in-e-consultation-send-by-patients-631f6152cf8e">Hacking Dutch healthcare system</a></p><p>Fitness Youtube Channels</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/channel/UCpQ34afVgk8cRQBjSJ1xuJQ">https://www.youtube.com/channel/UCpQ34afVgk8cRQBjSJ1xuJQ</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/@BullyJuice">https://www.youtube.com/@BullyJuice</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:07:28) Medicine and Hacking</p><p>(00:19:36) Hacking on Amazon</p><p>(00:34:33) Collaboration and consistency </p><p>(00:44:13) SSTI Methodology</p><p>(01:06:10) iOS Hacking Methodology</p><p>(01:13:23) Hacking Healthcare</p><p>(01:32:19) Health tips for hacking</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 93: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Dr. Jonathan Bouman to discuss his unique journey as both a Hacker and a Healthcare Professional. We talk through how he balances his dual careers, some ethical considerations of hacking in the context of healthcare, and highlight some experiences he’s had with Amazon's bug bounty program.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker. Checkout their ThreatLocker Detect! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect">https://www.criticalthinkingpodcast.io/tl-detect</a></p><p>Today’s Guest - <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/jonathanbouman?lang=en">https://x.com/jonathanbouman?lang=en</a></p><p><strong>Resources</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github">Anyone can Access Deleted and Private Repository Data on GitHub</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/filesender/filesender/blob/development/templates/exception.php">Filesender Github</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@jonathanbouman/remote-code-execution-at-ws1-aholdusa-com-compromising-logins-of-ahold-delhaize-usa-employees-c7c9aca7e05d">Remote Code execution at ws1.aholdusa .com</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/niklashigi/apk-mitm">APK-MITM</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@jonathanbouman/bricks-huisarts-v2-3-12-94166-vulnerable-to-executable-uploads-in-e-consultation-send-by-patients-631f6152cf8e">Hacking Dutch healthcare system</a></p><p>Fitness Youtube Channels</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/channel/UCpQ34afVgk8cRQBjSJ1xuJQ">https://www.youtube.com/channel/UCpQ34afVgk8cRQBjSJ1xuJQ</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/@BullyJuice">https://www.youtube.com/@BullyJuice</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:07:28) Medicine and Hacking</p><p>(00:19:36) Hacking on Amazon</p><p>(00:34:33) Collaboration and consistency </p><p>(00:44:13) SSTI Methodology</p><p>(01:06:10) iOS Hacking Methodology</p><p>(01:13:23) Hacking Healthcare</p><p>(01:32:19) Health tips for hacking</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 93: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Dr. Jonathan Bouman to discuss his unique journey as both a Hacker and a Healthcare Professional. We talk through how he balances his dual careers, some ethical c...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>93</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">2c77cde6-6460-4e36-b839-79d0be4b66bb</guid>
  <title><![CDATA[Episode 92 - SAML XPath Confusion, Chinese DNS Poisoning, and AI Powered 403 Bypasser]]></title>
  <description><![CDATA[<p>Episode 92: In this episode of Critical Thinking - Bug Bounty Podcast In this episode Justin and Joel tackle a host of new research and write-ups, including Ruby SAML, 0-Click exploits in MediaTek Wi-Fi, and Vulnerabilities caused by The Great Firewall</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker. Checkout their ThreatLocker Detect! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect">https://www.criticalthinkingpodcast.io/tl-detect</a></p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.assetnote.io/resources/research/insecurity-through-censorship-vulnerabilities-caused-by-the-great-firewall">Insecurity through Censorship</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass/">Ruby-SAML / GitLab Authentication Bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/androidmalware2/status/1838122094963356031">0-Click exploit discovered in MediaTek Wi-Fi chipsets</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Tur24Tur/status/1842268554193760485">New Caido Plugin to Generate Wordlists</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/bebiksior/Caido403Bypasser">Bebik’s 403 Bypassor</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://cspbypass.com/">CSPBypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/OJs1-zm0AqU?feature=shared">Arb Read &amp; Arb write on LLaMa.cpp by SideQuest</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://onetest.fr/posts/xss-waf-bypass-one-payload-for-all/">XSS WAF Bypass One payload for all</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:02:08) Vulnerabilities Caused by The Great Firewall</p><p>(00:07:25) Ruby SAML Bypass</p><p>(00:19:55) 0-Click exploit discovered in MediaTek Wi-Fi chipsets</p><p>(00:24:36) New Caido Wordlist Plugin</p><p>(00:31:00) <a target="_blank" rel="noopener noreferrer nofollow" href="http://CSPBypass.com">CSPBypass.com</a></p><p>(00:35:37) Arb Read &amp; Arb write on LLaMa.cpp by SideQuest</p><p>(00:43:10) Helpful WAF Bypass</p>]]></description>
  <embed_id>c5f49e28-712b-4428-8e8e-7e09aa77c0a4</embed_id>
  <pubDate>Thu, 10 Oct 2024 10:01:29 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="45730721" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/346e52f2-2d2d-434c-a62a-a191a0c0acd9/episode.mp3" />
  <itunes:title><![CDATA[Episode 92 - SAML XPath Confusion, Chinese DNS Poisoning, and AI Powered 403 Bypasser]]></itunes:title>
  <itunes:duration>47:38</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 92: In this episode of Critical Thinking - Bug Bounty Podcast In this episode Justin and Joel tackle a host of new research and write-ups, including Ruby SAML, 0-Click exploits in MediaTek Wi-Fi, and Vulnerabilities caused by The Great Firewall</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker. Checkout their ThreatLocker Detect! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect">https://www.criticalthinkingpodcast.io/tl-detect</a></p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.assetnote.io/resources/research/insecurity-through-censorship-vulnerabilities-caused-by-the-great-firewall">Insecurity through Censorship</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass/">Ruby-SAML / GitLab Authentication Bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/androidmalware2/status/1838122094963356031">0-Click exploit discovered in MediaTek Wi-Fi chipsets</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Tur24Tur/status/1842268554193760485">New Caido Plugin to Generate Wordlists</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/bebiksior/Caido403Bypasser">Bebik’s 403 Bypassor</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://cspbypass.com/">CSPBypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/OJs1-zm0AqU?feature=shared">Arb Read &amp; Arb write on LLaMa.cpp by SideQuest</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://onetest.fr/posts/xss-waf-bypass-one-payload-for-all/">XSS WAF Bypass One payload for all</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:02:08) Vulnerabilities Caused by The Great Firewall</p><p>(00:07:25) Ruby SAML Bypass</p><p>(00:19:55) 0-Click exploit discovered in MediaTek Wi-Fi chipsets</p><p>(00:24:36) New Caido Wordlist Plugin</p><p>(00:31:00) <a target="_blank" rel="noopener noreferrer nofollow" href="http://CSPBypass.com">CSPBypass.com</a></p><p>(00:35:37) Arb Read &amp; Arb write on LLaMa.cpp by SideQuest</p><p>(00:43:10) Helpful WAF Bypass</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 92: In this episode of Critical Thinking - Bug Bounty Podcast In this episode Justin and Joel tackle a host of new research and write-ups, including Ruby SAML, 0-Click exploits in MediaTek Wi-Fi, and Vulnerabilities caused by The Great Firewall</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor - ThreatLocker. Checkout their ThreatLocker Detect! <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tl-detect">https://www.criticalthinkingpodcast.io/tl-detect</a></p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.assetnote.io/resources/research/insecurity-through-censorship-vulnerabilities-caused-by-the-great-firewall">Insecurity through Censorship</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass/">Ruby-SAML / GitLab Authentication Bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/androidmalware2/status/1838122094963356031">0-Click exploit discovered in MediaTek Wi-Fi chipsets</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Tur24Tur/status/1842268554193760485">New Caido Plugin to Generate Wordlists</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/bebiksior/Caido403Bypasser">Bebik’s 403 Bypassor</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://cspbypass.com/">CSPBypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/OJs1-zm0AqU?feature=shared">Arb Read &amp; Arb write on LLaMa.cpp by SideQuest</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://onetest.fr/posts/xss-waf-bypass-one-payload-for-all/">XSS WAF Bypass One payload for all</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:02:08) Vulnerabilities Caused by The Great Firewall</p><p>(00:07:25) Ruby SAML Bypass</p><p>(00:19:55) 0-Click exploit discovered in MediaTek Wi-Fi chipsets</p><p>(00:24:36) New Caido Wordlist Plugin</p><p>(00:31:00) <a target="_blank" rel="noopener noreferrer nofollow" href="http://CSPBypass.com">CSPBypass.com</a></p><p>(00:35:37) Arb Read &amp; Arb write on LLaMa.cpp by SideQuest</p><p>(00:43:10) Helpful WAF Bypass</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 92: In this episode of Critical Thinking - Bug Bounty Podcast In this episode Justin and Joel tackle a host of new research and write-ups, including Ruby SAML, 0-Click exploits in MediaTek Wi-Fi, and Vulnerabilities caused by The Great Fire...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>92</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">60bd3cc3-0677-4d5a-a57e-cb8fdad458a5</guid>
  <title><![CDATA[Episode 91: Zero to LHE in 9 Months (feat gr3pme)]]></title>
  <description><![CDATA[<p>Episode 91: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner sits down with Critical Thinking’s own HackerNotes writer Brandyn Murtagh (gr3pme) to talk about his journey with Bug Bounty. We cover mentorship, networking and LHEs, ecosystem hacking, emotional regulation, and the need for self-care. Then we wrap up with some fun bugs.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at<a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag"> ctbb.show/swag</a></p><p>Today’s Sponsor: Project Discovery - tldfinder: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tldfinder">https://www.criticalthinkingpodcast.io/tldfinder</a></p><p>Today’s guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>Resources:</p><p>Lessons Learned for LHEs</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater/status/1579499221954473984">https://x.com/Rhynorater/status/1579499221954473984</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:07:02) Mentorship in Bug Bounty</p><p>(00:16:30) LHE lessons, takeaways, and the benefit of feedback and networking</p><p>(00:41:28) Choosing Targets</p><p>(00:49:03) Vuln Classes</p><p>(00:58:54) Bug Reports</p>]]></description>
  <embed_id>55b9b7e7-eece-4663-9d33-3b805e920bec</embed_id>
  <pubDate>Thu, 03 Oct 2024 10:00:50 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="79529835" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/a1d0a676-8c5d-4afb-b729-cff2789a67fb/episode.mp3" />
  <itunes:title><![CDATA[Episode 91: Zero to LHE in 9 Months (feat gr3pme)]]></itunes:title>
  <itunes:duration>1:22:50</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 91: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner sits down with Critical Thinking’s own HackerNotes writer Brandyn Murtagh (gr3pme) to talk about his journey with Bug Bounty. We cover mentorship, networking and LHEs, ecosystem hacking, emotional regulation, and the need for self-care. Then we wrap up with some fun bugs.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at<a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag"> ctbb.show/swag</a></p><p>Today’s Sponsor: Project Discovery - tldfinder: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tldfinder">https://www.criticalthinkingpodcast.io/tldfinder</a></p><p>Today’s guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>Resources:</p><p>Lessons Learned for LHEs</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater/status/1579499221954473984">https://x.com/Rhynorater/status/1579499221954473984</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:07:02) Mentorship in Bug Bounty</p><p>(00:16:30) LHE lessons, takeaways, and the benefit of feedback and networking</p><p>(00:41:28) Choosing Targets</p><p>(00:49:03) Vuln Classes</p><p>(00:58:54) Bug Reports</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 91: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner sits down with Critical Thinking’s own HackerNotes writer Brandyn Murtagh (gr3pme) to talk about his journey with Bug Bounty. We cover mentorship, networking and LHEs, ecosystem hacking, emotional regulation, and the need for self-care. Then we wrap up with some fun bugs.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at<a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag"> ctbb.show/swag</a></p><p>Today’s Sponsor: Project Discovery - tldfinder: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tldfinder">https://www.criticalthinkingpodcast.io/tldfinder</a></p><p>Today’s guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>Resources:</p><p>Lessons Learned for LHEs</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater/status/1579499221954473984">https://x.com/Rhynorater/status/1579499221954473984</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:07:02) Mentorship in Bug Bounty</p><p>(00:16:30) LHE lessons, takeaways, and the benefit of feedback and networking</p><p>(00:41:28) Choosing Targets</p><p>(00:49:03) Vuln Classes</p><p>(00:58:54) Bug Reports</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 91: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner sits down with Critical Thinking’s own HackerNotes writer Brandyn Murtagh (gr3pme) to talk about his journey with Bug Bounty. We cover mentorship, networking and L...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>91</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">23ff3604-95cc-4ebd-91cb-a8287c4bf2da</guid>
  <title><![CDATA[Episode 90: 5k Clickjacking, Encryption Oracles, and Cursor for PoCs]]></title>
  <description><![CDATA[<p>Episode 90: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin recap some of their recent hacking ups and downs and have a lively chat about Cursor. Then they cover some some research about SQL Injections, Clickjacking in Google Docs, and how to steal your Telegram account in 10 seconds.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at<a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag"> ctbb.show/swag</a></p><p>Today’s Sponsor: Project Discovery - tldfinder: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tldfinder">https://www.criticalthinkingpodcast.io/tldfinder</a></p><p>Resources:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://summoning.team/blog/progress-whatsup-gold-sqli-cve-2024-6670/">Breaking Down Barriers: Exploiting Pre-Auth SQL Injection in WhatsUp Gold</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/BlackFan/content-type-research/blob/master/XSS.md#content-type-that-can-be-used-for-xss">Content-Type that can be used for XSS</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rebane2001/status/1836653696639271329?t=qK4Z6rT_bOjbG3FjdC7VtQ&amp;s=19">Clickjacking Bug in Google Docs</a></p><p>Justin's Gadget Link</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/signin?next=https%3A%2F%2Faccounts.youtube.com%2Faccounts%2FSetSID%3Fcontinue%3Dhttps%3A%2F%2Fwww.google.com%252Famp%252fpoc.rhynorater.com">https://www.youtube.com/signin?next=https%3A%2F%2Faccounts.youtube.com%2Faccounts%2FSetSID%3Fcontinue%3Dhttps%3A%2F%2Fwww.google.com%252Famp%252fpoc.rhynorater.com</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lyra.horse/blog/2024/05/stealing-your-telegram-account-in-10-seconds-flat/">Stealing your Telegram account in 10 seconds flat</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:08:28) Recent Hacks and Dupes</p><p>(00:14:00) Cursor</p><p>(00:25:02) Exploiting Pre-Auth SQL Injection in WhatsUp Gold</p><p>(00:34:17) Content-Type that can be used for XSS</p><p>(00:40:25) Caido updates</p><p>(00:43:14) Clickjacking in Google Docs, and Stealing Telegram account</p>]]></description>
  <embed_id>80883245-95a6-438c-97d3-7c2af04ba8da</embed_id>
  <pubDate>Thu, 26 Sep 2024 10:01:34 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="49634460" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/22f40989-3d80-42db-9cfe-04ea7687e978/episode.mp3" />
  <itunes:title><![CDATA[Episode 90: 5k Clickjacking, Encryption Oracles, and Cursor for PoCs]]></itunes:title>
  <itunes:duration>51:42</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 90: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin recap some of their recent hacking ups and downs and have a lively chat about Cursor. Then they cover some some research about SQL Injections, Clickjacking in Google Docs, and how to steal your Telegram account in 10 seconds.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at<a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag"> ctbb.show/swag</a></p><p>Today’s Sponsor: Project Discovery - tldfinder: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tldfinder">https://www.criticalthinkingpodcast.io/tldfinder</a></p><p>Resources:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://summoning.team/blog/progress-whatsup-gold-sqli-cve-2024-6670/">Breaking Down Barriers: Exploiting Pre-Auth SQL Injection in WhatsUp Gold</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/BlackFan/content-type-research/blob/master/XSS.md#content-type-that-can-be-used-for-xss">Content-Type that can be used for XSS</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rebane2001/status/1836653696639271329?t=qK4Z6rT_bOjbG3FjdC7VtQ&amp;s=19">Clickjacking Bug in Google Docs</a></p><p>Justin's Gadget Link</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/signin?next=https%3A%2F%2Faccounts.youtube.com%2Faccounts%2FSetSID%3Fcontinue%3Dhttps%3A%2F%2Fwww.google.com%252Famp%252fpoc.rhynorater.com">https://www.youtube.com/signin?next=https%3A%2F%2Faccounts.youtube.com%2Faccounts%2FSetSID%3Fcontinue%3Dhttps%3A%2F%2Fwww.google.com%252Famp%252fpoc.rhynorater.com</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lyra.horse/blog/2024/05/stealing-your-telegram-account-in-10-seconds-flat/">Stealing your Telegram account in 10 seconds flat</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:08:28) Recent Hacks and Dupes</p><p>(00:14:00) Cursor</p><p>(00:25:02) Exploiting Pre-Auth SQL Injection in WhatsUp Gold</p><p>(00:34:17) Content-Type that can be used for XSS</p><p>(00:40:25) Caido updates</p><p>(00:43:14) Clickjacking in Google Docs, and Stealing Telegram account</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 90: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin recap some of their recent hacking ups and downs and have a lively chat about Cursor. Then they cover some some research about SQL Injections, Clickjacking in Google Docs, and how to steal your Telegram account in 10 seconds.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at<a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag"> ctbb.show/swag</a></p><p>Today’s Sponsor: Project Discovery - tldfinder: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tldfinder">https://www.criticalthinkingpodcast.io/tldfinder</a></p><p>Resources:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://summoning.team/blog/progress-whatsup-gold-sqli-cve-2024-6670/">Breaking Down Barriers: Exploiting Pre-Auth SQL Injection in WhatsUp Gold</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/BlackFan/content-type-research/blob/master/XSS.md#content-type-that-can-be-used-for-xss">Content-Type that can be used for XSS</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rebane2001/status/1836653696639271329?t=qK4Z6rT_bOjbG3FjdC7VtQ&amp;s=19">Clickjacking Bug in Google Docs</a></p><p>Justin's Gadget Link</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/signin?next=https%3A%2F%2Faccounts.youtube.com%2Faccounts%2FSetSID%3Fcontinue%3Dhttps%3A%2F%2Fwww.google.com%252Famp%252fpoc.rhynorater.com">https://www.youtube.com/signin?next=https%3A%2F%2Faccounts.youtube.com%2Faccounts%2FSetSID%3Fcontinue%3Dhttps%3A%2F%2Fwww.google.com%252Famp%252fpoc.rhynorater.com</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lyra.horse/blog/2024/05/stealing-your-telegram-account-in-10-seconds-flat/">Stealing your Telegram account in 10 seconds flat</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:08:28) Recent Hacks and Dupes</p><p>(00:14:00) Cursor</p><p>(00:25:02) Exploiting Pre-Auth SQL Injection in WhatsUp Gold</p><p>(00:34:17) Content-Type that can be used for XSS</p><p>(00:40:25) Caido updates</p><p>(00:43:14) Clickjacking in Google Docs, and Stealing Telegram account</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 90: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin recap some of their recent hacking ups and downs and have a lively chat about Cursor. Then they cover some some research about SQL Injections, Clickjacking in Goo...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>90</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">a92e055f-dcde-4b20-9ac3-a2cdbc4fd276</guid>
  <title><![CDATA[Episode 89: The Untapped Bug Bounty Landscape of IoT w/ Matt Brown]]></title>
  <description><![CDATA[<p>Episode 89: In this episode of Critical Thinking - Bug Bounty Podcast We’re joined live by Matt Brown to talk about his journey with hacking in the IoT. We cover the specializations and challenges in hardware hacking, and Matt’s personal Methodology. Then we switch over to touch on BGA Reballing, Certificate Pinning and Validation, and some of his own bug stories.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor: Project Discovery - tldfinder: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tldfinder">https://www.criticalthinkingpodcast.io/tldfinder</a></p><p>Today’s Guess Matt Brown: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nmatt0">https://x.com/nmatt0</a></p><p>Resources:</p><p>Decrypting SSL to Chinese Cloud Servers</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=3qSxxNvuEtg">https://www.youtube.com/watch?v=3qSxxNvuEtg</a></p><p>mitmrouter</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/nmatt0/mitmrouter">https://github.com/nmatt0/mitmrouter</a></p><p>certmitm Automatic Exploitation of TLS Certificate Validation Vulns</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=w_l2q_Gyqfo">https://www.youtube.com/watch?v=w_l2q_Gyqfo</a></p><p>and</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Aapo%20Oksman%20-%20certmitm%20automatic%20exploitation%20of%20TLS%20certificate%20validation%20vulnerabilities.pdf">https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Aapo%20Oksman%20-%20certmitm%20automatic%20exploitation%20of%20TLS%20certificate%20validation%20vulnerabilities.pdf</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/aapooksman/certmitm">https://github.com/aapooksman/certmitm</a></p><p>HackerOne Detailed Platform Standards</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.hackerone.com/en/articles/8369826-detailed-platform-standards">https://docs.hackerone.com/en/articles/8369826-detailed-platform-standards</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:13:33) Specialization and Challenges of IOT Hacking</p><p>(00:33:03) Decrypting SSL to Chinese Cloud Servers</p><p>(00:47:00) General IoT Hacking Methodology</p><p>(01:26:00) Certificate Pinning and Certificate Validation</p><p>(01:34:35) BGA Reballing</p><p>(01:43:26) Bug Stories</p>]]></description>
  <embed_id>6b1e8a32-9d00-40f8-bb64-8073ff644293</embed_id>
  <pubDate>Thu, 19 Sep 2024 10:00:28 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="113329769" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/61ae2a8b-bb1b-4e40-8841-28ea5be30003/episode.mp3" />
  <itunes:title><![CDATA[Episode 89: The Untapped Bug Bounty Landscape of IoT w/ Matt Brown]]></itunes:title>
  <itunes:duration>1:58:03</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 89: In this episode of Critical Thinking - Bug Bounty Podcast We’re joined live by Matt Brown to talk about his journey with hacking in the IoT. We cover the specializations and challenges in hardware hacking, and Matt’s personal Methodology. Then we switch over to touch on BGA Reballing, Certificate Pinning and Validation, and some of his own bug stories.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor: Project Discovery - tldfinder: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tldfinder">https://www.criticalthinkingpodcast.io/tldfinder</a></p><p>Today’s Guess Matt Brown: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nmatt0">https://x.com/nmatt0</a></p><p>Resources:</p><p>Decrypting SSL to Chinese Cloud Servers</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=3qSxxNvuEtg">https://www.youtube.com/watch?v=3qSxxNvuEtg</a></p><p>mitmrouter</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/nmatt0/mitmrouter">https://github.com/nmatt0/mitmrouter</a></p><p>certmitm Automatic Exploitation of TLS Certificate Validation Vulns</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=w_l2q_Gyqfo">https://www.youtube.com/watch?v=w_l2q_Gyqfo</a></p><p>and</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Aapo%20Oksman%20-%20certmitm%20automatic%20exploitation%20of%20TLS%20certificate%20validation%20vulnerabilities.pdf">https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Aapo%20Oksman%20-%20certmitm%20automatic%20exploitation%20of%20TLS%20certificate%20validation%20vulnerabilities.pdf</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/aapooksman/certmitm">https://github.com/aapooksman/certmitm</a></p><p>HackerOne Detailed Platform Standards</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.hackerone.com/en/articles/8369826-detailed-platform-standards">https://docs.hackerone.com/en/articles/8369826-detailed-platform-standards</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:13:33) Specialization and Challenges of IOT Hacking</p><p>(00:33:03) Decrypting SSL to Chinese Cloud Servers</p><p>(00:47:00) General IoT Hacking Methodology</p><p>(01:26:00) Certificate Pinning and Certificate Validation</p><p>(01:34:35) BGA Reballing</p><p>(01:43:26) Bug Stories</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 89: In this episode of Critical Thinking - Bug Bounty Podcast We’re joined live by Matt Brown to talk about his journey with hacking in the IoT. We cover the specializations and challenges in hardware hacking, and Matt’s personal Methodology. Then we switch over to touch on BGA Reballing, Certificate Pinning and Validation, and some of his own bug stories.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Sponsor: Project Discovery - tldfinder: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/tldfinder">https://www.criticalthinkingpodcast.io/tldfinder</a></p><p>Today’s Guess Matt Brown: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nmatt0">https://x.com/nmatt0</a></p><p>Resources:</p><p>Decrypting SSL to Chinese Cloud Servers</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=3qSxxNvuEtg">https://www.youtube.com/watch?v=3qSxxNvuEtg</a></p><p>mitmrouter</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/nmatt0/mitmrouter">https://github.com/nmatt0/mitmrouter</a></p><p>certmitm Automatic Exploitation of TLS Certificate Validation Vulns</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=w_l2q_Gyqfo">https://www.youtube.com/watch?v=w_l2q_Gyqfo</a></p><p>and</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Aapo%20Oksman%20-%20certmitm%20automatic%20exploitation%20of%20TLS%20certificate%20validation%20vulnerabilities.pdf">https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Aapo%20Oksman%20-%20certmitm%20automatic%20exploitation%20of%20TLS%20certificate%20validation%20vulnerabilities.pdf</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/aapooksman/certmitm">https://github.com/aapooksman/certmitm</a></p><p>HackerOne Detailed Platform Standards</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.hackerone.com/en/articles/8369826-detailed-platform-standards">https://docs.hackerone.com/en/articles/8369826-detailed-platform-standards</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:13:33) Specialization and Challenges of IOT Hacking</p><p>(00:33:03) Decrypting SSL to Chinese Cloud Servers</p><p>(00:47:00) General IoT Hacking Methodology</p><p>(01:26:00) Certificate Pinning and Certificate Validation</p><p>(01:34:35) BGA Reballing</p><p>(01:43:26) Bug Stories</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 89: In this episode of Critical Thinking - Bug Bounty Podcast We’re joined live by Matt Brown to talk about his journey with hacking in the IoT. We cover the specializations and challenges in hardware hacking, and Matt’s personal Methodolog...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>89</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">35e35b60-8ad0-410a-835a-341a00070add</guid>
  <title><![CDATA[Episode 88: News, Tools, and Writeups]]></title>
  <description><![CDATA[<p>Episode 88: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel tackle a whole slate of new research including a new cheat sheet for URL validation bypass from Portswigger, the introduction of Sanic DNS as a high-speed DNS resolver, xsstools, and the Dockerization of Orange Confusion Attacks. </p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a> </p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at<a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag"> ctbb.show/swag</a></p><p><strong>Resources</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/PortSwiggerRes/status/1830981376318792132">URL Validation Bypass cheat sheet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/smiegles/status/1825461028664062089">SanicDNS</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/har1sec/status/1827683325042987150">Orange Confusion Attacks</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MrTuxracer/status/1828172466675687758">WordPress GiveWP POP to RCE</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/yeswehack/xsstools">Xsstools</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://swarm.ptsecurity.com/bypassing-browser-tracking-protection-for-cors-misconfiguration-abuse/">Bypassing browser tracking protection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.huli.tw/2024/09/07/en/idek-ctf-2024-iframe/">Advanced iframe Magic</a></p><p>DOM Clobbering</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.ruhrsec.de/downloads/slides/Everything-You-Wanted-to-Know-About-DOM-Clobbering-But-Were-Afraid-to-Ask-Soheil-Khodayari-RuhrSec.pdf">https://www.ruhrsec.de/downloads/slides/Everything-You-Wanted-to-Know-About-DOM-Clobbering-But-Were-Afraid-to-Ask-Soheil-Khodayari-RuhrSec.pdf</a></p><p>And</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://domclob.xyz/domc_payload_generator/">https://domclob.xyz/domc_payload_generator/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:00) URL validation bypass</p><p>(00:07:41) SanicDNS and Orange confusion attacks</p><p>(00:20:06) WordPress GiveWP POP to RCE</p><p>(00:31:29) Xsstools</p><p>(00:43:56) Bypassing browser tracking protection</p><p>(00:52:06) DOM Clobbering and mixing up your approach</p>]]></description>
  <embed_id>c263c8f3-865e-43bf-90d8-3769ccbf037b</embed_id>
  <pubDate>Thu, 12 Sep 2024 10:00:44 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="63490196" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/4659681f-7165-4970-a11b-f76ce74963c3/episode.mp3" />
  <itunes:title><![CDATA[Episode 88: News, Tools, and Writeups]]></itunes:title>
  <itunes:duration>1:06:08</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 88: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel tackle a whole slate of new research including a new cheat sheet for URL validation bypass from Portswigger, the introduction of Sanic DNS as a high-speed DNS resolver, xsstools, and the Dockerization of Orange Confusion Attacks. </p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a> </p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at<a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag"> ctbb.show/swag</a></p><p><strong>Resources</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/PortSwiggerRes/status/1830981376318792132">URL Validation Bypass cheat sheet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/smiegles/status/1825461028664062089">SanicDNS</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/har1sec/status/1827683325042987150">Orange Confusion Attacks</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MrTuxracer/status/1828172466675687758">WordPress GiveWP POP to RCE</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/yeswehack/xsstools">Xsstools</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://swarm.ptsecurity.com/bypassing-browser-tracking-protection-for-cors-misconfiguration-abuse/">Bypassing browser tracking protection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.huli.tw/2024/09/07/en/idek-ctf-2024-iframe/">Advanced iframe Magic</a></p><p>DOM Clobbering</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.ruhrsec.de/downloads/slides/Everything-You-Wanted-to-Know-About-DOM-Clobbering-But-Were-Afraid-to-Ask-Soheil-Khodayari-RuhrSec.pdf">https://www.ruhrsec.de/downloads/slides/Everything-You-Wanted-to-Know-About-DOM-Clobbering-But-Were-Afraid-to-Ask-Soheil-Khodayari-RuhrSec.pdf</a></p><p>And</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://domclob.xyz/domc_payload_generator/">https://domclob.xyz/domc_payload_generator/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:00) URL validation bypass</p><p>(00:07:41) SanicDNS and Orange confusion attacks</p><p>(00:20:06) WordPress GiveWP POP to RCE</p><p>(00:31:29) Xsstools</p><p>(00:43:56) Bypassing browser tracking protection</p><p>(00:52:06) DOM Clobbering and mixing up your approach</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 88: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel tackle a whole slate of new research including a new cheat sheet for URL validation bypass from Portswigger, the introduction of Sanic DNS as a high-speed DNS resolver, xsstools, and the Dockerization of Orange Confusion Attacks. </p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a> </p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at<a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag"> ctbb.show/swag</a></p><p><strong>Resources</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/PortSwiggerRes/status/1830981376318792132">URL Validation Bypass cheat sheet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/smiegles/status/1825461028664062089">SanicDNS</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/har1sec/status/1827683325042987150">Orange Confusion Attacks</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MrTuxracer/status/1828172466675687758">WordPress GiveWP POP to RCE</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/yeswehack/xsstools">Xsstools</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://swarm.ptsecurity.com/bypassing-browser-tracking-protection-for-cors-misconfiguration-abuse/">Bypassing browser tracking protection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.huli.tw/2024/09/07/en/idek-ctf-2024-iframe/">Advanced iframe Magic</a></p><p>DOM Clobbering</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.ruhrsec.de/downloads/slides/Everything-You-Wanted-to-Know-About-DOM-Clobbering-But-Were-Afraid-to-Ask-Soheil-Khodayari-RuhrSec.pdf">https://www.ruhrsec.de/downloads/slides/Everything-You-Wanted-to-Know-About-DOM-Clobbering-But-Were-Afraid-to-Ask-Soheil-Khodayari-RuhrSec.pdf</a></p><p>And</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://domclob.xyz/domc_payload_generator/">https://domclob.xyz/domc_payload_generator/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:00) URL validation bypass</p><p>(00:07:41) SanicDNS and Orange confusion attacks</p><p>(00:20:06) WordPress GiveWP POP to RCE</p><p>(00:31:29) Xsstools</p><p>(00:43:56) Bypassing browser tracking protection</p><p>(00:52:06) DOM Clobbering and mixing up your approach</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 88: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel tackle a whole slate of new research including a new cheat sheet for URL validation bypass from Portswigger, the introduction of Sanic DNS as a high-speed DNS res...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>88</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">1ff5ea41-9bb6-47a3-bd60-b02f43a9b24a</guid>
  <title><![CDATA[Episode 87:  'Hacker Wife' Mariah Gardner on Bug Bounty mentality and relationships]]></title>
  <description><![CDATA[<p>Episode 87: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with none other than his wife Mariah to talk about Bug Bounty from the perspective of a Significant Other. They share how they’ve traversed travel and Live Hacking Events, household chores, hobbies, goals, rewards, as well as how best to encourage and support the hacker/non-hacker in your life.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at<a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag"> ctbb.show/swag</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MariahG017">https://x.com/MariahG017</a></p><p><strong>Resources:</strong></p><p>Ruby Nealon's song</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/_ruby/status/835306502546149376">https://x.com/_ruby/status/835306502546149376</a></p><p>Don't Force Yourself to Become a Bug Bounty Hunter</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/dont-force-yourself-to-become-a-bug-bounty-hunter">https://samcurry.net/dont-force-yourself-to-become-a-bug-bounty-hunter</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:03:12) Technical Questions for a Bug Bounty Wife</p><p>(00:16:11) Mariah's First LHE experience</p><p>(00:31:12) LHEs as a Couple</p><p>(00:41:57) Encouragement and Risk</p><p>(00:55:55) Hacker Family Dynamics, goals, and keeping promises</p><p>(01:17:35) How to care for your Hacker/Hacker Wife</p>]]></description>
  <embed_id>b4fd0b00-472d-48f9-a25a-fe27c464931a</embed_id>
  <pubDate>Thu, 05 Sep 2024 10:01:33 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="83217899" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/43a39cef-d6fd-42d9-8042-abc219d7f521/episode.mp3" />
  <itunes:title><![CDATA[Episode 87:  'Hacker Wife' Mariah Gardner on Bug Bounty mentality and relationships]]></itunes:title>
  <itunes:duration>1:26:41</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 87: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with none other than his wife Mariah to talk about Bug Bounty from the perspective of a Significant Other. They share how they’ve traversed travel and Live Hacking Events, household chores, hobbies, goals, rewards, as well as how best to encourage and support the hacker/non-hacker in your life.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at<a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag"> ctbb.show/swag</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MariahG017">https://x.com/MariahG017</a></p><p><strong>Resources:</strong></p><p>Ruby Nealon's song</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/_ruby/status/835306502546149376">https://x.com/_ruby/status/835306502546149376</a></p><p>Don't Force Yourself to Become a Bug Bounty Hunter</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/dont-force-yourself-to-become-a-bug-bounty-hunter">https://samcurry.net/dont-force-yourself-to-become-a-bug-bounty-hunter</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:03:12) Technical Questions for a Bug Bounty Wife</p><p>(00:16:11) Mariah's First LHE experience</p><p>(00:31:12) LHEs as a Couple</p><p>(00:41:57) Encouragement and Risk</p><p>(00:55:55) Hacker Family Dynamics, goals, and keeping promises</p><p>(01:17:35) How to care for your Hacker/Hacker Wife</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 87: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with none other than his wife Mariah to talk about Bug Bounty from the perspective of a Significant Other. They share how they’ve traversed travel and Live Hacking Events, household chores, hobbies, goals, rewards, as well as how best to encourage and support the hacker/non-hacker in your life.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at<a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag"> ctbb.show/swag</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MariahG017">https://x.com/MariahG017</a></p><p><strong>Resources:</strong></p><p>Ruby Nealon's song</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/_ruby/status/835306502546149376">https://x.com/_ruby/status/835306502546149376</a></p><p>Don't Force Yourself to Become a Bug Bounty Hunter</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/dont-force-yourself-to-become-a-bug-bounty-hunter">https://samcurry.net/dont-force-yourself-to-become-a-bug-bounty-hunter</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:03:12) Technical Questions for a Bug Bounty Wife</p><p>(00:16:11) Mariah's First LHE experience</p><p>(00:31:12) LHEs as a Couple</p><p>(00:41:57) Encouragement and Risk</p><p>(00:55:55) Hacker Family Dynamics, goals, and keeping promises</p><p>(01:17:35) How to care for your Hacker/Hacker Wife</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 87: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with none other than his wife Mariah to talk about Bug Bounty from the perspective of a Significant Other. They share how they’ve traversed travel and Live Hacki...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>87</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">cc8e1ea4-c6a1-4891-a4f2-4c2303e3cc98</guid>
  <title><![CDATA[Episode 86: The X-Correlation between Frans & RCE - Research Drop]]></title>
  <description><![CDATA[<p>Episode 86: In this episode of Critical Thinking - Bug Bounty Podcast Frans blows Justin’s mind with a sneak peak of his new presentation. <strong>Note:</strong> This is a little different from our normal episode, and video is recommended. So head over to <a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/yt"><strong>ctbb.show/yt</strong></a> if you feel like you’re missing something.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at <a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag">ctbb.show/swag</a></p><p>Watch this Episode on Youtube - <a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/yt">ctbb.show/yt</a></p><p>Today’s Guest: Frans Rosen - <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/fransrosen">https://x.com/fransrosen</a></p><p>View the slides of this presentation at <a target="_blank" rel="noopener noreferrer nofollow" href="https://speakerdeck.com/fransrosen/x-correlation-injections-or-how-to-break-server-side-contexts">https://speakerdeck.com/fransrosen/x-correlation-injections-or-how-to-break-server-side-contexts</a></p><p></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:04:09) x-correlation injection</p><p>(00:21:10) Server-side JSON-Injection</p><p>(00:32:10) Fuzz Blindly and Optimizing Blind RCE</p>]]></description>
  <embed_id>1fff4cae-471e-4291-b9bf-baa1ecec9347</embed_id>
  <pubDate>Thu, 29 Aug 2024 10:01:54 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="40466527" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/4a78065e-7335-4e69-8ed1-31a545e07375/episode.mp3" />
  <itunes:title><![CDATA[Episode 86: The X-Correlation between Frans & RCE - Research Drop]]></itunes:title>
  <itunes:duration>42:09</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 86: In this episode of Critical Thinking - Bug Bounty Podcast Frans blows Justin’s mind with a sneak peak of his new presentation. <strong>Note:</strong> This is a little different from our normal episode, and video is recommended. So head over to <a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/yt"><strong>ctbb.show/yt</strong></a> if you feel like you’re missing something.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at <a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag">ctbb.show/swag</a></p><p>Watch this Episode on Youtube - <a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/yt">ctbb.show/yt</a></p><p>Today’s Guest: Frans Rosen - <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/fransrosen">https://x.com/fransrosen</a></p><p>View the slides of this presentation at <a target="_blank" rel="noopener noreferrer nofollow" href="https://speakerdeck.com/fransrosen/x-correlation-injections-or-how-to-break-server-side-contexts">https://speakerdeck.com/fransrosen/x-correlation-injections-or-how-to-break-server-side-contexts</a></p><p></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:04:09) x-correlation injection</p><p>(00:21:10) Server-side JSON-Injection</p><p>(00:32:10) Fuzz Blindly and Optimizing Blind RCE</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 86: In this episode of Critical Thinking - Bug Bounty Podcast Frans blows Justin’s mind with a sneak peak of his new presentation. <strong>Note:</strong> This is a little different from our normal episode, and video is recommended. So head over to <a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/yt"><strong>ctbb.show/yt</strong></a> if you feel like you’re missing something.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Shop our new swag store at <a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/swag">ctbb.show/swag</a></p><p>Watch this Episode on Youtube - <a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/yt">ctbb.show/yt</a></p><p>Today’s Guest: Frans Rosen - <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/fransrosen">https://x.com/fransrosen</a></p><p>View the slides of this presentation at <a target="_blank" rel="noopener noreferrer nofollow" href="https://speakerdeck.com/fransrosen/x-correlation-injections-or-how-to-break-server-side-contexts">https://speakerdeck.com/fransrosen/x-correlation-injections-or-how-to-break-server-side-contexts</a></p><p></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:04:09) x-correlation injection</p><p>(00:21:10) Server-side JSON-Injection</p><p>(00:32:10) Fuzz Blindly and Optimizing Blind RCE</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 86: In this episode of Critical Thinking - Bug Bounty Podcast Frans blows Justin’s mind with a sneak peak of his new presentation. Note: This is a little different from our normal episode, and video is recommended. So head over to ctbb.show...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>86</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">7f9bd196-af21-4d0a-8ada-a1842da1ae64</guid>
  <title><![CDATA[Episode 85: Practical Applications of DEFCON 32 Web Research]]></title>
  <description><![CDATA[<p>Episode 85: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel talk through some of the research coming out of DEFCON, mainly from the PortSwigger team. Web timing attacks, cache exploitation, and exploits related to email protocols are all featured. Plus we also talk some fun Apache hacks from Orange Tsai</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p><strong>Resources</strong></p><p>Listen to the whispers</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work">https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work</a></p><p>Splitting the email atom</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/splitting-the-email-atom">https://portswigger.net/research/splitting-the-email-atom</a></p><p>Gotta cache 'em all</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/gotta-cache-em-all">https://portswigger.net/research/gotta-cache-em-all</a></p><p>HTTP Garden</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/narfindustries/http-garden">https://github.com/narfindustries/http-garden</a></p><p>Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.orange.tw/2024/08/confusion-attacks-en.html#%E2%9C%94%EF%B8%8F-2-2-2-Local-Gadget-to-XSS">https://blog.orange.tw/2024/08/confusion-attacks-en.html#%E2%9C%94%EF%B8%8F-2-2-2-Local-Gadget-to-XSS</a></p><p>Trusted API Types</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.mozilla.org/en-US/docs/Web/API/Trusted_Types_API">https://developer.mozilla.org/en-US/docs/Web/API/Trusted_Types_API</a></p><p>Untrusted Types</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/filedescriptor/untrusted-types">https://github.com/filedescriptor/untrusted-types</a> </p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:09:45) 'Listen to the whispers'</p><p>(00:30:03) 'Splitting the email atom'</p><p>(00:58:42) 'Gotta cache 'em all'</p><p>(01:21:03) 'Confusion Attacks'</p>]]></description>
  <embed_id>60a03462-4d61-4ec9-b87d-64be11202a90</embed_id>
  <pubDate>Thu, 22 Aug 2024 10:01:37 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="86882147" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/eaf8767e-5ae0-404e-b532-c8104d14ab07/episode.mp3" />
  <itunes:title><![CDATA[Episode 85: Practical Applications of DEFCON 32 Web Research]]></itunes:title>
  <itunes:duration>1:30:30</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 85: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel talk through some of the research coming out of DEFCON, mainly from the PortSwigger team. Web timing attacks, cache exploitation, and exploits related to email protocols are all featured. Plus we also talk some fun Apache hacks from Orange Tsai</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p><strong>Resources</strong></p><p>Listen to the whispers</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work">https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work</a></p><p>Splitting the email atom</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/splitting-the-email-atom">https://portswigger.net/research/splitting-the-email-atom</a></p><p>Gotta cache 'em all</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/gotta-cache-em-all">https://portswigger.net/research/gotta-cache-em-all</a></p><p>HTTP Garden</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/narfindustries/http-garden">https://github.com/narfindustries/http-garden</a></p><p>Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.orange.tw/2024/08/confusion-attacks-en.html#%E2%9C%94%EF%B8%8F-2-2-2-Local-Gadget-to-XSS">https://blog.orange.tw/2024/08/confusion-attacks-en.html#%E2%9C%94%EF%B8%8F-2-2-2-Local-Gadget-to-XSS</a></p><p>Trusted API Types</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.mozilla.org/en-US/docs/Web/API/Trusted_Types_API">https://developer.mozilla.org/en-US/docs/Web/API/Trusted_Types_API</a></p><p>Untrusted Types</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/filedescriptor/untrusted-types">https://github.com/filedescriptor/untrusted-types</a> </p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:09:45) 'Listen to the whispers'</p><p>(00:30:03) 'Splitting the email atom'</p><p>(00:58:42) 'Gotta cache 'em all'</p><p>(01:21:03) 'Confusion Attacks'</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 85: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel talk through some of the research coming out of DEFCON, mainly from the PortSwigger team. Web timing attacks, cache exploitation, and exploits related to email protocols are all featured. Plus we also talk some fun Apache hacks from Orange Tsai</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>Check out our new SWAG store at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/swag">https://ctbb.show/swag</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p><strong>Resources</strong></p><p>Listen to the whispers</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work">https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work</a></p><p>Splitting the email atom</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/splitting-the-email-atom">https://portswigger.net/research/splitting-the-email-atom</a></p><p>Gotta cache 'em all</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/gotta-cache-em-all">https://portswigger.net/research/gotta-cache-em-all</a></p><p>HTTP Garden</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/narfindustries/http-garden">https://github.com/narfindustries/http-garden</a></p><p>Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.orange.tw/2024/08/confusion-attacks-en.html#%E2%9C%94%EF%B8%8F-2-2-2-Local-Gadget-to-XSS">https://blog.orange.tw/2024/08/confusion-attacks-en.html#%E2%9C%94%EF%B8%8F-2-2-2-Local-Gadget-to-XSS</a></p><p>Trusted API Types</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.mozilla.org/en-US/docs/Web/API/Trusted_Types_API">https://developer.mozilla.org/en-US/docs/Web/API/Trusted_Types_API</a></p><p>Untrusted Types</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/filedescriptor/untrusted-types">https://github.com/filedescriptor/untrusted-types</a> </p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:09:45) 'Listen to the whispers'</p><p>(00:30:03) 'Splitting the email atom'</p><p>(00:58:42) 'Gotta cache 'em all'</p><p>(01:21:03) 'Confusion Attacks'</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 85: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel talk through some of the research coming out of DEFCON, mainly from the PortSwigger team. Web timing attacks, cache exploitation, and exploits related to email pr...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>85</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">7fa04e9c-2d1b-44e5-b3ce-1b1547884d47</guid>
  <title><![CDATA[Episode 84: 0xLupin & Takeaways from Google's Las Vegas BugSwat]]></title>
  <description><![CDATA[<p>Episode 84: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is joined by Roni Carta (@0xLupin) to discuss their MVH win at the recent Google LHE, and share some technical observations they had with the target and the event.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xLupin">https://x.com/0xLupin</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:12) MHV Debrief</p><p>(00:09:05) Sandboxes and Comfort Zones</p><p>(00:13:24) SDKs and Legal Compliance</p><p>(00:19:29) Age of Target and Platform-Exclusive Hunters</p>]]></description>
  <embed_id>65da9291-c957-403c-95b6-53c8d2263be1</embed_id>
  <pubDate>Thu, 15 Aug 2024 10:01:12 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="26162292" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/c471fd26-783e-46ea-93b3-84b63e246259/episode.mp3" />
  <itunes:title><![CDATA[Episode 84: 0xLupin & Takeaways from Google's Las Vegas BugSwat]]></itunes:title>
  <itunes:duration>27:15</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 84: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is joined by Roni Carta (@0xLupin) to discuss their MVH win at the recent Google LHE, and share some technical observations they had with the target and the event.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xLupin">https://x.com/0xLupin</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:12) MHV Debrief</p><p>(00:09:05) Sandboxes and Comfort Zones</p><p>(00:13:24) SDKs and Legal Compliance</p><p>(00:19:29) Age of Target and Platform-Exclusive Hunters</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 84: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is joined by Roni Carta (@0xLupin) to discuss their MVH win at the recent Google LHE, and share some technical observations they had with the target and the event.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Find the Hackernotes: <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.criticalthinkingpodcast.io/">https://blog.criticalthinkingpodcast.io/</a></p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xLupin">https://x.com/0xLupin</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:12) MHV Debrief</p><p>(00:09:05) Sandboxes and Comfort Zones</p><p>(00:13:24) SDKs and Legal Compliance</p><p>(00:19:29) Age of Target and Platform-Exclusive Hunters</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 84: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is joined by Roni Carta (@0xLupin) to discuss their MVH win at the recent Google LHE, and share some technical observations they had with the target and the event.Follow ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>84</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">4a388584-90cc-4577-919c-2c07f71d31c7</guid>
  <title><![CDATA[Episode 83: Brainstorming Proxy Plugins]]></title>
  <description><![CDATA[<p>Episode 83: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin are brainstorming new features and improvements for Caido, such as the implementation of a 403 bypassing workflow, a text expander, Tracing Cookies, and more.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p>Resources:</p><p>Post from Gareth Heyes</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1811084674988474417">https://x.com/garethheyes/status/1811084674988474417</a></p><p>Wiki List of XML and HTML</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://en.wikipedia.org/wiki/List_of_XML_and_HTML_character_entity_references#List_of_character_entity_references_in_HTML">https://en.wikipedia.org/wiki/List_of_XML_and_HTML_character_entity_references#List_of_character_entity_references_in_HTML</a></p><p>HackerOne Leaderboard Changes</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/scarybeasts/status/1810813103354892666">https://x.com/scarybeasts/status/1810813103354892666</a></p><p>Espanso</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://espanso.org/">https://espanso.org/</a></p><p>Critical Thinkers Discord</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/criticalthinkers">ctbb.show/criticalthinkers</a></p><p>Oauth Scan</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/bappstore/8ef2db1173e8432c8797831c2e730727">https://portswigger.net/bappstore/8ef2db1173e8432c8797831c2e730727</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:12) News</p><p>(00:13:20) Into the Brainstorm</p><p>(00:13:41) 403 Bypasser</p><p>(00:20:34) "Expaido"</p><p>(00:31:34) Trace Cookies</p><p>(00:42:01) Highlight Decoding Expansion and AI integrations</p><p>(00:49:08) OAuth Testing, API Highlighter, and Note-taking</p>]]></description>
  <embed_id>5ef5992a-88d2-4b09-b215-093bf3ab1031</embed_id>
  <pubDate>Thu, 08 Aug 2024 10:00:38 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="52642094" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/8dc38e44-2431-4b7b-840b-492e0708b151/episode.mp3" />
  <itunes:title><![CDATA[Episode 83: Brainstorming Proxy Plugins]]></itunes:title>
  <itunes:duration>54:50</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 83: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin are brainstorming new features and improvements for Caido, such as the implementation of a 403 bypassing workflow, a text expander, Tracing Cookies, and more.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p>Resources:</p><p>Post from Gareth Heyes</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1811084674988474417">https://x.com/garethheyes/status/1811084674988474417</a></p><p>Wiki List of XML and HTML</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://en.wikipedia.org/wiki/List_of_XML_and_HTML_character_entity_references#List_of_character_entity_references_in_HTML">https://en.wikipedia.org/wiki/List_of_XML_and_HTML_character_entity_references#List_of_character_entity_references_in_HTML</a></p><p>HackerOne Leaderboard Changes</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/scarybeasts/status/1810813103354892666">https://x.com/scarybeasts/status/1810813103354892666</a></p><p>Espanso</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://espanso.org/">https://espanso.org/</a></p><p>Critical Thinkers Discord</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/criticalthinkers">ctbb.show/criticalthinkers</a></p><p>Oauth Scan</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/bappstore/8ef2db1173e8432c8797831c2e730727">https://portswigger.net/bappstore/8ef2db1173e8432c8797831c2e730727</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:12) News</p><p>(00:13:20) Into the Brainstorm</p><p>(00:13:41) 403 Bypasser</p><p>(00:20:34) "Expaido"</p><p>(00:31:34) Trace Cookies</p><p>(00:42:01) Highlight Decoding Expansion and AI integrations</p><p>(00:49:08) OAuth Testing, API Highlighter, and Note-taking</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 83: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin are brainstorming new features and improvements for Caido, such as the implementation of a 403 bypassing workflow, a text expander, Tracing Cookies, and more.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p>Resources:</p><p>Post from Gareth Heyes</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1811084674988474417">https://x.com/garethheyes/status/1811084674988474417</a></p><p>Wiki List of XML and HTML</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://en.wikipedia.org/wiki/List_of_XML_and_HTML_character_entity_references#List_of_character_entity_references_in_HTML">https://en.wikipedia.org/wiki/List_of_XML_and_HTML_character_entity_references#List_of_character_entity_references_in_HTML</a></p><p>HackerOne Leaderboard Changes</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/scarybeasts/status/1810813103354892666">https://x.com/scarybeasts/status/1810813103354892666</a></p><p>Espanso</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://espanso.org/">https://espanso.org/</a></p><p>Critical Thinkers Discord</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://ctbb.show/criticalthinkers">ctbb.show/criticalthinkers</a></p><p>Oauth Scan</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/bappstore/8ef2db1173e8432c8797831c2e730727">https://portswigger.net/bappstore/8ef2db1173e8432c8797831c2e730727</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:12) News</p><p>(00:13:20) Into the Brainstorm</p><p>(00:13:41) 403 Bypasser</p><p>(00:20:34) "Expaido"</p><p>(00:31:34) Trace Cookies</p><p>(00:42:01) Highlight Decoding Expansion and AI integrations</p><p>(00:49:08) OAuth Testing, API Highlighter, and Note-taking</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 83: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin are brainstorming new features and improvements for Caido, such as the implementation of a 403 bypassing workflow, a text expander, Tracing Cookies, and more.Foll...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>83</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">59c2247b-a44f-4f50-9380-c60fc173f243</guid>
  <title><![CDATA[Episode 82: Part-Time Bug Bounty]]></title>
  <description><![CDATA[<p>Episode 82: In this episode of Critical Thinking - Bug Bounty Podcast Joel Margolis discusses strategies and tips for part-time bug bounty hunting. He covers things like finding (and enforcing) balance, picking programs and goals, and streamlining your process to optimize productivity.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p><strong>Resources:</strong></p><p>Evernote RCE Post</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://0reg.dev/blog/evernote-rce">https://0reg.dev/blog/evernote-rce</a></p><p>ServiceNow Bug Chain</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data">https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data</a></p><p>Douglas Day's Talk on finding 'no's'</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/G1RHa7l1Ys4?si=TY16ULsEIfJ9CMKk">https://youtu.be/G1RHa7l1Ys4?si=TY16ULsEIfJ9CMKk</a></p><p><strong>Timestamps:</strong></p><p>(00:01:37) Introduction</p><p>(00:02:24) Evernote RCE Post</p><p>(00:06:47) AssetNote ServiceNow Bug Chain</p><p>(00:12:16) Part-Time Bug Bounty: Balance and Accountability</p><p>(00:18:04) Picking programs: Impact and Payout</p><p>(00:28:46) Streamline your process</p>]]></description>
  <embed_id>71e9b7a4-cf19-4fd6-93c4-3a7861b93597</embed_id>
  <pubDate>Thu, 01 Aug 2024 10:01:19 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="35074015" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/e3951687-9d80-4294-92e4-4de0c9f371a5/episode.mp3" />
  <itunes:title><![CDATA[Episode 82: Part-Time Bug Bounty]]></itunes:title>
  <itunes:duration>36:32</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 82: In this episode of Critical Thinking - Bug Bounty Podcast Joel Margolis discusses strategies and tips for part-time bug bounty hunting. He covers things like finding (and enforcing) balance, picking programs and goals, and streamlining your process to optimize productivity.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p><strong>Resources:</strong></p><p>Evernote RCE Post</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://0reg.dev/blog/evernote-rce">https://0reg.dev/blog/evernote-rce</a></p><p>ServiceNow Bug Chain</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data">https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data</a></p><p>Douglas Day's Talk on finding 'no's'</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/G1RHa7l1Ys4?si=TY16ULsEIfJ9CMKk">https://youtu.be/G1RHa7l1Ys4?si=TY16ULsEIfJ9CMKk</a></p><p><strong>Timestamps:</strong></p><p>(00:01:37) Introduction</p><p>(00:02:24) Evernote RCE Post</p><p>(00:06:47) AssetNote ServiceNow Bug Chain</p><p>(00:12:16) Part-Time Bug Bounty: Balance and Accountability</p><p>(00:18:04) Picking programs: Impact and Payout</p><p>(00:28:46) Streamline your process</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 82: In this episode of Critical Thinking - Bug Bounty Podcast Joel Margolis discusses strategies and tips for part-time bug bounty hunting. He covers things like finding (and enforcing) balance, picking programs and goals, and streamlining your process to optimize productivity.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p><strong>Resources:</strong></p><p>Evernote RCE Post</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://0reg.dev/blog/evernote-rce">https://0reg.dev/blog/evernote-rce</a></p><p>ServiceNow Bug Chain</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data">https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data</a></p><p>Douglas Day's Talk on finding 'no's'</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/G1RHa7l1Ys4?si=TY16ULsEIfJ9CMKk">https://youtu.be/G1RHa7l1Ys4?si=TY16ULsEIfJ9CMKk</a></p><p><strong>Timestamps:</strong></p><p>(00:01:37) Introduction</p><p>(00:02:24) Evernote RCE Post</p><p>(00:06:47) AssetNote ServiceNow Bug Chain</p><p>(00:12:16) Part-Time Bug Bounty: Balance and Accountability</p><p>(00:18:04) Picking programs: Impact and Payout</p><p>(00:28:46) Streamline your process</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 82: In this episode of Critical Thinking - Bug Bounty Podcast Joel Margolis discusses strategies and tips for part-time bug bounty hunting. He covers things like finding (and enforcing) balance, picking programs and goals, and streamlining ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>82</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">31925f1d-e934-4cbf-867f-bbaf76c86de1</guid>
  <title><![CDATA[Episode 81: Crushing Client-Side on Any Scope with MatanBer]]></title>
  <description><![CDATA[<p>Episode 81: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by MatanBer to go over some recent bug reports, as well as share some tips and tricks on client-side hacking and using DevTools effectively.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MtnBer">https://x.com/MtnBer</a></p><p><strong>Resources:</strong></p><p>Beyond XSS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://aszx87410.github.io/beyond-xss/en/">https://aszx87410.github.io/beyond-xss/en/</a></p><p>Web VSCode XSS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gitlab.com/gitlab-org/gitlab/-/issues/461328">https://gitlab.com/gitlab-org/gitlab/-/issues/461328</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:05:24) Learning and Labs</p><p>(00:17:29) DevTools tips and tricks</p><p>(00:49:49) General Client-Side hacking tips</p><p>(01:09:59) Self-XSS Storytime</p><p>(01:32:16) Bug Reports</p><p>(01:46:37) Brainstorming a Client-side HUD</p>]]></description>
  <embed_id>04d68c1d-daee-428a-93eb-7ee229d7a5f9</embed_id>
  <pubDate>Thu, 25 Jul 2024 10:01:24 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="119809806" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/7d1da1aa-f1b2-41ed-8fd4-2e55ee203318/episode.mp3" />
  <itunes:title><![CDATA[Episode 81: Crushing Client-Side on Any Scope with MatanBer]]></itunes:title>
  <itunes:duration>2:04:48</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 81: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by MatanBer to go over some recent bug reports, as well as share some tips and tricks on client-side hacking and using DevTools effectively.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MtnBer">https://x.com/MtnBer</a></p><p><strong>Resources:</strong></p><p>Beyond XSS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://aszx87410.github.io/beyond-xss/en/">https://aszx87410.github.io/beyond-xss/en/</a></p><p>Web VSCode XSS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gitlab.com/gitlab-org/gitlab/-/issues/461328">https://gitlab.com/gitlab-org/gitlab/-/issues/461328</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:05:24) Learning and Labs</p><p>(00:17:29) DevTools tips and tricks</p><p>(00:49:49) General Client-Side hacking tips</p><p>(01:09:59) Self-XSS Storytime</p><p>(01:32:16) Bug Reports</p><p>(01:46:37) Brainstorming a Client-side HUD</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 81: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by MatanBer to go over some recent bug reports, as well as share some tips and tricks on client-side hacking and using DevTools effectively.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MtnBer">https://x.com/MtnBer</a></p><p><strong>Resources:</strong></p><p>Beyond XSS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://aszx87410.github.io/beyond-xss/en/">https://aszx87410.github.io/beyond-xss/en/</a></p><p>Web VSCode XSS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gitlab.com/gitlab-org/gitlab/-/issues/461328">https://gitlab.com/gitlab-org/gitlab/-/issues/461328</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:05:24) Learning and Labs</p><p>(00:17:29) DevTools tips and tricks</p><p>(00:49:49) General Client-Side hacking tips</p><p>(01:09:59) Self-XSS Storytime</p><p>(01:32:16) Bug Reports</p><p>(01:46:37) Brainstorming a Client-side HUD</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 81: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by MatanBer to go over some recent bug reports, as well as share some tips and tricks on client-side hacking and using DevTools effectively.Follow us on twitter ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>81</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">bfd927fe-d1ac-4afe-b32c-81af4339b42e</guid>
  <title><![CDATA[Episode 80: Pwn2Own VS H1 Live Hacking Event (feat SinSinology)]]></title>
  <description><![CDATA[<p>Episode 80: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Sina Kheirkhah to talk about the start of his hacking journey and explore the differences between the Pwn2Own and HackerOne Events</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/SinSinology">https://x.com/SinSinology</a></p><p>Blog: <a target="_blank" rel="noopener noreferrer nofollow" href="https://sinsinology.medium.com/">https://sinsinology.medium.com/</a></p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://summoning.team/blog/progress-whatsup-gold-rce-cve-2024-4885/">WhatsUp Gold Pre-Auth RCE</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://summoning.team/">Advanced .NET Exploitation Training</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/dnSpyEx">dnSpyEx</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.qemu.org/">QEMU</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.unicorn-engine.org/">Unicorn Engine</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://qiling.io/">Qiling</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/AFLplusplus/LibAFL">libAFL</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=uBu9B0tNObs">Alex Plaskett interview</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.trendmicro.com/en_us/business/products/network/intrusion-prevention/tipping-point-threat-protection-system.html">TippingPoint</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.flashback.sh/">Flashback Team</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:12:45) Learning, Mentorship, and Failure</p><p>(00:29:34) Pentesting and Pwn2Own</p><p>(00:40:05) Hacking methodology</p><p>(01:01:57) Debuggers and shells in IoT Devices</p><p>(01:35:40) Differences between ZDI and HackerOne</p><p>(02:02:27) Pwn2Own Steps and Stories</p><p>(02:14:06) Master of Pwn Title</p><p>(02:29:54) Bug reports</p>]]></description>
  <embed_id>162f89b4-7389-4476-a4cb-b85397f5e7c4</embed_id>
  <pubDate>Thu, 18 Jul 2024 10:01:04 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="162658153" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/c0be139b-dbb5-4598-ae70-036ef84cac5e/episode.mp3" />
  <itunes:title><![CDATA[Episode 80: Pwn2Own VS H1 Live Hacking Event (feat SinSinology)]]></itunes:title>
  <itunes:duration>2:49:26</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 80: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Sina Kheirkhah to talk about the start of his hacking journey and explore the differences between the Pwn2Own and HackerOne Events</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/SinSinology">https://x.com/SinSinology</a></p><p>Blog: <a target="_blank" rel="noopener noreferrer nofollow" href="https://sinsinology.medium.com/">https://sinsinology.medium.com/</a></p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://summoning.team/blog/progress-whatsup-gold-rce-cve-2024-4885/">WhatsUp Gold Pre-Auth RCE</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://summoning.team/">Advanced .NET Exploitation Training</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/dnSpyEx">dnSpyEx</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.qemu.org/">QEMU</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.unicorn-engine.org/">Unicorn Engine</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://qiling.io/">Qiling</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/AFLplusplus/LibAFL">libAFL</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=uBu9B0tNObs">Alex Plaskett interview</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.trendmicro.com/en_us/business/products/network/intrusion-prevention/tipping-point-threat-protection-system.html">TippingPoint</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.flashback.sh/">Flashback Team</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:12:45) Learning, Mentorship, and Failure</p><p>(00:29:34) Pentesting and Pwn2Own</p><p>(00:40:05) Hacking methodology</p><p>(01:01:57) Debuggers and shells in IoT Devices</p><p>(01:35:40) Differences between ZDI and HackerOne</p><p>(02:02:27) Pwn2Own Steps and Stories</p><p>(02:14:06) Master of Pwn Title</p><p>(02:29:54) Bug reports</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 80: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Sina Kheirkhah to talk about the start of his hacking journey and explore the differences between the Pwn2Own and HackerOne Events</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/SinSinology">https://x.com/SinSinology</a></p><p>Blog: <a target="_blank" rel="noopener noreferrer nofollow" href="https://sinsinology.medium.com/">https://sinsinology.medium.com/</a></p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://summoning.team/blog/progress-whatsup-gold-rce-cve-2024-4885/">WhatsUp Gold Pre-Auth RCE</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://summoning.team/">Advanced .NET Exploitation Training</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/dnSpyEx">dnSpyEx</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.qemu.org/">QEMU</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.unicorn-engine.org/">Unicorn Engine</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://qiling.io/">Qiling</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/AFLplusplus/LibAFL">libAFL</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=uBu9B0tNObs">Alex Plaskett interview</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.trendmicro.com/en_us/business/products/network/intrusion-prevention/tipping-point-threat-protection-system.html">TippingPoint</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.flashback.sh/">Flashback Team</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:12:45) Learning, Mentorship, and Failure</p><p>(00:29:34) Pentesting and Pwn2Own</p><p>(00:40:05) Hacking methodology</p><p>(01:01:57) Debuggers and shells in IoT Devices</p><p>(01:35:40) Differences between ZDI and HackerOne</p><p>(02:02:27) Pwn2Own Steps and Stories</p><p>(02:14:06) Master of Pwn Title</p><p>(02:29:54) Bug reports</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 80: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Sina Kheirkhah to talk about the start of his hacking journey and explore the differences between the Pwn2Own and HackerOne EventsFollow us on twitter at: @ct...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>80</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">f2d95da9-737a-47a7-9040-09fee19137de</guid>
  <title><![CDATA[Episode 79: The State of CSS Injection - Leaking Text Nodes & HTML Attributes]]></title>
  <description><![CDATA[<p>Episode 79: In this episode of Critical Thinking - Bug Bounty Podcast we deepdive CSS injection, and explore topics like sequential import chaining, font ligatures, and attribute exfiltration.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://spaceraccoon.dev/universal-code-execution-browser-extensions/">SpaceRaccoon's Universal Code Execution Extensions</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/isira_adithya/status/1809228815002136719">Escalating Client Side Path Traversal</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/p/how-to-go-full-time-bug-bounty/">Full-time Bug Bounty Blueprint</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://d0nut.medium.com/better-exfiltration-via-html-injection-31c72a2dae8b">Sequential Import Chaining</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/PortSwigger/css-exfiltration/blob/main/steal-attribute-values/styles.css">CSS Exfiltation</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/PortSwigger/css-exfiltration/blob/main/steal-attribute-values/styles.css#L5">Link that Justin was talking about</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/kinugawamasato/status/1808887754090295805">Font Ligatures</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/LavaMoat/LavaDome/issues/40">Lava Dome bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://research.securitum.com/stealing-data-in-great-style-how-to-use-css-to-attack-web-application/">Stealing Data in Great Style</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/PortSwigger/css-exfiltration/tree/main/steal-script-contents">Steal Script Contents</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" class="css-175oi2r r-1wbh5a2 r-dnmrzs r-1ny4l3l r-1loqt21" href="https://x.com/kinugawamasato">Masato Kinugawa's tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://aszx87410.github.io/beyond-xss/en/ch3/css-injection-2/">Attacking with Just CSS</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x-c3ll.github.io/posts/CSS-Injection-Primitives/">CSS Injection Primitives</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:32) Universal Code Execution</p><p>(00:11:32) Escalating Client Side Path Traversal</p><p>(00:16:56) Justin's Defcon talk &amp; Bug Bounty Blueprint</p><p>(00:23:32) CSS Injection</p><p>(00:39:23) Font Ligatures</p><p>(00:54:30) Descent Override and display:block</p>]]></description>
  <embed_id>a129af28-383e-48d0-b232-364424387f2d</embed_id>
  <pubDate>Thu, 11 Jul 2024 10:01:42 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="67602108" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/d8dca112-ce57-41d8-b9f5-4fb1b634cfbc/episode.mp3" />
  <itunes:title><![CDATA[Episode 79: The State of CSS Injection - Leaking Text Nodes & HTML Attributes]]></itunes:title>
  <itunes:duration>1:10:25</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 79: In this episode of Critical Thinking - Bug Bounty Podcast we deepdive CSS injection, and explore topics like sequential import chaining, font ligatures, and attribute exfiltration.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://spaceraccoon.dev/universal-code-execution-browser-extensions/">SpaceRaccoon's Universal Code Execution Extensions</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/isira_adithya/status/1809228815002136719">Escalating Client Side Path Traversal</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/p/how-to-go-full-time-bug-bounty/">Full-time Bug Bounty Blueprint</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://d0nut.medium.com/better-exfiltration-via-html-injection-31c72a2dae8b">Sequential Import Chaining</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/PortSwigger/css-exfiltration/blob/main/steal-attribute-values/styles.css">CSS Exfiltation</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/PortSwigger/css-exfiltration/blob/main/steal-attribute-values/styles.css#L5">Link that Justin was talking about</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/kinugawamasato/status/1808887754090295805">Font Ligatures</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/LavaMoat/LavaDome/issues/40">Lava Dome bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://research.securitum.com/stealing-data-in-great-style-how-to-use-css-to-attack-web-application/">Stealing Data in Great Style</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/PortSwigger/css-exfiltration/tree/main/steal-script-contents">Steal Script Contents</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" class="css-175oi2r r-1wbh5a2 r-dnmrzs r-1ny4l3l r-1loqt21" href="https://x.com/kinugawamasato">Masato Kinugawa's tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://aszx87410.github.io/beyond-xss/en/ch3/css-injection-2/">Attacking with Just CSS</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x-c3ll.github.io/posts/CSS-Injection-Primitives/">CSS Injection Primitives</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:32) Universal Code Execution</p><p>(00:11:32) Escalating Client Side Path Traversal</p><p>(00:16:56) Justin's Defcon talk &amp; Bug Bounty Blueprint</p><p>(00:23:32) CSS Injection</p><p>(00:39:23) Font Ligatures</p><p>(00:54:30) Descent Override and display:block</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 79: In this episode of Critical Thinking - Bug Bounty Podcast we deepdive CSS injection, and explore topics like sequential import chaining, font ligatures, and attribute exfiltration.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://spaceraccoon.dev/universal-code-execution-browser-extensions/">SpaceRaccoon's Universal Code Execution Extensions</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/isira_adithya/status/1809228815002136719">Escalating Client Side Path Traversal</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/p/how-to-go-full-time-bug-bounty/">Full-time Bug Bounty Blueprint</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://d0nut.medium.com/better-exfiltration-via-html-injection-31c72a2dae8b">Sequential Import Chaining</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/PortSwigger/css-exfiltration/blob/main/steal-attribute-values/styles.css">CSS Exfiltation</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/PortSwigger/css-exfiltration/blob/main/steal-attribute-values/styles.css#L5">Link that Justin was talking about</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/kinugawamasato/status/1808887754090295805">Font Ligatures</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/LavaMoat/LavaDome/issues/40">Lava Dome bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://research.securitum.com/stealing-data-in-great-style-how-to-use-css-to-attack-web-application/">Stealing Data in Great Style</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/PortSwigger/css-exfiltration/tree/main/steal-script-contents">Steal Script Contents</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" class="css-175oi2r r-1wbh5a2 r-dnmrzs r-1ny4l3l r-1loqt21" href="https://x.com/kinugawamasato">Masato Kinugawa's tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://aszx87410.github.io/beyond-xss/en/ch3/css-injection-2/">Attacking with Just CSS</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x-c3ll.github.io/posts/CSS-Injection-Primitives/">CSS Injection Primitives</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:32) Universal Code Execution</p><p>(00:11:32) Escalating Client Side Path Traversal</p><p>(00:16:56) Justin's Defcon talk &amp; Bug Bounty Blueprint</p><p>(00:23:32) CSS Injection</p><p>(00:39:23) Font Ligatures</p><p>(00:54:30) Descent Override and display:block</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 79: In this episode of Critical Thinking - Bug Bounty Podcast we deepdive CSS injection, and explore topics like sequential import chaining, font ligatures, and attribute exfiltration.Follow us on twitter at: @ctbbpodcastSend us any feedbac...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>79</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">a70286e5-edec-4a92-b59f-09eb53ac610c</guid>
  <title><![CDATA[Episode 78: Less Writing, More Hacking - Reporting Efficiency Techniques]]></title>
  <description><![CDATA[<p>Episode 78: In this episode of Critical Thinking - Bug Bounty Podcast we’re talking about writing reports. We share some tips that we’ve learned, and discuss ways that AI can (and can’t) help with that process. We also talk about the benefit of using tools like Fabric, Loom, and ShareX.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater </a>&amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek </a>on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/therceman/status/1803666353892585642">XSS WAF Bypass by multi-char HTML entities</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://shazzer.co.uk/">Shazzer</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/research-and-things/nextjs-and-cache-poisoning-a-quest-for-the-black-hole">Next.js and cache poisoning</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/galnagli/status/1806095911405371739">Nagli's Nuclei Template</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mewy.pw/posts/2024-06-29-why-cant-you-fix-this-one-bug">hey why can't you fix this one bug</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Rhynorater/reports">Justin's reporting templating software</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/danielmiessler/fabric/tree/main/patterns/write_hackerone_report">Fabric</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/rhynorater/bbReportFormatter">BB Report Formatter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.python.org/3/library/2to3.html">2to3 Automated Python Converter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://getsharex.com/downloads">ShareX</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.techspot.com/downloads/5705-skitch.html">Skitch</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:04:00) XSS WAF Bypass by Multi-char HTML Entities</p><p>(00:11:59) Next.js and Cache Poisoning</p><p>(00:18:03) Nagli's Nuclei Template and Sean Yeoh's Blog</p><p>(00:27:34) Report Writing and AI</p><p>(00:50:02) Reporting tips</p>]]></description>
  <embed_id>1be1f212-b527-4f6f-959f-4a1b9526c046</embed_id>
  <pubDate>Thu, 04 Jul 2024 10:00:57 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="63762317" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/3e50456c-b3d8-466b-9753-20042e10ab4d/episode.mp3" />
  <itunes:title><![CDATA[Episode 78: Less Writing, More Hacking - Reporting Efficiency Techniques]]></itunes:title>
  <itunes:duration>1:06:25</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 78: In this episode of Critical Thinking - Bug Bounty Podcast we’re talking about writing reports. We share some tips that we’ve learned, and discuss ways that AI can (and can’t) help with that process. We also talk about the benefit of using tools like Fabric, Loom, and ShareX.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater </a>&amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek </a>on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/therceman/status/1803666353892585642">XSS WAF Bypass by multi-char HTML entities</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://shazzer.co.uk/">Shazzer</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/research-and-things/nextjs-and-cache-poisoning-a-quest-for-the-black-hole">Next.js and cache poisoning</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/galnagli/status/1806095911405371739">Nagli's Nuclei Template</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mewy.pw/posts/2024-06-29-why-cant-you-fix-this-one-bug">hey why can't you fix this one bug</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Rhynorater/reports">Justin's reporting templating software</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/danielmiessler/fabric/tree/main/patterns/write_hackerone_report">Fabric</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/rhynorater/bbReportFormatter">BB Report Formatter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.python.org/3/library/2to3.html">2to3 Automated Python Converter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://getsharex.com/downloads">ShareX</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.techspot.com/downloads/5705-skitch.html">Skitch</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:04:00) XSS WAF Bypass by Multi-char HTML Entities</p><p>(00:11:59) Next.js and Cache Poisoning</p><p>(00:18:03) Nagli's Nuclei Template and Sean Yeoh's Blog</p><p>(00:27:34) Report Writing and AI</p><p>(00:50:02) Reporting tips</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 78: In this episode of Critical Thinking - Bug Bounty Podcast we’re talking about writing reports. We share some tips that we’ve learned, and discuss ways that AI can (and can’t) help with that process. We also talk about the benefit of using tools like Fabric, Loom, and ShareX.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater </a>&amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek </a>on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.criticalthinkingpodcast.io/threatlocker">Today’s Sponsor - ThreatLocker</a></p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/therceman/status/1803666353892585642">XSS WAF Bypass by multi-char HTML entities</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://shazzer.co.uk/">Shazzer</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://zhero-web-sec.github.io/research-and-things/nextjs-and-cache-poisoning-a-quest-for-the-black-hole">Next.js and cache poisoning</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/galnagli/status/1806095911405371739">Nagli's Nuclei Template</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mewy.pw/posts/2024-06-29-why-cant-you-fix-this-one-bug">hey why can't you fix this one bug</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Rhynorater/reports">Justin's reporting templating software</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/danielmiessler/fabric/tree/main/patterns/write_hackerone_report">Fabric</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/rhynorater/bbReportFormatter">BB Report Formatter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.python.org/3/library/2to3.html">2to3 Automated Python Converter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://getsharex.com/downloads">ShareX</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.techspot.com/downloads/5705-skitch.html">Skitch</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:04:00) XSS WAF Bypass by Multi-char HTML Entities</p><p>(00:11:59) Next.js and Cache Poisoning</p><p>(00:18:03) Nagli's Nuclei Template and Sean Yeoh's Blog</p><p>(00:27:34) Report Writing and AI</p><p>(00:50:02) Reporting tips</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 78: In this episode of Critical Thinking - Bug Bounty Podcast we’re talking about writing reports. We share some tips that we’ve learned, and discuss ways that AI can (and can’t) help with that process. We also talk about the benefit of usi...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>78</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">1b3552a3-d675-4921-8711-263440a2b595</guid>
  <title><![CDATA[Episode 77: Bug Bounty Mental - Practical Tips for Staying Sharp & Motivated]]></title>
  <description><![CDATA[<p>Episode 77: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin discuss some fresh writeups including some MongoDB injections, ORMs, and exploits in Kakao and iOS before pivoting into a conversation about staying motivated and avoiding burnout while hunting.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><strong>Resources:</strong></p><p>MongoDB NoSQL Injection</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://soroush.me/blog/2024/06/mongodb-nosql-injection-with-aggregation-pipelines/">https://soroush.me/blog/2024/06/mongodb-nosql-injection-with-aggregation-pipelines/</a></p><p>Mongo DB Is Web Scale</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=b2F-DItXtZs">https://www.youtube.com/watch?v=b2F-DItXtZs</a></p><p>1-click Exploit in Kakao</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://stulle123.github.io/posts/kakaotalk-account-takeover/">https://stulle123.github.io/posts/kakaotalk-account-takeover/</a></p><p>Unsecure time-based secret and Sandwich Attack</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.aeth.cc/public/Article-Reset-Tolkien/secret-time-based-article-en.html">https://www.aeth.cc/public/Article-Reset-Tolkien/secret-time-based-article-en.html</a></p><p>Reset Tolkien</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/AethliosIK/reset-tolkien">https://github.com/AethliosIK/reset-tolkien</a></p><p>iOS URL Scheme Hijacking Revamped</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://evanconnelly.github.io/post/ios-oauth/">https://evanconnelly.github.io/post/ios-oauth/</a></p><p>PLORMBING YOUR DJANGO ORM</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.elttam.com/blog/plormbing-your-django-orm/#content">https://www.elttam.com/blog/plormbing-your-django-orm/#content</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:07) MongoDB NoSQL Injection</p><p>(00:12:42) 1-click Exploit in Kakao</p><p>(00:33:21) Time-based secrets and Reset Tolkien</p><p>(00:39:26) iOS URL Scheme Hijacking Revamped</p><p>(00:51:42) ORMs</p><p>(00:58:57) Community Bug Submission</p><p>(01:07:45) Motivation, Mental Sharpness, and Burnout avoidance</p>]]></description>
  <embed_id>aee9091f-cd79-41ef-b898-8a522dbabfe1</embed_id>
  <pubDate>Thu, 27 Jun 2024 10:01:49 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="106018408" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/39201343-680a-4953-b5b3-1c5e4b6cb1f9/episode.mp3" />
  <itunes:title><![CDATA[Episode 77: Bug Bounty Mental - Practical Tips for Staying Sharp & Motivated]]></itunes:title>
  <itunes:duration>1:50:26</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 77: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin discuss some fresh writeups including some MongoDB injections, ORMs, and exploits in Kakao and iOS before pivoting into a conversation about staying motivated and avoiding burnout while hunting.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><strong>Resources:</strong></p><p>MongoDB NoSQL Injection</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://soroush.me/blog/2024/06/mongodb-nosql-injection-with-aggregation-pipelines/">https://soroush.me/blog/2024/06/mongodb-nosql-injection-with-aggregation-pipelines/</a></p><p>Mongo DB Is Web Scale</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=b2F-DItXtZs">https://www.youtube.com/watch?v=b2F-DItXtZs</a></p><p>1-click Exploit in Kakao</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://stulle123.github.io/posts/kakaotalk-account-takeover/">https://stulle123.github.io/posts/kakaotalk-account-takeover/</a></p><p>Unsecure time-based secret and Sandwich Attack</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.aeth.cc/public/Article-Reset-Tolkien/secret-time-based-article-en.html">https://www.aeth.cc/public/Article-Reset-Tolkien/secret-time-based-article-en.html</a></p><p>Reset Tolkien</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/AethliosIK/reset-tolkien">https://github.com/AethliosIK/reset-tolkien</a></p><p>iOS URL Scheme Hijacking Revamped</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://evanconnelly.github.io/post/ios-oauth/">https://evanconnelly.github.io/post/ios-oauth/</a></p><p>PLORMBING YOUR DJANGO ORM</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.elttam.com/blog/plormbing-your-django-orm/#content">https://www.elttam.com/blog/plormbing-your-django-orm/#content</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:07) MongoDB NoSQL Injection</p><p>(00:12:42) 1-click Exploit in Kakao</p><p>(00:33:21) Time-based secrets and Reset Tolkien</p><p>(00:39:26) iOS URL Scheme Hijacking Revamped</p><p>(00:51:42) ORMs</p><p>(00:58:57) Community Bug Submission</p><p>(01:07:45) Motivation, Mental Sharpness, and Burnout avoidance</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 77: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin discuss some fresh writeups including some MongoDB injections, ORMs, and exploits in Kakao and iOS before pivoting into a conversation about staying motivated and avoiding burnout while hunting.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><strong>Resources:</strong></p><p>MongoDB NoSQL Injection</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://soroush.me/blog/2024/06/mongodb-nosql-injection-with-aggregation-pipelines/">https://soroush.me/blog/2024/06/mongodb-nosql-injection-with-aggregation-pipelines/</a></p><p>Mongo DB Is Web Scale</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=b2F-DItXtZs">https://www.youtube.com/watch?v=b2F-DItXtZs</a></p><p>1-click Exploit in Kakao</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://stulle123.github.io/posts/kakaotalk-account-takeover/">https://stulle123.github.io/posts/kakaotalk-account-takeover/</a></p><p>Unsecure time-based secret and Sandwich Attack</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.aeth.cc/public/Article-Reset-Tolkien/secret-time-based-article-en.html">https://www.aeth.cc/public/Article-Reset-Tolkien/secret-time-based-article-en.html</a></p><p>Reset Tolkien</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/AethliosIK/reset-tolkien">https://github.com/AethliosIK/reset-tolkien</a></p><p>iOS URL Scheme Hijacking Revamped</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://evanconnelly.github.io/post/ios-oauth/">https://evanconnelly.github.io/post/ios-oauth/</a></p><p>PLORMBING YOUR DJANGO ORM</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.elttam.com/blog/plormbing-your-django-orm/#content">https://www.elttam.com/blog/plormbing-your-django-orm/#content</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:07) MongoDB NoSQL Injection</p><p>(00:12:42) 1-click Exploit in Kakao</p><p>(00:33:21) Time-based secrets and Reset Tolkien</p><p>(00:39:26) iOS URL Scheme Hijacking Revamped</p><p>(00:51:42) ORMs</p><p>(00:58:57) Community Bug Submission</p><p>(01:07:45) Motivation, Mental Sharpness, and Burnout avoidance</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 77: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin discuss some fresh writeups including some MongoDB injections, ORMs, and exploits in Kakao and iOS before pivoting into a conversation about staying motivated and...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>77</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">15958188-33de-4c25-b54a-15fd2b77c051</guid>
  <title><![CDATA[Episode 76: Match & Replace - HTTP Proxies' Most Underrated Feature]]></title>
  <description><![CDATA[<p>Episode 76: In this episode of Critical Thinking - Bug Bounty Podcast we’re talking about Match and Replace and the often overlooked use cases for it, like bypassing paywalls, modifying host headers, and storing payloads. We also talk about the HackerOne Ambassador World Cup and the issues with dupe submissions, and go through some write-ups.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>------ Links ------</strong></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p><strong>Resources</strong></p><p>Zoom Session Takeover</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nokline.github.io/bugbounty/2024/06/07/Zoom-ATO.html">https://nokline.github.io/bugbounty/2024/06/07/Zoom-ATO.html</a></p><p>SharePoint XXE</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/thezdi/status/1796207012520366552">https://x.com/thezdi/status/1796207012520366552</a></p><p>Shazzer</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://shazzer.co.uk/">https://shazzer.co.uk/</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:05:06) H1 Ambassador World Cup</p><p>(00:13:57) Zoom ATO bug</p><p>(00:33:28) SharePoint XXE</p><p>(00:39:36) Shazzer</p><p>(00:46:36) Match and Replace</p><p>(01:13:01) Match and Replace in Mobile</p><p>(01:21:13) Header Replacements</p>]]></description>
  <embed_id>48ba8492-f58c-441e-9578-5e299ae77d18</embed_id>
  <pubDate>Thu, 20 Jun 2024 10:00:47 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="90934267" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/dc29be31-6ad9-4a1d-b35e-a03d66ded266/episode.mp3" />
  <itunes:title><![CDATA[Episode 76: Match & Replace - HTTP Proxies' Most Underrated Feature]]></itunes:title>
  <itunes:duration>1:34:43</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 76: In this episode of Critical Thinking - Bug Bounty Podcast we’re talking about Match and Replace and the often overlooked use cases for it, like bypassing paywalls, modifying host headers, and storing payloads. We also talk about the HackerOne Ambassador World Cup and the issues with dupe submissions, and go through some write-ups.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>------ Links ------</strong></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p><strong>Resources</strong></p><p>Zoom Session Takeover</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nokline.github.io/bugbounty/2024/06/07/Zoom-ATO.html">https://nokline.github.io/bugbounty/2024/06/07/Zoom-ATO.html</a></p><p>SharePoint XXE</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/thezdi/status/1796207012520366552">https://x.com/thezdi/status/1796207012520366552</a></p><p>Shazzer</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://shazzer.co.uk/">https://shazzer.co.uk/</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:05:06) H1 Ambassador World Cup</p><p>(00:13:57) Zoom ATO bug</p><p>(00:33:28) SharePoint XXE</p><p>(00:39:36) Shazzer</p><p>(00:46:36) Match and Replace</p><p>(01:13:01) Match and Replace in Mobile</p><p>(01:21:13) Header Replacements</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 76: In this episode of Critical Thinking - Bug Bounty Podcast we’re talking about Match and Replace and the often overlooked use cases for it, like bypassing paywalls, modifying host headers, and storing payloads. We also talk about the HackerOne Ambassador World Cup and the issues with dupe submissions, and go through some write-ups.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>------ Links ------</strong></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p><strong>Resources</strong></p><p>Zoom Session Takeover</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://nokline.github.io/bugbounty/2024/06/07/Zoom-ATO.html">https://nokline.github.io/bugbounty/2024/06/07/Zoom-ATO.html</a></p><p>SharePoint XXE</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/thezdi/status/1796207012520366552">https://x.com/thezdi/status/1796207012520366552</a></p><p>Shazzer</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://shazzer.co.uk/">https://shazzer.co.uk/</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:05:06) H1 Ambassador World Cup</p><p>(00:13:57) Zoom ATO bug</p><p>(00:33:28) SharePoint XXE</p><p>(00:39:36) Shazzer</p><p>(00:46:36) Match and Replace</p><p>(01:13:01) Match and Replace in Mobile</p><p>(01:21:13) Header Replacements</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 76: In this episode of Critical Thinking - Bug Bounty Podcast we’re talking about Match and Replace and the often overlooked use cases for it, like bypassing paywalls, modifying host headers, and storing payloads. We also talk about the Hac...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>76</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">73b60a77-5689-45c4-98c1-640feb9db099</guid>
  <title><![CDATA[Episode 75: *Rerun* of The OG Bug Bounty King - Frans Rosen]]></title>
  <description><![CDATA[<p>Episode 75: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are sick, So instead of a new full episode, we're going back 30 episodes to review.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>Today's Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/fransrosen">https://twitter.com/fransrosen</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/">Detectify</a></p><p>Discovering s3 subdomain takeovers</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/writeups/hostile-subdomain-takeover-using-heroku-github-desk-more/">https://labs.detectify.com/writeups/hostile-subdomain-takeover-using-heroku-github-desk-more/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://bucket-disclose.sh">bucket-disclose.sh</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/fransr/a155e5bd7ab11c93923ec8ce788e3368">https://gist.github.com/fransr/a155e5bd7ab11c93923ec8ce788e3368</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/writeups/a-deep-dive-into-aws-s3-access-controls-taking-full-control-over-your-assets/">A deep dive into AWS S3 access controls</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.slideshare.net/OWASP_Poland/owasp-poland-day-2018-frans-rosen-attacking-modern-web-technologies">Attacking Modern Web Technologies</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://speakerdeck.com/fransrosen/live-hacking-like-a-mvh-a-walkthrough-on-methodology-and-strategies-to-win-big">Live Hacking like a MVH</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/2022/07/06/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows/">Account hijacking using Dirty Dancing in sign-in OAuth flows</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:11:41) Franz Rosen's Bug Bounty Journey and Detectify </p><p>(00:20:21) Pseudo-code, typing, and thinking like a dev</p><p>(00:27:11) Hunter Methodologies and automationists</p><p>(00:42:31) Time on targets, Iteration vs. Ideation</p><p>(00:58:01) S3 subdomain takeovers</p><p>(01:11:53) Blog posting and hosting motivations</p><p>(01:20:21) Detectify and entrepreneurial endeavors</p><p>(01:36:41) Attacking Modern Web Technologies</p><p>(01:52:51) postMessage and MessagePort</p><p>(02:05:00) Live Hacking and Collaboration</p><p>(02:20:41) Account Hijacking and OAuth Flows</p><p>(02:35:39) Hacking + Parenthood</p>]]></description>
  <embed_id>c4f5d10b-51e9-45a2-bf6a-7980558d78db</embed_id>
  <pubDate>Thu, 13 Jun 2024 10:01:32 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="158274181" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/e4169dd6-ad91-4a26-9c70-9d41fe514a19/episode.mp3" />
  <itunes:title><![CDATA[Episode 75: *Rerun* of The OG Bug Bounty King - Frans Rosen]]></itunes:title>
  <itunes:duration>2:44:52</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 75: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are sick, So instead of a new full episode, we're going back 30 episodes to review.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>Today's Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/fransrosen">https://twitter.com/fransrosen</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/">Detectify</a></p><p>Discovering s3 subdomain takeovers</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/writeups/hostile-subdomain-takeover-using-heroku-github-desk-more/">https://labs.detectify.com/writeups/hostile-subdomain-takeover-using-heroku-github-desk-more/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://bucket-disclose.sh">bucket-disclose.sh</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/fransr/a155e5bd7ab11c93923ec8ce788e3368">https://gist.github.com/fransr/a155e5bd7ab11c93923ec8ce788e3368</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/writeups/a-deep-dive-into-aws-s3-access-controls-taking-full-control-over-your-assets/">A deep dive into AWS S3 access controls</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.slideshare.net/OWASP_Poland/owasp-poland-day-2018-frans-rosen-attacking-modern-web-technologies">Attacking Modern Web Technologies</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://speakerdeck.com/fransrosen/live-hacking-like-a-mvh-a-walkthrough-on-methodology-and-strategies-to-win-big">Live Hacking like a MVH</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/2022/07/06/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows/">Account hijacking using Dirty Dancing in sign-in OAuth flows</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:11:41) Franz Rosen's Bug Bounty Journey and Detectify </p><p>(00:20:21) Pseudo-code, typing, and thinking like a dev</p><p>(00:27:11) Hunter Methodologies and automationists</p><p>(00:42:31) Time on targets, Iteration vs. Ideation</p><p>(00:58:01) S3 subdomain takeovers</p><p>(01:11:53) Blog posting and hosting motivations</p><p>(01:20:21) Detectify and entrepreneurial endeavors</p><p>(01:36:41) Attacking Modern Web Technologies</p><p>(01:52:51) postMessage and MessagePort</p><p>(02:05:00) Live Hacking and Collaboration</p><p>(02:20:41) Account Hijacking and OAuth Flows</p><p>(02:35:39) Hacking + Parenthood</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 75: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are sick, So instead of a new full episode, we're going back 30 episodes to review.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>Today's Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/fransrosen">https://twitter.com/fransrosen</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/">Detectify</a></p><p>Discovering s3 subdomain takeovers</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/writeups/hostile-subdomain-takeover-using-heroku-github-desk-more/">https://labs.detectify.com/writeups/hostile-subdomain-takeover-using-heroku-github-desk-more/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://bucket-disclose.sh">bucket-disclose.sh</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/fransr/a155e5bd7ab11c93923ec8ce788e3368">https://gist.github.com/fransr/a155e5bd7ab11c93923ec8ce788e3368</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/writeups/a-deep-dive-into-aws-s3-access-controls-taking-full-control-over-your-assets/">A deep dive into AWS S3 access controls</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.slideshare.net/OWASP_Poland/owasp-poland-day-2018-frans-rosen-attacking-modern-web-technologies">Attacking Modern Web Technologies</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://speakerdeck.com/fransrosen/live-hacking-like-a-mvh-a-walkthrough-on-methodology-and-strategies-to-win-big">Live Hacking like a MVH</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/2022/07/06/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows/">Account hijacking using Dirty Dancing in sign-in OAuth flows</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:11:41) Franz Rosen's Bug Bounty Journey and Detectify </p><p>(00:20:21) Pseudo-code, typing, and thinking like a dev</p><p>(00:27:11) Hunter Methodologies and automationists</p><p>(00:42:31) Time on targets, Iteration vs. Ideation</p><p>(00:58:01) S3 subdomain takeovers</p><p>(01:11:53) Blog posting and hosting motivations</p><p>(01:20:21) Detectify and entrepreneurial endeavors</p><p>(01:36:41) Attacking Modern Web Technologies</p><p>(01:52:51) postMessage and MessagePort</p><p>(02:05:00) Live Hacking and Collaboration</p><p>(02:20:41) Account Hijacking and OAuth Flows</p><p>(02:35:39) Hacking + Parenthood</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 75: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are sick, So instead of a new full episode, we're going back 30 episodes to review.Follow us on twitter at: @ctbbpodcastWe're new to this podcasting thing, so fe...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>75</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">3f632fbf-0f76-4809-a732-aa8ee9a43b38</guid>
  <title><![CDATA[Episode 74: Supply Chain Attack Primer - Popping RCE Without an HTTP Request (feat 0xLupin)]]></title>
  <description><![CDATA[<p>Episode 74: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Roni "Lupin" Carta for a deep dive into supply chain attacks and dependency confusion. We explore the supply chain attacks, the ethical considerations surrounding maintainers and hosting packages on public registries, and chat about the vision and uses of his new tool Depi.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xLupin">https://x.com/0xLupin</a></p><p>Resources:</p><p>Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610">https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610</a></p><p>git-dump</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/tomnomnom/dotfiles/blob/master/scripts/git-dump">https://github.com/tomnomnom/dotfiles/blob/master/scripts/git-dump</a></p><p>Depi</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.landh.tech/depi">https://www.landh.tech/depi</a></p><p>Weak links of Supply Chain</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arxiv.org/pdf/2112.10165">https://arxiv.org/pdf/2112.10165</a></p><p></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:07:13) Overveiw of Supply Chain Flow</p><p>(00:15:14) Getting our Scope</p><p>(00:23:46) Depi</p><p>(00:29:12) Types of attacks and finding the 80/20</p><p>(00:45:06) Maintainer attacks</p><p>(01:10:40) Regestries, artifactories, and an npm bug</p><p>(01:31:51) Grafana NPX Confusion</p>]]></description>
  <embed_id>f3b6745f-3ccd-4307-b4d8-134916c57e0d</embed_id>
  <pubDate>Thu, 06 Jun 2024 10:01:29 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="94402487" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/25f73da5-756f-42c2-9de0-95ba19976340/episode.mp3" />
  <itunes:title><![CDATA[Episode 74: Supply Chain Attack Primer - Popping RCE Without an HTTP Request (feat 0xLupin)]]></itunes:title>
  <itunes:duration>1:38:20</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 74: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Roni "Lupin" Carta for a deep dive into supply chain attacks and dependency confusion. We explore the supply chain attacks, the ethical considerations surrounding maintainers and hosting packages on public registries, and chat about the vision and uses of his new tool Depi.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xLupin">https://x.com/0xLupin</a></p><p>Resources:</p><p>Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610">https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610</a></p><p>git-dump</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/tomnomnom/dotfiles/blob/master/scripts/git-dump">https://github.com/tomnomnom/dotfiles/blob/master/scripts/git-dump</a></p><p>Depi</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.landh.tech/depi">https://www.landh.tech/depi</a></p><p>Weak links of Supply Chain</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arxiv.org/pdf/2112.10165">https://arxiv.org/pdf/2112.10165</a></p><p></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:07:13) Overveiw of Supply Chain Flow</p><p>(00:15:14) Getting our Scope</p><p>(00:23:46) Depi</p><p>(00:29:12) Types of attacks and finding the 80/20</p><p>(00:45:06) Maintainer attacks</p><p>(01:10:40) Regestries, artifactories, and an npm bug</p><p>(01:31:51) Grafana NPX Confusion</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 74: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Roni "Lupin" Carta for a deep dive into supply chain attacks and dependency confusion. We explore the supply chain attacks, the ethical considerations surrounding maintainers and hosting packages on public registries, and chat about the vision and uses of his new tool Depi.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/0xLupin">https://x.com/0xLupin</a></p><p>Resources:</p><p>Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610">https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610</a></p><p>git-dump</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/tomnomnom/dotfiles/blob/master/scripts/git-dump">https://github.com/tomnomnom/dotfiles/blob/master/scripts/git-dump</a></p><p>Depi</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.landh.tech/depi">https://www.landh.tech/depi</a></p><p>Weak links of Supply Chain</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arxiv.org/pdf/2112.10165">https://arxiv.org/pdf/2112.10165</a></p><p></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:07:13) Overveiw of Supply Chain Flow</p><p>(00:15:14) Getting our Scope</p><p>(00:23:46) Depi</p><p>(00:29:12) Types of attacks and finding the 80/20</p><p>(00:45:06) Maintainer attacks</p><p>(01:10:40) Regestries, artifactories, and an npm bug</p><p>(01:31:51) Grafana NPX Confusion</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 74: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Roni "Lupin" Carta for a deep dive into supply chain attacks and dependency confusion. We explore the supply chain attacks, the ethical considerations surro...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>74</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">ecdb4165-0e00-4e25-8dca-169959008fbc</guid>
  <title><![CDATA[Episode 73: Sandboxed IFrames and WAF Bypasses]]></title>
  <description><![CDATA[<p>Episode 73: In this episode of Critical Thinking - Bug Bounty Podcast we give a brief recap of Nahamcon and then touch on some topics like WAF bypass tools, sandboxed iframes, and programs redacting your reports.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Resources:</p><p>?. Tweet</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1786836956032176215">https://x.com/garethheyes/status/1786836956032176215</a></p><p>NoWafPls</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/assetnote/nowafpls">https://github.com/assetnote/nowafpls</a></p><p>Redacted Reports</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/deadvolvo/status/1790397012468199651">https://x.com/deadvolvo/status/1790397012468199651</a></p><p>Breaking CORS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MtnBer/status/1794657827115696181">https://x.com/MtnBer/status/1794657827115696181</a></p><p>Sandbox-iframe XSS challenge solution</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://joaxcar.com/blog/2024/05/16/sandbox-iframe-xss-challenge-solution/">https://joaxcar.com/blog/2024/05/16/sandbox-iframe-xss-challenge-solution/</a></p><p>iframe and <a target="_blank" rel="noopener noreferrer nofollow" href="http://window.open">window.open</a> magic</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.huli.tw/2022/04/07/en/iframe-and-window-open/#detecting-when-a-new-window-has-finished-loading">https://blog.huli.tw/2022/04/07/en/iframe-and-window-open/#detecting-when-a-new-window-has-finished-loading</a></p><p>domloggerpp</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/kevin-mizu/domloggerpp">https://github.com/kevin-mizu/domloggerpp</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:03:29) ?. Operator in JS and NoWafPls</p><p>(00:07:22) Redacting our own reports</p><p>(00:11:13) Breaking CORS</p><p>(00:17:07) Sandbox-iframes</p><p>(00:24:11) Dom hook plugins</p>]]></description>
  <embed_id>e1cb15f1-a28a-4921-a3bf-9a42dd3553b4</embed_id>
  <pubDate>Thu, 30 May 2024 10:01:21 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="29969899" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/ca5b4dc0-b421-467f-a8a3-a2cfce3cc5f2/episode.mp3" />
  <itunes:title><![CDATA[Episode 73: Sandboxed IFrames and WAF Bypasses]]></itunes:title>
  <itunes:duration>31:13</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 73: In this episode of Critical Thinking - Bug Bounty Podcast we give a brief recap of Nahamcon and then touch on some topics like WAF bypass tools, sandboxed iframes, and programs redacting your reports.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Resources:</p><p>?. Tweet</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1786836956032176215">https://x.com/garethheyes/status/1786836956032176215</a></p><p>NoWafPls</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/assetnote/nowafpls">https://github.com/assetnote/nowafpls</a></p><p>Redacted Reports</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/deadvolvo/status/1790397012468199651">https://x.com/deadvolvo/status/1790397012468199651</a></p><p>Breaking CORS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MtnBer/status/1794657827115696181">https://x.com/MtnBer/status/1794657827115696181</a></p><p>Sandbox-iframe XSS challenge solution</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://joaxcar.com/blog/2024/05/16/sandbox-iframe-xss-challenge-solution/">https://joaxcar.com/blog/2024/05/16/sandbox-iframe-xss-challenge-solution/</a></p><p>iframe and <a target="_blank" rel="noopener noreferrer nofollow" href="http://window.open">window.open</a> magic</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.huli.tw/2022/04/07/en/iframe-and-window-open/#detecting-when-a-new-window-has-finished-loading">https://blog.huli.tw/2022/04/07/en/iframe-and-window-open/#detecting-when-a-new-window-has-finished-loading</a></p><p>domloggerpp</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/kevin-mizu/domloggerpp">https://github.com/kevin-mizu/domloggerpp</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:03:29) ?. Operator in JS and NoWafPls</p><p>(00:07:22) Redacting our own reports</p><p>(00:11:13) Breaking CORS</p><p>(00:17:07) Sandbox-iframes</p><p>(00:24:11) Dom hook plugins</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 73: In this episode of Critical Thinking - Bug Bounty Podcast we give a brief recap of Nahamcon and then touch on some topics like WAF bypass tools, sandboxed iframes, and programs redacting your reports.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Resources:</p><p>?. Tweet</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/garethheyes/status/1786836956032176215">https://x.com/garethheyes/status/1786836956032176215</a></p><p>NoWafPls</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/assetnote/nowafpls">https://github.com/assetnote/nowafpls</a></p><p>Redacted Reports</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/deadvolvo/status/1790397012468199651">https://x.com/deadvolvo/status/1790397012468199651</a></p><p>Breaking CORS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MtnBer/status/1794657827115696181">https://x.com/MtnBer/status/1794657827115696181</a></p><p>Sandbox-iframe XSS challenge solution</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://joaxcar.com/blog/2024/05/16/sandbox-iframe-xss-challenge-solution/">https://joaxcar.com/blog/2024/05/16/sandbox-iframe-xss-challenge-solution/</a></p><p>iframe and <a target="_blank" rel="noopener noreferrer nofollow" href="http://window.open">window.open</a> magic</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.huli.tw/2022/04/07/en/iframe-and-window-open/#detecting-when-a-new-window-has-finished-loading">https://blog.huli.tw/2022/04/07/en/iframe-and-window-open/#detecting-when-a-new-window-has-finished-loading</a></p><p>domloggerpp</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/kevin-mizu/domloggerpp">https://github.com/kevin-mizu/domloggerpp</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:03:29) ?. Operator in JS and NoWafPls</p><p>(00:07:22) Redacting our own reports</p><p>(00:11:13) Breaking CORS</p><p>(00:17:07) Sandbox-iframes</p><p>(00:24:11) Dom hook plugins</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 73: In this episode of Critical Thinking - Bug Bounty Podcast we give a brief recap of Nahamcon and then touch on some topics like WAF bypass tools, sandboxed iframes, and programs redacting your reports.Follow us on twitter at: @ctbbpodcas...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>73</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">8d5d6dbf-5da6-4729-bd9d-8c1f3c2f0148</guid>
  <title><![CDATA[Episode 72: Research TLDRs & Smuggling Payloads in Well Known Data Types]]></title>
  <description><![CDATA[<p>Episode 72: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss some hot research from the past couple months. This includes ways to smuggle payloads in phone numbers and IPv6 Addresses, the NextJS SSRF, the PDF.JS PoC drop, and a GitHub Enterprise Indirect Method Information bug. Also, we have an attack vector featured from Monke!</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater </a>&amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p><strong>Resources:</strong></p><p>PDF.JS Bypass to XSS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/advisories/GHSA-wgrm-67xf-hhpq">https://github.com/advisories/GHSA-wgrm-67xf-hhpq</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/">https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://pdfium.googlesource.com/pdfium/+/refs/heads/main/docs/getting-started.md">PDFium</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.assetnote.io/resources/research/digging-for-ssrf-in-nextjs-apps">NextJS SSRF by AssetNote</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/michielprins/status/1783559040817111232">Better Bounty Transparency for hackers</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/slonser_/status/1776583445994447189">Slonser IPV6 Research</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/zseano/status/1784320275577729440">Smuggling payloads in phone numbers</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MrTuxracer/status/1784229071460692232">Automatic Plugin SQLi</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/cure53berlin/status/1783819608127840678">DomPurify Bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://open.spotify.com/show/2EO4HVs4Zm2D7wchOPbKyb">Bug Bounty JP Podcast</a></p><p>Github Enterprise send() bug</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/creastery/status/1787327890943873055">https://x.com/creastery/status/1787327890943873055</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater/status/1788598984572813549">https://x.com/Rhynorater/status/1788598984572813549</a></p><p><strong>Timestamps:</strong></p><p>(00:00:09) Introduction</p><p>(00:03:20) PDF.JS XSS and NextJS SSRF</p><p>(00:12:52) Better Bounty Transparency</p><p>(00:20:01) IPV6 Research and Phone Number Payloads</p><p>(00:28:20) Community Highlight and Automatic Plugin CVE-2024-27956</p><p>(00:33:26) DomPurify Bypass and Github Enterprise send() bug</p><p>(00:46:12) Caido cookie and header extension updates</p>]]></description>
  <embed_id>cfaebb07-bbbc-480a-8dcd-b698764a8fff</embed_id>
  <pubDate>Thu, 23 May 2024 10:01:26 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="50706108" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/049306b5-9ae3-4cfa-bd32-010a4122786e/episode.mp3" />
  <itunes:title><![CDATA[Episode 72: Research TLDRs & Smuggling Payloads in Well Known Data Types]]></itunes:title>
  <itunes:duration>52:49</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 72: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss some hot research from the past couple months. This includes ways to smuggle payloads in phone numbers and IPv6 Addresses, the NextJS SSRF, the PDF.JS PoC drop, and a GitHub Enterprise Indirect Method Information bug. Also, we have an attack vector featured from Monke!</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater </a>&amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p><strong>Resources:</strong></p><p>PDF.JS Bypass to XSS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/advisories/GHSA-wgrm-67xf-hhpq">https://github.com/advisories/GHSA-wgrm-67xf-hhpq</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/">https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://pdfium.googlesource.com/pdfium/+/refs/heads/main/docs/getting-started.md">PDFium</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.assetnote.io/resources/research/digging-for-ssrf-in-nextjs-apps">NextJS SSRF by AssetNote</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/michielprins/status/1783559040817111232">Better Bounty Transparency for hackers</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/slonser_/status/1776583445994447189">Slonser IPV6 Research</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/zseano/status/1784320275577729440">Smuggling payloads in phone numbers</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MrTuxracer/status/1784229071460692232">Automatic Plugin SQLi</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/cure53berlin/status/1783819608127840678">DomPurify Bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://open.spotify.com/show/2EO4HVs4Zm2D7wchOPbKyb">Bug Bounty JP Podcast</a></p><p>Github Enterprise send() bug</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/creastery/status/1787327890943873055">https://x.com/creastery/status/1787327890943873055</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater/status/1788598984572813549">https://x.com/Rhynorater/status/1788598984572813549</a></p><p><strong>Timestamps:</strong></p><p>(00:00:09) Introduction</p><p>(00:03:20) PDF.JS XSS and NextJS SSRF</p><p>(00:12:52) Better Bounty Transparency</p><p>(00:20:01) IPV6 Research and Phone Number Payloads</p><p>(00:28:20) Community Highlight and Automatic Plugin CVE-2024-27956</p><p>(00:33:26) DomPurify Bypass and Github Enterprise send() bug</p><p>(00:46:12) Caido cookie and header extension updates</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 72: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss some hot research from the past couple months. This includes ways to smuggle payloads in phone numbers and IPv6 Addresses, the NextJS SSRF, the PDF.JS PoC drop, and a GitHub Enterprise Indirect Method Information bug. Also, we have an attack vector featured from Monke!</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater </a>&amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p><strong>Resources:</strong></p><p>PDF.JS Bypass to XSS</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/advisories/GHSA-wgrm-67xf-hhpq">https://github.com/advisories/GHSA-wgrm-67xf-hhpq</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/">https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://pdfium.googlesource.com/pdfium/+/refs/heads/main/docs/getting-started.md">PDFium</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.assetnote.io/resources/research/digging-for-ssrf-in-nextjs-apps">NextJS SSRF by AssetNote</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/michielprins/status/1783559040817111232">Better Bounty Transparency for hackers</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/slonser_/status/1776583445994447189">Slonser IPV6 Research</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/zseano/status/1784320275577729440">Smuggling payloads in phone numbers</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/MrTuxracer/status/1784229071460692232">Automatic Plugin SQLi</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/cure53berlin/status/1783819608127840678">DomPurify Bypass</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://open.spotify.com/show/2EO4HVs4Zm2D7wchOPbKyb">Bug Bounty JP Podcast</a></p><p>Github Enterprise send() bug</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/creastery/status/1787327890943873055">https://x.com/creastery/status/1787327890943873055</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater/status/1788598984572813549">https://x.com/Rhynorater/status/1788598984572813549</a></p><p><strong>Timestamps:</strong></p><p>(00:00:09) Introduction</p><p>(00:03:20) PDF.JS XSS and NextJS SSRF</p><p>(00:12:52) Better Bounty Transparency</p><p>(00:20:01) IPV6 Research and Phone Number Payloads</p><p>(00:28:20) Community Highlight and Automatic Plugin CVE-2024-27956</p><p>(00:33:26) DomPurify Bypass and Github Enterprise send() bug</p><p>(00:46:12) Caido cookie and header extension updates</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 72: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss some hot research from the past couple months. This includes ways to smuggle payloads in phone numbers and IPv6 Addresses, the NextJS SSRF, the PDF.JS PoC...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>72</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">67e900a6-c9be-4796-ac7f-405b2b356711</guid>
  <title><![CDATA[Episode 71: More VDP Chats & AI Bias Bounty Strats with Keith Hoodlet]]></title>
  <description><![CDATA[<p>Episode 71: In this episode of Critical Thinking - Bug Bounty Podcast Keith Hoodlet joins us to weigh in on the VDP Debate. He shares some of his insights on when VDPs are appropriate in a company's security posture, and the challenges of securing large organizations. Then we switch gears and talk about AI bias bounties, where Keith explains the approach he takes to identify bias in chatbots and highlights the importance of understanding human biases and heuristics to better hack AI.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Sign up for <a target="_blank" rel="noopener noreferrer nofollow" href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Today’s guest: Keith Hoodlet</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://securing.dev/">https://securing.dev/</a></p><p>Resources:</p><p>Daniel Miessler's article about the security poverty line</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://danielmiessler.com/p/the-cybersecurity-skills-gap-is-another-instance-of-late-stage-capitalism/">https://danielmiessler.com/p/the-cybersecurity-skills-gap-is-another-instance-of-late-stage-capitalism/</a></p><p>Hacking AI Bias</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://securing.dev/posts/hacking-ai-bias/">https://securing.dev/posts/hacking-ai-bias/</a></p><p>Hacking AI Bias Video</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/AeFZA7xGIbE?si=TLQ7B3YtzPWXS4hq">https://youtu.be/AeFZA7xGIbE?si=TLQ7B3YtzPWXS4hq</a></p><p>Sarah's Hoodlet's new book</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://sarahjhoodlet.com">https://sarahjhoodlet.com</a></p><p>Link to Amazon Page</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://a.co/d/c0LTM8U">https://a.co/d/c0LTM8U</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:09) Keith's Appsec Journey</p><p>(00:16:24) The Great VDP Debate Redux</p><p>(00:47:18) Platform/Hunter Incentives and Government Regulation</p><p>(01:06:24) AI Bias Bounties</p><p>(01:26:27) AI Techniques and Bugcrowd Contest</p>]]></description>
  <embed_id>285e9f9f-5973-42cd-8f2e-1ad93586b985</embed_id>
  <pubDate>Thu, 16 May 2024 10:01:24 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="101138317" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/28498322-0c18-4af8-8c68-136252719e72/episode.mp3" />
  <itunes:title><![CDATA[Episode 71: More VDP Chats & AI Bias Bounty Strats with Keith Hoodlet]]></itunes:title>
  <itunes:duration>1:45:21</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 71: In this episode of Critical Thinking - Bug Bounty Podcast Keith Hoodlet joins us to weigh in on the VDP Debate. He shares some of his insights on when VDPs are appropriate in a company's security posture, and the challenges of securing large organizations. Then we switch gears and talk about AI bias bounties, where Keith explains the approach he takes to identify bias in chatbots and highlights the importance of understanding human biases and heuristics to better hack AI.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Sign up for <a target="_blank" rel="noopener noreferrer nofollow" href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Today’s guest: Keith Hoodlet</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://securing.dev/">https://securing.dev/</a></p><p>Resources:</p><p>Daniel Miessler's article about the security poverty line</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://danielmiessler.com/p/the-cybersecurity-skills-gap-is-another-instance-of-late-stage-capitalism/">https://danielmiessler.com/p/the-cybersecurity-skills-gap-is-another-instance-of-late-stage-capitalism/</a></p><p>Hacking AI Bias</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://securing.dev/posts/hacking-ai-bias/">https://securing.dev/posts/hacking-ai-bias/</a></p><p>Hacking AI Bias Video</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/AeFZA7xGIbE?si=TLQ7B3YtzPWXS4hq">https://youtu.be/AeFZA7xGIbE?si=TLQ7B3YtzPWXS4hq</a></p><p>Sarah's Hoodlet's new book</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://sarahjhoodlet.com">https://sarahjhoodlet.com</a></p><p>Link to Amazon Page</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://a.co/d/c0LTM8U">https://a.co/d/c0LTM8U</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:09) Keith's Appsec Journey</p><p>(00:16:24) The Great VDP Debate Redux</p><p>(00:47:18) Platform/Hunter Incentives and Government Regulation</p><p>(01:06:24) AI Bias Bounties</p><p>(01:26:27) AI Techniques and Bugcrowd Contest</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 71: In this episode of Critical Thinking - Bug Bounty Podcast Keith Hoodlet joins us to weigh in on the VDP Debate. He shares some of his insights on when VDPs are appropriate in a company's security posture, and the challenges of securing large organizations. Then we switch gears and talk about AI bias bounties, where Keith explains the approach he takes to identify bias in chatbots and highlights the importance of understanding human biases and heuristics to better hack AI.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Sign up for <a target="_blank" rel="noopener noreferrer nofollow" href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Today’s guest: Keith Hoodlet</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://securing.dev/">https://securing.dev/</a></p><p>Resources:</p><p>Daniel Miessler's article about the security poverty line</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://danielmiessler.com/p/the-cybersecurity-skills-gap-is-another-instance-of-late-stage-capitalism/">https://danielmiessler.com/p/the-cybersecurity-skills-gap-is-another-instance-of-late-stage-capitalism/</a></p><p>Hacking AI Bias</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://securing.dev/posts/hacking-ai-bias/">https://securing.dev/posts/hacking-ai-bias/</a></p><p>Hacking AI Bias Video</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://youtu.be/AeFZA7xGIbE?si=TLQ7B3YtzPWXS4hq">https://youtu.be/AeFZA7xGIbE?si=TLQ7B3YtzPWXS4hq</a></p><p>Sarah's Hoodlet's new book</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://sarahjhoodlet.com">https://sarahjhoodlet.com</a></p><p>Link to Amazon Page</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://a.co/d/c0LTM8U">https://a.co/d/c0LTM8U</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:09) Keith's Appsec Journey</p><p>(00:16:24) The Great VDP Debate Redux</p><p>(00:47:18) Platform/Hunter Incentives and Government Regulation</p><p>(01:06:24) AI Bias Bounties</p><p>(01:26:27) AI Techniques and Bugcrowd Contest</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 71: In this episode of Critical Thinking - Bug Bounty Podcast Keith Hoodlet joins us to weigh in on the VDP Debate. He shares some of his insights on when VDPs are appropriate in a company's security posture, and the challenges of securing ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>71</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">75962414-10b4-4033-8221-c3daf736ba72</guid>
  <title><![CDATA[Episode 70: NahamCon and CSP Bypasses Everywhere]]></title>
  <description><![CDATA[<p>Episode 70: In this episode of Critical Thinking - Bug Bounty Podcast we’re once again joined by Ben Sadeghipour to talk about some Nahamcon news, as well as discuss a couple other LHE’s taking place. Then they cover CI/CD and drop some cool CSP Bypasses.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/NahamSec">https://twitter.com/NahamSec</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.nahamcon.com/">https://www.nahamcon.com/</a></p><p><strong>Resources:</strong></p><p>Depi</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.landh.tech/depi">https://www.landh.tech/depi</a></p><p>Youtube CSP:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/oembed?callback=alert()">https://www.youtube.com/oembed?callback=alert()</a></p><p>Maps CSP:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://maps.googleapis.com/maps/api/js?callback=alert()-print">https://maps.googleapis.com/maps/api/js?callback=alert()-print</a></p><p>Google APIs CSP</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.googleapis.com/customsearch/v1?callback=alert(1)">https://www.googleapis.com/customsearch/v1?callback=alert(1)</a></p><p>Google CSP</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.google.com/complete/search?client=chrome&amp;q=123&amp;jsonp=alert(1)//">https://www.google.com/complete/search?client=chrome&amp;q=123&amp;jsonp=alert(1)//</a></p><p>CSP Bypass for <a target="_blank" rel="noopener noreferrer nofollow" href="http://opener.child.child.child.click">opener.child.child.child.click</a>()</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://octagon.net/blog/2022/05/29/bypass-csp-using-wordpress-by-abusing-same-origin-method-execution/">https://octagon.net/blog/2022/05/29/bypass-csp-using-wordpress-by-abusing-same-origin-method-execution/</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:55) BSides Takeaways and hacking on Meta</p><p>(00:12:12) NahamCon News</p><p>(00:23:45) CI/CD and the launch of Depi</p><p>(00:33:29) CSP Bypasses</p>]]></description>
  <embed_id>12c5c781-5ada-4204-9cb1-fb451672bc44</embed_id>
  <pubDate>Thu, 09 May 2024 10:01:01 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="41410278" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/4047eeec-40e1-4634-9d36-c60d23b0244f/episode.mp3" />
  <itunes:title><![CDATA[Episode 70: NahamCon and CSP Bypasses Everywhere]]></itunes:title>
  <itunes:duration>43:08</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 70: In this episode of Critical Thinking - Bug Bounty Podcast we’re once again joined by Ben Sadeghipour to talk about some Nahamcon news, as well as discuss a couple other LHE’s taking place. Then they cover CI/CD and drop some cool CSP Bypasses.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/NahamSec">https://twitter.com/NahamSec</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.nahamcon.com/">https://www.nahamcon.com/</a></p><p><strong>Resources:</strong></p><p>Depi</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.landh.tech/depi">https://www.landh.tech/depi</a></p><p>Youtube CSP:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/oembed?callback=alert()">https://www.youtube.com/oembed?callback=alert()</a></p><p>Maps CSP:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://maps.googleapis.com/maps/api/js?callback=alert()-print">https://maps.googleapis.com/maps/api/js?callback=alert()-print</a></p><p>Google APIs CSP</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.googleapis.com/customsearch/v1?callback=alert(1)">https://www.googleapis.com/customsearch/v1?callback=alert(1)</a></p><p>Google CSP</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.google.com/complete/search?client=chrome&amp;q=123&amp;jsonp=alert(1)//">https://www.google.com/complete/search?client=chrome&amp;q=123&amp;jsonp=alert(1)//</a></p><p>CSP Bypass for <a target="_blank" rel="noopener noreferrer nofollow" href="http://opener.child.child.child.click">opener.child.child.child.click</a>()</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://octagon.net/blog/2022/05/29/bypass-csp-using-wordpress-by-abusing-same-origin-method-execution/">https://octagon.net/blog/2022/05/29/bypass-csp-using-wordpress-by-abusing-same-origin-method-execution/</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:55) BSides Takeaways and hacking on Meta</p><p>(00:12:12) NahamCon News</p><p>(00:23:45) CI/CD and the launch of Depi</p><p>(00:33:29) CSP Bypasses</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 70: In this episode of Critical Thinking - Bug Bounty Podcast we’re once again joined by Ben Sadeghipour to talk about some Nahamcon news, as well as discuss a couple other LHE’s taking place. Then they cover CI/CD and drop some cool CSP Bypasses.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today's Sponsor - Project Discovery: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/NahamSec">https://twitter.com/NahamSec</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.nahamcon.com/">https://www.nahamcon.com/</a></p><p><strong>Resources:</strong></p><p>Depi</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.landh.tech/depi">https://www.landh.tech/depi</a></p><p>Youtube CSP:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/oembed?callback=alert()">https://www.youtube.com/oembed?callback=alert()</a></p><p>Maps CSP:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://maps.googleapis.com/maps/api/js?callback=alert()-print">https://maps.googleapis.com/maps/api/js?callback=alert()-print</a></p><p>Google APIs CSP</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.googleapis.com/customsearch/v1?callback=alert(1)">https://www.googleapis.com/customsearch/v1?callback=alert(1)</a></p><p>Google CSP</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.google.com/complete/search?client=chrome&amp;q=123&amp;jsonp=alert(1)//">https://www.google.com/complete/search?client=chrome&amp;q=123&amp;jsonp=alert(1)//</a></p><p>CSP Bypass for <a target="_blank" rel="noopener noreferrer nofollow" href="http://opener.child.child.child.click">opener.child.child.child.click</a>()</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://octagon.net/blog/2022/05/29/bypass-csp-using-wordpress-by-abusing-same-origin-method-execution/">https://octagon.net/blog/2022/05/29/bypass-csp-using-wordpress-by-abusing-same-origin-method-execution/</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:55) BSides Takeaways and hacking on Meta</p><p>(00:12:12) NahamCon News</p><p>(00:23:45) CI/CD and the launch of Depi</p><p>(00:33:29) CSP Bypasses</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 70: In this episode of Critical Thinking - Bug Bounty Podcast we’re once again joined by Ben Sadeghipour to talk about some Nahamcon news, as well as discuss a couple other LHE’s taking place. Then they cover CI/CD and drop some cool CSP By...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>70</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">239e2c9e-ed0d-4aae-a224-e33f85263e82</guid>
  <title><![CDATA[Episode 69: Johan Carlsson - 3 Month Check-in on Full-time Bug Bounty.]]></title>
  <description><![CDATA[<p>Episode 69: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Johan Carlsson to hear about some updates on his bug hunting journey. We deep-dive a CSP bypass he found in GitHub, a critical he found in GitLab's pipeline, and also talk through his approach to using script gadgets and adapting to highly CSP'd environments. Then we talk about his transition to full-time bug hunting, including the goals he’s set, the successes and challenges, and his current focus on specific bug types like ReDoS and OAuth, and the serendipitous nature of bug hunting.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Sign up for <a target="_blank" rel="noopener noreferrer nofollow" href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount. </p><p>Nuclei 3.2 Release: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Today’s Guest:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/joaxcar">https://twitter.com/joaxcar</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://joaxcar.com/blog/">https://joaxcar.com/blog/</a></p><p><strong>Resources</strong></p><p>Github CSP Bypass</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/joaxcar/6e5a0a34127704f4ea9449f6ce3369fc">https://gist.github.com/joaxcar/6e5a0a34127704f4ea9449f6ce3369fc</a></p><p>CSP Validator</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://cspvalidator.org/">https://cspvalidator.org/</a></p><p>Cross Window Forgery</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.paulosyibelo.com/2024/02/cross-window-forgery-web-attack-vector.html">https://www.paulosyibelo.com/2024/02/cross-window-forgery-web-attack-vector.html</a></p><p>Gitlab Crit</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/joaxcar/9419b2df8778f26e9b02a741a8ec12f8">https://gist.github.com/joaxcar/9419b2df8778f26e9b02a741a8ec12f8</a></p><p></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:09:34) Github CSP Bypass</p><p>(00:38:48) Script Gadgets and growth through Gitlab</p><p>(00:53:53) Gitlab pipeline bug</p><p>(01:12:32) Full-time Bug Bounty</p>]]></description>
  <embed_id>fd974566-f2ce-4ab7-97f7-bfe5602f48ce</embed_id>
  <pubDate>Thu, 02 May 2024 10:01:17 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="104706024" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/7a948ddf-7d64-4285-b512-79ddcedda865/episode.mp3" />
  <itunes:title><![CDATA[Episode 69: Johan Carlsson - 3 Month Check-in on Full-time Bug Bounty.]]></itunes:title>
  <itunes:duration>1:49:04</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 69: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Johan Carlsson to hear about some updates on his bug hunting journey. We deep-dive a CSP bypass he found in GitHub, a critical he found in GitLab's pipeline, and also talk through his approach to using script gadgets and adapting to highly CSP'd environments. Then we talk about his transition to full-time bug hunting, including the goals he’s set, the successes and challenges, and his current focus on specific bug types like ReDoS and OAuth, and the serendipitous nature of bug hunting.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Sign up for <a target="_blank" rel="noopener noreferrer nofollow" href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount. </p><p>Nuclei 3.2 Release: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Today’s Guest:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/joaxcar">https://twitter.com/joaxcar</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://joaxcar.com/blog/">https://joaxcar.com/blog/</a></p><p><strong>Resources</strong></p><p>Github CSP Bypass</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/joaxcar/6e5a0a34127704f4ea9449f6ce3369fc">https://gist.github.com/joaxcar/6e5a0a34127704f4ea9449f6ce3369fc</a></p><p>CSP Validator</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://cspvalidator.org/">https://cspvalidator.org/</a></p><p>Cross Window Forgery</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.paulosyibelo.com/2024/02/cross-window-forgery-web-attack-vector.html">https://www.paulosyibelo.com/2024/02/cross-window-forgery-web-attack-vector.html</a></p><p>Gitlab Crit</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/joaxcar/9419b2df8778f26e9b02a741a8ec12f8">https://gist.github.com/joaxcar/9419b2df8778f26e9b02a741a8ec12f8</a></p><p></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:09:34) Github CSP Bypass</p><p>(00:38:48) Script Gadgets and growth through Gitlab</p><p>(00:53:53) Gitlab pipeline bug</p><p>(01:12:32) Full-time Bug Bounty</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 69: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Johan Carlsson to hear about some updates on his bug hunting journey. We deep-dive a CSP bypass he found in GitHub, a critical he found in GitLab's pipeline, and also talk through his approach to using script gadgets and adapting to highly CSP'd environments. Then we talk about his transition to full-time bug hunting, including the goals he’s set, the successes and challenges, and his current focus on specific bug types like ReDoS and OAuth, and the serendipitous nature of bug hunting.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Sign up for <a target="_blank" rel="noopener noreferrer nofollow" href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount. </p><p>Nuclei 3.2 Release: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/podcast">https://nux.gg/podcast</a></p><p>Today’s Guest:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/joaxcar">https://twitter.com/joaxcar</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://joaxcar.com/blog/">https://joaxcar.com/blog/</a></p><p><strong>Resources</strong></p><p>Github CSP Bypass</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/joaxcar/6e5a0a34127704f4ea9449f6ce3369fc">https://gist.github.com/joaxcar/6e5a0a34127704f4ea9449f6ce3369fc</a></p><p>CSP Validator</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://cspvalidator.org/">https://cspvalidator.org/</a></p><p>Cross Window Forgery</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.paulosyibelo.com/2024/02/cross-window-forgery-web-attack-vector.html">https://www.paulosyibelo.com/2024/02/cross-window-forgery-web-attack-vector.html</a></p><p>Gitlab Crit</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://gist.github.com/joaxcar/9419b2df8778f26e9b02a741a8ec12f8">https://gist.github.com/joaxcar/9419b2df8778f26e9b02a741a8ec12f8</a></p><p></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:09:34) Github CSP Bypass</p><p>(00:38:48) Script Gadgets and growth through Gitlab</p><p>(00:53:53) Gitlab pipeline bug</p><p>(01:12:32) Full-time Bug Bounty</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 69: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Johan Carlsson to hear about some updates on his bug hunting journey. We deep-dive a CSP bypass he found in GitHub, a critical he found in GitLab's pipeline, and ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>69</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">0525cbe6-7dd0-4e43-ab20-424e0b32c890</guid>
  <title><![CDATA[Episode 68: 0-days & HTMX-SS with Mathias]]></title>
  <description><![CDATA[<p>Episode 68: In this episode of Critical Thinking - Bug Bounty Podcast Mathias is back with some fresh HTMX research, including CSP bypass using HTMX triggers, converting client-side response header injection to XSS, bypassing HTMX disable, and the challenges of using HTMX in larger applications and the potential performance trade-offs. We also talk about the results of his recent CTF Challenge, and explore some more facets of CDN-CGI functionality.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Project Discovery Conference:<a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/hss24"> https://nux.gg/hss24</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/avlidienbrunn">https://twitter.com/avlidienbrunn</a></p><p>Resources:</p><p>Masato Kinugawa's research on Teams</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://speakerdeck.com/masatokinugawa/how-i-hacked-microsoft-teams-and-got-150000-dollars-in-pwn2own?slide=33">https://speakerdeck.com/masatokinugawa/how-i-hacked-microsoft-teams-and-got-150000-dollars-in-pwn2own?slide=33</a></p><p>subdomain-only 307 open redirect</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://avlidienbrunn.se/cdn-cgi/image/onerror=redirect/http://anything.avlidienbrunn.se">https://avlidienbrunn.se/cdn-cgi/image/onerror=redirect/http://anything.avlidienbrunn.se</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:05:18) CSP Bypass using HTML</p><p>(00:14:00) Converting client-side response header injection to XSS</p><p>(00:23:10) Bypassing hx-disable</p><p>(00:32:37) XSS-ing impossible elements</p><p>(00:38:22) CTF challenge Recap and knowing there's a bug</p><p>(00:51:53) hx-on (depreciated)</p><p>(00:54:30) CDN-CGI Research discussion</p>]]></description>
  <embed_id>4a2e05d2-f071-4f49-81bf-76a6807aef87</embed_id>
  <pubDate>Thu, 25 Apr 2024 10:01:17 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="61330214" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/c64ff002-bd30-4677-af6d-ccc5adbc47a3/episode.mp3" />
  <itunes:title><![CDATA[Episode 68: 0-days & HTMX-SS with Mathias]]></itunes:title>
  <itunes:duration>1:03:53</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 68: In this episode of Critical Thinking - Bug Bounty Podcast Mathias is back with some fresh HTMX research, including CSP bypass using HTMX triggers, converting client-side response header injection to XSS, bypassing HTMX disable, and the challenges of using HTMX in larger applications and the potential performance trade-offs. We also talk about the results of his recent CTF Challenge, and explore some more facets of CDN-CGI functionality.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Project Discovery Conference:<a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/hss24"> https://nux.gg/hss24</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/avlidienbrunn">https://twitter.com/avlidienbrunn</a></p><p>Resources:</p><p>Masato Kinugawa's research on Teams</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://speakerdeck.com/masatokinugawa/how-i-hacked-microsoft-teams-and-got-150000-dollars-in-pwn2own?slide=33">https://speakerdeck.com/masatokinugawa/how-i-hacked-microsoft-teams-and-got-150000-dollars-in-pwn2own?slide=33</a></p><p>subdomain-only 307 open redirect</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://avlidienbrunn.se/cdn-cgi/image/onerror=redirect/http://anything.avlidienbrunn.se">https://avlidienbrunn.se/cdn-cgi/image/onerror=redirect/http://anything.avlidienbrunn.se</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:05:18) CSP Bypass using HTML</p><p>(00:14:00) Converting client-side response header injection to XSS</p><p>(00:23:10) Bypassing hx-disable</p><p>(00:32:37) XSS-ing impossible elements</p><p>(00:38:22) CTF challenge Recap and knowing there's a bug</p><p>(00:51:53) hx-on (depreciated)</p><p>(00:54:30) CDN-CGI Research discussion</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 68: In this episode of Critical Thinking - Bug Bounty Podcast Mathias is back with some fresh HTMX research, including CSP bypass using HTMX triggers, converting client-side response header injection to XSS, bypassing HTMX disable, and the challenges of using HTMX in larger applications and the potential performance trade-offs. We also talk about the results of his recent CTF Challenge, and explore some more facets of CDN-CGI functionality.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Project Discovery Conference:<a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/hss24"> https://nux.gg/hss24</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/avlidienbrunn">https://twitter.com/avlidienbrunn</a></p><p>Resources:</p><p>Masato Kinugawa's research on Teams</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://speakerdeck.com/masatokinugawa/how-i-hacked-microsoft-teams-and-got-150000-dollars-in-pwn2own?slide=33">https://speakerdeck.com/masatokinugawa/how-i-hacked-microsoft-teams-and-got-150000-dollars-in-pwn2own?slide=33</a></p><p>subdomain-only 307 open redirect</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://avlidienbrunn.se/cdn-cgi/image/onerror=redirect/http://anything.avlidienbrunn.se">https://avlidienbrunn.se/cdn-cgi/image/onerror=redirect/http://anything.avlidienbrunn.se</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:05:18) CSP Bypass using HTML</p><p>(00:14:00) Converting client-side response header injection to XSS</p><p>(00:23:10) Bypassing hx-disable</p><p>(00:32:37) XSS-ing impossible elements</p><p>(00:38:22) CTF challenge Recap and knowing there's a bug</p><p>(00:51:53) hx-on (depreciated)</p><p>(00:54:30) CDN-CGI Research discussion</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 68: In this episode of Critical Thinking - Bug Bounty Podcast Mathias is back with some fresh HTMX research, including CSP bypass using HTMX triggers, converting client-side response header injection to XSS, bypassing HTMX disable, and the ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>68</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">ad0c6da7-8a1c-4896-a7bc-ea6db3c8afb2</guid>
  <title><![CDATA[Episode 67: VDPs & Accidental Program VS Hacker Debate Part 2]]></title>
  <description><![CDATA[<p>Episode 67: In this episode of Critical Thinking - Bug Bounty Podcast we deepdive on the topic of Vulnerability Disclosure Programs (VDPs) and whether they are beneficial or not. We also touch on the topic of leaderboard accuracy, and continue the Program VS Hacker debate regarding allocating funds for bounties.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Project Discovery Conference:<a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/hss24"> https://nux.gg/hss24</a></p><p>Resources:</p><p>Nagli's Braindump on VDPs</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/galnagli/status/1780174392003031515">https://twitter.com/galnagli/status/1780174392003031515</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:37) VDP programs</p><p>(00:34:10) Leaderboards</p><p>(00:43:52) Hacker vs. Program debate Part 2</p><p>(01:07:24) Walling Off Endpoints</p>]]></description>
  <embed_id>90e2ebcd-97b2-47c0-bbe5-2662894a175c</embed_id>
  <pubDate>Thu, 18 Apr 2024 10:01:45 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="76658029" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/1d51f6ff-21c1-4eb1-988a-4ee7a1b9599e/episode.mp3" />
  <itunes:title><![CDATA[Episode 67: VDPs & Accidental Program VS Hacker Debate Part 2]]></itunes:title>
  <itunes:duration>1:19:51</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 67: In this episode of Critical Thinking - Bug Bounty Podcast we deepdive on the topic of Vulnerability Disclosure Programs (VDPs) and whether they are beneficial or not. We also touch on the topic of leaderboard accuracy, and continue the Program VS Hacker debate regarding allocating funds for bounties.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Project Discovery Conference:<a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/hss24"> https://nux.gg/hss24</a></p><p>Resources:</p><p>Nagli's Braindump on VDPs</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/galnagli/status/1780174392003031515">https://twitter.com/galnagli/status/1780174392003031515</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:37) VDP programs</p><p>(00:34:10) Leaderboards</p><p>(00:43:52) Hacker vs. Program debate Part 2</p><p>(01:07:24) Walling Off Endpoints</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 67: In this episode of Critical Thinking - Bug Bounty Podcast we deepdive on the topic of Vulnerability Disclosure Programs (VDPs) and whether they are beneficial or not. We also touch on the topic of leaderboard accuracy, and continue the Program VS Hacker debate regarding allocating funds for bounties.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Project Discovery Conference:<a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/hss24"> https://nux.gg/hss24</a></p><p>Resources:</p><p>Nagli's Braindump on VDPs</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/galnagli/status/1780174392003031515">https://twitter.com/galnagli/status/1780174392003031515</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:37) VDP programs</p><p>(00:34:10) Leaderboards</p><p>(00:43:52) Hacker vs. Program debate Part 2</p><p>(01:07:24) Walling Off Endpoints</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 67: In this episode of Critical Thinking - Bug Bounty Podcast we deepdive on the topic of Vulnerability Disclosure Programs (VDPs) and whether they are beneficial or not. We also touch on the topic of leaderboard accuracy, and continue the ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>67</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">6399b683-2198-41e0-a0cf-199762a9b810</guid>
  <title><![CDATA[Episode 66: CDN-CGI Research, Intent To Ship, and Louis Vuitton]]></title>
  <description><![CDATA[<p>Episode 66: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss the recent YesWeHack Louis Vuitton LHE, the importance of failure as growth in bug bounty, and Justin shares his research on CDN CGI.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Project Discovery Conference: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/hss24">https://nux.gg/hss24</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Resources:</p><p>YesWeHack Luis Vuitton LHE</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/yeswehack/status/1776280653744554287">https://twitter.com/yeswehack/status/1776280653744554287</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://event.yeswehack.com/events/hack-me-im-famous-2">https://event.yeswehack.com/events/hack-me-im-famous-2</a></p><p>Caido Workflows</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/caido/workflows">https://github.com/caido/workflows</a></p><p>Oauth Redirects</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/Akshanshjaiswl/status/1724143813088940192">https://twitter.com/Akshanshjaiswl/status/1724143813088940192</a></p><p>Bagipro Golden URL techniques</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/431002">https://hackerone.com/reports/431002</a></p><p>Roadmap I followed to make 15,000+$ Bounties in my first 8 months <a target="_blank" rel="noopener noreferrer nofollow" href="https://shreyaschavhan.notion.site/Roadmap-I-followed-to-make-15-000-Bounties-in-my-first-8-months-of-starting-out-and-my-journey-98b1b9ff621645c0b97d1e774992f300">https://shreyaschavhan.notion.site/Roadmap-I-followed-to-make-15-000-Bounties-in-my-first-8-months-of-starting-out-and-my-journey-98b1b9ff621645c0b97d1e774992f300</a></p><p>Monke Hacks Blog</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://monkehacks.beehiiv.com/">https://monkehacks.beehiiv.com/</a></p><p>PortSwigger post</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/PortSwiggerRes/status/1766087129908576760">https://x.com/PortSwiggerRes/status/1766087129908576760</a></p><p>post from Masato Kinugawa</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/kinugawamasato/status/916393484147290113">https://x.com/kinugawamasato/status/916393484147290113</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:19) Louis Vuitton LHE</p><p>(00:13:57) Browser Market share</p><p>(00:21:13) Justin's Bug of the Week</p><p>(00:24:49) Caido Workflows</p><p>(00:27:24) Oauth Redirects</p><p>(00:32:24) Bug Bounty learning Methodology</p><p>(00:41:03) 'Intent To Ship'</p><p>(00:48:08) CDN-CGI Research</p>]]></description>
  <embed_id>0933aa46-a885-4d4c-8a87-4ec6b5aac676</embed_id>
  <pubDate>Thu, 11 Apr 2024 10:00:58 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="56002069" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/a43e2b24-df62-44b0-80e5-cded61f779d1/episode.mp3" />
  <itunes:title><![CDATA[Episode 66: CDN-CGI Research, Intent To Ship, and Louis Vuitton]]></itunes:title>
  <itunes:duration>58:20</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 66: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss the recent YesWeHack Louis Vuitton LHE, the importance of failure as growth in bug bounty, and Justin shares his research on CDN CGI.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Project Discovery Conference: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/hss24">https://nux.gg/hss24</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Resources:</p><p>YesWeHack Luis Vuitton LHE</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/yeswehack/status/1776280653744554287">https://twitter.com/yeswehack/status/1776280653744554287</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://event.yeswehack.com/events/hack-me-im-famous-2">https://event.yeswehack.com/events/hack-me-im-famous-2</a></p><p>Caido Workflows</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/caido/workflows">https://github.com/caido/workflows</a></p><p>Oauth Redirects</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/Akshanshjaiswl/status/1724143813088940192">https://twitter.com/Akshanshjaiswl/status/1724143813088940192</a></p><p>Bagipro Golden URL techniques</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/431002">https://hackerone.com/reports/431002</a></p><p>Roadmap I followed to make 15,000+$ Bounties in my first 8 months <a target="_blank" rel="noopener noreferrer nofollow" href="https://shreyaschavhan.notion.site/Roadmap-I-followed-to-make-15-000-Bounties-in-my-first-8-months-of-starting-out-and-my-journey-98b1b9ff621645c0b97d1e774992f300">https://shreyaschavhan.notion.site/Roadmap-I-followed-to-make-15-000-Bounties-in-my-first-8-months-of-starting-out-and-my-journey-98b1b9ff621645c0b97d1e774992f300</a></p><p>Monke Hacks Blog</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://monkehacks.beehiiv.com/">https://monkehacks.beehiiv.com/</a></p><p>PortSwigger post</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/PortSwiggerRes/status/1766087129908576760">https://x.com/PortSwiggerRes/status/1766087129908576760</a></p><p>post from Masato Kinugawa</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/kinugawamasato/status/916393484147290113">https://x.com/kinugawamasato/status/916393484147290113</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:19) Louis Vuitton LHE</p><p>(00:13:57) Browser Market share</p><p>(00:21:13) Justin's Bug of the Week</p><p>(00:24:49) Caido Workflows</p><p>(00:27:24) Oauth Redirects</p><p>(00:32:24) Bug Bounty learning Methodology</p><p>(00:41:03) 'Intent To Ship'</p><p>(00:48:08) CDN-CGI Research</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 66: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss the recent YesWeHack Louis Vuitton LHE, the importance of failure as growth in bug bounty, and Justin shares his research on CDN CGI.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Project Discovery Conference: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/hss24">https://nux.gg/hss24</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Resources:</p><p>YesWeHack Luis Vuitton LHE</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/yeswehack/status/1776280653744554287">https://twitter.com/yeswehack/status/1776280653744554287</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://event.yeswehack.com/events/hack-me-im-famous-2">https://event.yeswehack.com/events/hack-me-im-famous-2</a></p><p>Caido Workflows</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/caido/workflows">https://github.com/caido/workflows</a></p><p>Oauth Redirects</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/Akshanshjaiswl/status/1724143813088940192">https://twitter.com/Akshanshjaiswl/status/1724143813088940192</a></p><p>Bagipro Golden URL techniques</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/431002">https://hackerone.com/reports/431002</a></p><p>Roadmap I followed to make 15,000+$ Bounties in my first 8 months <a target="_blank" rel="noopener noreferrer nofollow" href="https://shreyaschavhan.notion.site/Roadmap-I-followed-to-make-15-000-Bounties-in-my-first-8-months-of-starting-out-and-my-journey-98b1b9ff621645c0b97d1e774992f300">https://shreyaschavhan.notion.site/Roadmap-I-followed-to-make-15-000-Bounties-in-my-first-8-months-of-starting-out-and-my-journey-98b1b9ff621645c0b97d1e774992f300</a></p><p>Monke Hacks Blog</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://monkehacks.beehiiv.com/">https://monkehacks.beehiiv.com/</a></p><p>PortSwigger post</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/PortSwiggerRes/status/1766087129908576760">https://x.com/PortSwiggerRes/status/1766087129908576760</a></p><p>post from Masato Kinugawa</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/kinugawamasato/status/916393484147290113">https://x.com/kinugawamasato/status/916393484147290113</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:19) Louis Vuitton LHE</p><p>(00:13:57) Browser Market share</p><p>(00:21:13) Justin's Bug of the Week</p><p>(00:24:49) Caido Workflows</p><p>(00:27:24) Oauth Redirects</p><p>(00:32:24) Bug Bounty learning Methodology</p><p>(00:41:03) 'Intent To Ship'</p><p>(00:48:08) CDN-CGI Research</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 66: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss the recent YesWeHack Louis Vuitton LHE, the importance of failure as growth in bug bounty, and Justin shares his research on CDN CGI.Follow us on twitter ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>66</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">8060f22c-5d77-442c-aa46-a676c40e6fd7</guid>
  <title><![CDATA[Episode 65: Motivation and Methodology with Sam Curry (Zlz)]]></title>
  <description><![CDATA[<p>Episode 65: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with Sam Curry to discuss the ethical considerations and effectiveness of hacking, the importance of good intent, and the enjoyment Sam derives from pushing the boundaries to find bugs. He shares stories of his experiences, including hacking Tesla, online casinos,Starbucks, his own is ISP router, and even getting detained at the airport.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Project Discovery Conference: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/hss24">https://nux.gg/hss24</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/">https://samcurry.net/</a></p><p></p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/dont-force-yourself-to-become-a-bug-bounty-hunter/">Don’t Force Yourself to Become a Bug Bounty Hunter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackcompute.com/">hackcompute</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/hacking-starbucks/">Starbucks Bug</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/0xacb/recollapse">recollapse</a></p><p></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:25) Hacking Journey and the limits of Ethical Hacking</p><p>(00:28:28) Selecting companies to hack</p><p>(00:33:22) Fostering passion vs. Forcing performance</p><p>(00:54:06) Collaboration and Hackcompute</p><p>(01:00:40) The Efficacy of Bug Bounty</p><p>(01:09:20) Secondary Context Bugs</p><p>(01:25:01) Mindmaps, note-taking, and Intuition.</p><p>(01:46:56) Back-end traversals and Unicode</p><p>(01:56:16) Hacking ISP</p><p>(02:06:58) Next.js and Crypto</p><p>(02:22:24) Dev vs. Prod JWT</p>]]></description>
  <embed_id>1df27910-f9a1-4e48-bdcc-ddd459a77a83</embed_id>
  <pubDate>Thu, 04 Apr 2024 10:01:04 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="143121906" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/690c1606-65c0-4935-99eb-c04b65831a6e/episode.mp3" />
  <itunes:title><![CDATA[Episode 65: Motivation and Methodology with Sam Curry (Zlz)]]></itunes:title>
  <itunes:duration>2:29:05</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 65: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with Sam Curry to discuss the ethical considerations and effectiveness of hacking, the importance of good intent, and the enjoyment Sam derives from pushing the boundaries to find bugs. He shares stories of his experiences, including hacking Tesla, online casinos,Starbucks, his own is ISP router, and even getting detained at the airport.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Project Discovery Conference: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/hss24">https://nux.gg/hss24</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/">https://samcurry.net/</a></p><p></p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/dont-force-yourself-to-become-a-bug-bounty-hunter/">Don’t Force Yourself to Become a Bug Bounty Hunter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackcompute.com/">hackcompute</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/hacking-starbucks/">Starbucks Bug</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/0xacb/recollapse">recollapse</a></p><p></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:25) Hacking Journey and the limits of Ethical Hacking</p><p>(00:28:28) Selecting companies to hack</p><p>(00:33:22) Fostering passion vs. Forcing performance</p><p>(00:54:06) Collaboration and Hackcompute</p><p>(01:00:40) The Efficacy of Bug Bounty</p><p>(01:09:20) Secondary Context Bugs</p><p>(01:25:01) Mindmaps, note-taking, and Intuition.</p><p>(01:46:56) Back-end traversals and Unicode</p><p>(01:56:16) Hacking ISP</p><p>(02:06:58) Next.js and Crypto</p><p>(02:22:24) Dev vs. Prod JWT</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 65: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with Sam Curry to discuss the ethical considerations and effectiveness of hacking, the importance of good intent, and the enjoyment Sam derives from pushing the boundaries to find bugs. He shares stories of his experiences, including hacking Tesla, online casinos,Starbucks, his own is ISP router, and even getting detained at the airport.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Project Discovery Conference: <a target="_blank" rel="noopener noreferrer nofollow" href="https://nux.gg/hss24">https://nux.gg/hss24</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/">https://samcurry.net/</a></p><p></p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/dont-force-yourself-to-become-a-bug-bounty-hunter/">Don’t Force Yourself to Become a Bug Bounty Hunter</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackcompute.com/">hackcompute</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://samcurry.net/hacking-starbucks/">Starbucks Bug</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/0xacb/recollapse">recollapse</a></p><p></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:25) Hacking Journey and the limits of Ethical Hacking</p><p>(00:28:28) Selecting companies to hack</p><p>(00:33:22) Fostering passion vs. Forcing performance</p><p>(00:54:06) Collaboration and Hackcompute</p><p>(01:00:40) The Efficacy of Bug Bounty</p><p>(01:09:20) Secondary Context Bugs</p><p>(01:25:01) Mindmaps, note-taking, and Intuition.</p><p>(01:46:56) Back-end traversals and Unicode</p><p>(01:56:16) Hacking ISP</p><p>(02:06:58) Next.js and Crypto</p><p>(02:22:24) Dev vs. Prod JWT</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 65: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with Sam Curry to discuss the ethical considerations and effectiveness of hacking, the importance of good intent, and the enjoyment Sam derives from pushing the bound...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>65</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">196fe7ea-c20a-4649-a1bf-e52ad70d01f7</guid>
  <title><![CDATA[Episode 64: .NET Remoting, CDN Attack Surface, and Recon vs Main App ]]></title>
  <description><![CDATA[<p>Episode 64: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Justin and Joel delve into .NET remoting and how it can be exploited, a recent bypass in the Dom Purify library and some interesting functionality in the Cloudflare CDN-CGI endpoint. They also touch on the importance of collaboration and knowledge sharing, JavaScript Deobfuscation, the value of impactful POCs, hiding XSS payloads with URL path updates.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out Project Discovery’s nuclei 3.2 release blog at <a target="_blank" rel="noopener noreferrer nofollow" href="http://nux.gg/podcast">nux.gg/podcast</a></p><p>Resources:</p><p>.NET Remoting</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://code-white.com/blog/leaking-objrefs-to-exploit-http-dotnet-remoting/">https://code-white.com/blog/leaking-objrefs-to-exploit-http-dotnet-remoting/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/codewhitesec/HttpRemotingObjRefLeak">https://github.com/codewhitesec/HttpRemotingObjRefLeak</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.slonser.info/posts/dompurify-node-type-confusion/">DOM Purify Bug</a></p><p>Cloudflare /cdn-cgi/</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developers.cloudflare.com/fundamentals/reference/cdn-cgi-endpoint/">https://developers.cloudflare.com/fundamentals/reference/cdn-cgi-endpoint/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/when-security-features-collide">https://portswigger.net/research/when-security-features-collide</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/kinugawamasato/status/893404078365069312">https://twitter.com/kinugawamasato/status/893404078365069312</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/m4ll0k/status/1770153059496108231">https://twitter.com/m4ll0k/status/1770153059496108231</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@jad2121/javascript-deobfuscation-the-easy-way-637d7e9b2952">XSSDoctor's writeup on Javascript deobfuscation</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/renniepak/status/1772262686761332893?s=20">renniepak's tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/nnwakelam/status/1769990551850377254">Naffy's tweet</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:07:15) .Net Remoting</p><p>(00:17:29) DOM Purify Bug</p><p>(00:25:56) Cloudflare /cdn-cgi/</p><p>(00:37:11) Javascript deobfuscation</p><p>(00:47:26) renniepak's tweet</p><p>(00:55:20) Naffy's tweet</p>]]></description>
  <embed_id>7be7f3a3-4ae5-405f-bd3f-5a437a32e4ee</embed_id>
  <pubDate>Thu, 28 Mar 2024 10:01:38 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="65345964" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/c242b00b-1542-4d7d-9ac2-35421700a461/episode.mp3" />
  <itunes:title><![CDATA[Episode 64: .NET Remoting, CDN Attack Surface, and Recon vs Main App ]]></itunes:title>
  <itunes:duration>1:08:04</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 64: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Justin and Joel delve into .NET remoting and how it can be exploited, a recent bypass in the Dom Purify library and some interesting functionality in the Cloudflare CDN-CGI endpoint. They also touch on the importance of collaboration and knowledge sharing, JavaScript Deobfuscation, the value of impactful POCs, hiding XSS payloads with URL path updates.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out Project Discovery’s nuclei 3.2 release blog at <a target="_blank" rel="noopener noreferrer nofollow" href="http://nux.gg/podcast">nux.gg/podcast</a></p><p>Resources:</p><p>.NET Remoting</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://code-white.com/blog/leaking-objrefs-to-exploit-http-dotnet-remoting/">https://code-white.com/blog/leaking-objrefs-to-exploit-http-dotnet-remoting/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/codewhitesec/HttpRemotingObjRefLeak">https://github.com/codewhitesec/HttpRemotingObjRefLeak</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.slonser.info/posts/dompurify-node-type-confusion/">DOM Purify Bug</a></p><p>Cloudflare /cdn-cgi/</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developers.cloudflare.com/fundamentals/reference/cdn-cgi-endpoint/">https://developers.cloudflare.com/fundamentals/reference/cdn-cgi-endpoint/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/when-security-features-collide">https://portswigger.net/research/when-security-features-collide</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/kinugawamasato/status/893404078365069312">https://twitter.com/kinugawamasato/status/893404078365069312</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/m4ll0k/status/1770153059496108231">https://twitter.com/m4ll0k/status/1770153059496108231</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@jad2121/javascript-deobfuscation-the-easy-way-637d7e9b2952">XSSDoctor's writeup on Javascript deobfuscation</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/renniepak/status/1772262686761332893?s=20">renniepak's tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/nnwakelam/status/1769990551850377254">Naffy's tweet</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:07:15) .Net Remoting</p><p>(00:17:29) DOM Purify Bug</p><p>(00:25:56) Cloudflare /cdn-cgi/</p><p>(00:37:11) Javascript deobfuscation</p><p>(00:47:26) renniepak's tweet</p><p>(00:55:20) Naffy's tweet</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 64: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Justin and Joel delve into .NET remoting and how it can be exploited, a recent bypass in the Dom Purify library and some interesting functionality in the Cloudflare CDN-CGI endpoint. They also touch on the importance of collaboration and knowledge sharing, JavaScript Deobfuscation, the value of impactful POCs, hiding XSS payloads with URL path updates.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Check out Project Discovery’s nuclei 3.2 release blog at <a target="_blank" rel="noopener noreferrer nofollow" href="http://nux.gg/podcast">nux.gg/podcast</a></p><p>Resources:</p><p>.NET Remoting</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://code-white.com/blog/leaking-objrefs-to-exploit-http-dotnet-remoting/">https://code-white.com/blog/leaking-objrefs-to-exploit-http-dotnet-remoting/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/codewhitesec/HttpRemotingObjRefLeak">https://github.com/codewhitesec/HttpRemotingObjRefLeak</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.slonser.info/posts/dompurify-node-type-confusion/">DOM Purify Bug</a></p><p>Cloudflare /cdn-cgi/</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developers.cloudflare.com/fundamentals/reference/cdn-cgi-endpoint/">https://developers.cloudflare.com/fundamentals/reference/cdn-cgi-endpoint/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/when-security-features-collide">https://portswigger.net/research/when-security-features-collide</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/kinugawamasato/status/893404078365069312">https://twitter.com/kinugawamasato/status/893404078365069312</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/m4ll0k/status/1770153059496108231">https://twitter.com/m4ll0k/status/1770153059496108231</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://medium.com/@jad2121/javascript-deobfuscation-the-easy-way-637d7e9b2952">XSSDoctor's writeup on Javascript deobfuscation</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/renniepak/status/1772262686761332893?s=20">renniepak's tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/nnwakelam/status/1769990551850377254">Naffy's tweet</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:07:15) .Net Remoting</p><p>(00:17:29) DOM Purify Bug</p><p>(00:25:56) Cloudflare /cdn-cgi/</p><p>(00:37:11) Javascript deobfuscation</p><p>(00:47:26) renniepak's tweet</p><p>(00:55:20) Naffy's tweet</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 64: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Justin and Joel delve into .NET remoting and how it can be exploited, a recent bypass in the Dom Purify library and some interesting functionality in the Cloudflare...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>64</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">8f419408-58af-4c6b-add3-02d107edfa8c</guid>
  <title><![CDATA[Episode 63: JHaddix Returns]]></title>
  <description><![CDATA[<p>Episode 63: In this episode of Critical Thinking - Bug Bounty Podcast we welcome back Jason Haddix (From Episode 12) to talk about some updates to his The Bug Hunter's Methodology, as well as his own personal life and hacking journey. We talk about the start of his new company, and then venture into topics such as using threat intelligence and buying credentials from the dark web, recon techniques, and ways to integrate AI into your workflow (or target list).</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Today’s Guest:</p><p><a href="https://twitter.com/Jhaddix">https://twitter.com/Jhaddix</a></p><p><a href="https://www.arcanum-sec.com/">https://www.arcanum-sec.com/</a></p><p>Resources:</p><p>Dehashed</p><p><a href="https://www.dehashed.com/">https://www.dehashed.com/</a></p><p>Flare</p><p><a href="https://flare.io/">https://flare.io/</a></p><p>CSP Recon</p><p><a href="https://github.com/edoardottt/csprecon">https://github.com/edoardottt/csprecon</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:37) Updates to The Bug Hunter's Methodology</p><p>(00:14:46) Red Teaming</p><p>(00:21:29) Bug Bounty on the Dark Web</p><p>(00:36:19) FIS hunting</p><p>(00:47:59) New Recon Techniques&nbsp;</p><p>(00:58:32) AI integrations and bounties</p>]]></description>
  <embed_id>dbb8f392-71c9-4a07-b64d-db5088e8ed75</embed_id>
  <pubDate>Thu, 21 Mar 2024 10:00:48 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="78322351" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/e5969e7c-2785-44de-a7ab-6a6ee547dc49/episode.mp3" />
  <itunes:title><![CDATA[Episode 63: JHaddix Returns]]></itunes:title>
  <itunes:duration>1:21:35</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 63: In this episode of Critical Thinking - Bug Bounty Podcast we welcome back Jason Haddix (From Episode 12) to talk about some updates to his The Bug Hunter's Methodology, as well as his own personal life and hacking journey. We talk about the start of his new company, and then venture into topics such as using threat intelligence and buying credentials from the dark web, recon techniques, and ways to integrate AI into your workflow (or target list).</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Today’s Guest:</p><p><a href="https://twitter.com/Jhaddix">https://twitter.com/Jhaddix</a></p><p><a href="https://www.arcanum-sec.com/">https://www.arcanum-sec.com/</a></p><p>Resources:</p><p>Dehashed</p><p><a href="https://www.dehashed.com/">https://www.dehashed.com/</a></p><p>Flare</p><p><a href="https://flare.io/">https://flare.io/</a></p><p>CSP Recon</p><p><a href="https://github.com/edoardottt/csprecon">https://github.com/edoardottt/csprecon</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:37) Updates to The Bug Hunter's Methodology</p><p>(00:14:46) Red Teaming</p><p>(00:21:29) Bug Bounty on the Dark Web</p><p>(00:36:19) FIS hunting</p><p>(00:47:59) New Recon Techniques&nbsp;</p><p>(00:58:32) AI integrations and bounties</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 63: In this episode of Critical Thinking - Bug Bounty Podcast we welcome back Jason Haddix (From Episode 12) to talk about some updates to his The Bug Hunter's Methodology, as well as his own personal life and hacking journey. We talk about the start of his new company, and then venture into topics such as using threat intelligence and buying credentials from the dark web, recon techniques, and ways to integrate AI into your workflow (or target list).</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Today’s Guest:</p><p><a href="https://twitter.com/Jhaddix">https://twitter.com/Jhaddix</a></p><p><a href="https://www.arcanum-sec.com/">https://www.arcanum-sec.com/</a></p><p>Resources:</p><p>Dehashed</p><p><a href="https://www.dehashed.com/">https://www.dehashed.com/</a></p><p>Flare</p><p><a href="https://flare.io/">https://flare.io/</a></p><p>CSP Recon</p><p><a href="https://github.com/edoardottt/csprecon">https://github.com/edoardottt/csprecon</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:37) Updates to The Bug Hunter's Methodology</p><p>(00:14:46) Red Teaming</p><p>(00:21:29) Bug Bounty on the Dark Web</p><p>(00:36:19) FIS hunting</p><p>(00:47:59) New Recon Techniques&nbsp;</p><p>(00:58:32) AI integrations and bounties</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 63: In this episode of Critical Thinking - Bug Bounty Podcast we welcome back Jason Haddix (From Episode 12) to talk about some updates to his The Bug Hunter's Methodology, as well as his own personal life and hacking journey. We talk about...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>63</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">ddff2b56-65b8-4fbb-b8b9-574ed17a0362</guid>
  <title><![CDATA[Episode 62: Frontend Language Oddities]]></title>
  <description><![CDATA[<p>Episode 62: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel are back with some additional research resources that didn’t make the Portswigger Top-Ten, but that are worth looking at.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek </a>on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Resources:</p><p>Cool HTML Shit</p><p><a href="https://twitter.com/jcubic/status/1764311080661082201">https://twitter.com/jcubic/status/1764311080661082201</a></p><p><a href="https://twitter.com/encodeart/status/1764218128374943764">https://twitter.com/encodeart/status/1764218128374943764</a></p><p>Bug bounty Hunting Journeys</p><p><a href="https://twitter.com/ajxchapman/status/1762101366057525521">https://twitter.com/ajxchapman/status/1762101366057525521</a></p><p><a href="https://monkehacks.beehiiv.com/p/monkehacks-02">https://monkehacks.beehiiv.com/p/monkehacks-02</a></p><p><a href="https://hackerone.com/reports/2089042">Yelp Cookie Bridge Report</a></p><p><a href="https://gist.github.com/0xdevalias/d8b743efb82c0e9406fc69da0d6c6581#deobfuscating--unminifying-obfuscated-web-app-code">Deobfuscating/Unminifying Obfuscated Code</a></p><p><a href="https://github.com/0xdevalias/chatgpt-source-watch">ChatGPT Source Watch</a></p><p><a href="https://www.reddit.com/r/websecurityresearch/">Web Security Research Reddit</a></p><p><a href="https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters">Nahamsec Resources</a></p><p><a href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2023-nominations-open">Portswigger Nominations list</a></p><p>Abusing perspectives: <a href="https://hackerone.com/reports/2401115">https://hackerone.com/reports/2401115</a></p><p>PortSwigger CSS Exfiltration</p><p><a href="https://github.com/PortSwigger/css-exfiltration">https://github.com/PortSwigger/css-exfiltration</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:06) Cool HTML Shit</p><p>(00:15:31) Bug Bounty Journeys</p><p>(00:28:01) Yelp Cookie Bridge Bug</p><p>(00:37:56) Additional Research Resources</p><p>(00:46:34) CSS and abusing perspectives</p>]]></description>
  <embed_id>8168a562-0f89-4147-8c15-5aaba83ef0b2</embed_id>
  <pubDate>Thu, 14 Mar 2024 10:00:36 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="56369873" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/d310200e-ba02-4114-91d6-3387752f1dc9/episode.mp3" />
  <itunes:title><![CDATA[Episode 62: Frontend Language Oddities]]></itunes:title>
  <itunes:duration>58:43</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 62: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel are back with some additional research resources that didn’t make the Portswigger Top-Ten, but that are worth looking at.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek </a>on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Resources:</p><p>Cool HTML Shit</p><p><a href="https://twitter.com/jcubic/status/1764311080661082201">https://twitter.com/jcubic/status/1764311080661082201</a></p><p><a href="https://twitter.com/encodeart/status/1764218128374943764">https://twitter.com/encodeart/status/1764218128374943764</a></p><p>Bug bounty Hunting Journeys</p><p><a href="https://twitter.com/ajxchapman/status/1762101366057525521">https://twitter.com/ajxchapman/status/1762101366057525521</a></p><p><a href="https://monkehacks.beehiiv.com/p/monkehacks-02">https://monkehacks.beehiiv.com/p/monkehacks-02</a></p><p><a href="https://hackerone.com/reports/2089042">Yelp Cookie Bridge Report</a></p><p><a href="https://gist.github.com/0xdevalias/d8b743efb82c0e9406fc69da0d6c6581#deobfuscating--unminifying-obfuscated-web-app-code">Deobfuscating/Unminifying Obfuscated Code</a></p><p><a href="https://github.com/0xdevalias/chatgpt-source-watch">ChatGPT Source Watch</a></p><p><a href="https://www.reddit.com/r/websecurityresearch/">Web Security Research Reddit</a></p><p><a href="https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters">Nahamsec Resources</a></p><p><a href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2023-nominations-open">Portswigger Nominations list</a></p><p>Abusing perspectives: <a href="https://hackerone.com/reports/2401115">https://hackerone.com/reports/2401115</a></p><p>PortSwigger CSS Exfiltration</p><p><a href="https://github.com/PortSwigger/css-exfiltration">https://github.com/PortSwigger/css-exfiltration</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:06) Cool HTML Shit</p><p>(00:15:31) Bug Bounty Journeys</p><p>(00:28:01) Yelp Cookie Bridge Bug</p><p>(00:37:56) Additional Research Resources</p><p>(00:46:34) CSS and abusing perspectives</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 62: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel are back with some additional research resources that didn’t make the Portswigger Top-Ten, but that are worth looking at.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek </a>on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Resources:</p><p>Cool HTML Shit</p><p><a href="https://twitter.com/jcubic/status/1764311080661082201">https://twitter.com/jcubic/status/1764311080661082201</a></p><p><a href="https://twitter.com/encodeart/status/1764218128374943764">https://twitter.com/encodeart/status/1764218128374943764</a></p><p>Bug bounty Hunting Journeys</p><p><a href="https://twitter.com/ajxchapman/status/1762101366057525521">https://twitter.com/ajxchapman/status/1762101366057525521</a></p><p><a href="https://monkehacks.beehiiv.com/p/monkehacks-02">https://monkehacks.beehiiv.com/p/monkehacks-02</a></p><p><a href="https://hackerone.com/reports/2089042">Yelp Cookie Bridge Report</a></p><p><a href="https://gist.github.com/0xdevalias/d8b743efb82c0e9406fc69da0d6c6581#deobfuscating--unminifying-obfuscated-web-app-code">Deobfuscating/Unminifying Obfuscated Code</a></p><p><a href="https://github.com/0xdevalias/chatgpt-source-watch">ChatGPT Source Watch</a></p><p><a href="https://www.reddit.com/r/websecurityresearch/">Web Security Research Reddit</a></p><p><a href="https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters">Nahamsec Resources</a></p><p><a href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2023-nominations-open">Portswigger Nominations list</a></p><p>Abusing perspectives: <a href="https://hackerone.com/reports/2401115">https://hackerone.com/reports/2401115</a></p><p>PortSwigger CSS Exfiltration</p><p><a href="https://github.com/PortSwigger/css-exfiltration">https://github.com/PortSwigger/css-exfiltration</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:06) Cool HTML Shit</p><p>(00:15:31) Bug Bounty Journeys</p><p>(00:28:01) Yelp Cookie Bridge Bug</p><p>(00:37:56) Additional Research Resources</p><p>(00:46:34) CSS and abusing perspectives</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 62: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel are back with some additional research resources that didn’t make the Portswigger Top-Ten, but that are worth looking at.Follow us on twitter at: @ctbbpodcastFeel...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>62</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">b7585de8-bc00-4860-bf85-17c8bbd8c18a</guid>
  <title><![CDATA[Episode 61: A Hacker on Wall Street - JR0ch17]]></title>
  <description><![CDATA[<p>Episode 61: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Jasmin Landry to share some stories about startup security, bug bounty, and the challenges of balancing both. He also shares his methodology for discovering OAuth-related bugs, highlights some differences between structured learning and self-teaching, and then walks us through  a couple arbitrary ATO’s and SSTI to RCE bugs he’s found lately.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest: Jasmin Landry</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/JR0ch17">https://twitter.com/JR0ch17</a></p><p><strong>Resources:</strong></p><p>Dirty Dancing blog post</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/writeups/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows/">https://labs.detectify.com/writeups/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows/</a></p><p>OAuth 2.0 Threat Model and Security Considerations</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://datatracker.ietf.org/doc/html/rfc6819">https://datatracker.ietf.org/doc/html/rfc6819</a></p><p>OAuth 2.0 Security Best Current Practice</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics">https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:20) Meta Tag + DomPurify Bug</p><p>(00:09:36) Jasmin's Origin story</p><p>(00:28:23) Full time Bug bounty challenges</p><p>(00:36:57) Career jumps in Security and current Role</p><p>(00:47:32) OAuth Bug methodology and cool bug stories</p><p>(01:02:35) Social Engineering and Bug Bounty</p><p>(01:13:41) Arbitrary ATO bug</p><p>(01:19:41) SSTI to RCE bug</p>]]></description>
  <embed_id>32771c62-b8ca-491a-abaf-7bb7e8da6564</embed_id>
  <pubDate>Thu, 07 Mar 2024 11:00:37 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="83522173" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/99d9f95a-b394-42e7-8d39-bd4c88260676/episode.mp3" />
  <itunes:title><![CDATA[Episode 61: A Hacker on Wall Street - JR0ch17]]></itunes:title>
  <itunes:duration>1:27:00</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 61: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Jasmin Landry to share some stories about startup security, bug bounty, and the challenges of balancing both. He also shares his methodology for discovering OAuth-related bugs, highlights some differences between structured learning and self-teaching, and then walks us through  a couple arbitrary ATO’s and SSTI to RCE bugs he’s found lately.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest: Jasmin Landry</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/JR0ch17">https://twitter.com/JR0ch17</a></p><p><strong>Resources:</strong></p><p>Dirty Dancing blog post</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/writeups/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows/">https://labs.detectify.com/writeups/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows/</a></p><p>OAuth 2.0 Threat Model and Security Considerations</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://datatracker.ietf.org/doc/html/rfc6819">https://datatracker.ietf.org/doc/html/rfc6819</a></p><p>OAuth 2.0 Security Best Current Practice</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics">https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:20) Meta Tag + DomPurify Bug</p><p>(00:09:36) Jasmin's Origin story</p><p>(00:28:23) Full time Bug bounty challenges</p><p>(00:36:57) Career jumps in Security and current Role</p><p>(00:47:32) OAuth Bug methodology and cool bug stories</p><p>(01:02:35) Social Engineering and Bug Bounty</p><p>(01:13:41) Arbitrary ATO bug</p><p>(01:19:41) SSTI to RCE bug</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 61: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Jasmin Landry to share some stories about startup security, bug bounty, and the challenges of balancing both. He also shares his methodology for discovering OAuth-related bugs, highlights some differences between structured learning and self-teaching, and then walks us through  a couple arbitrary ATO’s and SSTI to RCE bugs he’s found lately.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest: Jasmin Landry</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/JR0ch17">https://twitter.com/JR0ch17</a></p><p><strong>Resources:</strong></p><p>Dirty Dancing blog post</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.detectify.com/writeups/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows/">https://labs.detectify.com/writeups/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows/</a></p><p>OAuth 2.0 Threat Model and Security Considerations</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://datatracker.ietf.org/doc/html/rfc6819">https://datatracker.ietf.org/doc/html/rfc6819</a></p><p>OAuth 2.0 Security Best Current Practice</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics">https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:02:20) Meta Tag + DomPurify Bug</p><p>(00:09:36) Jasmin's Origin story</p><p>(00:28:23) Full time Bug bounty challenges</p><p>(00:36:57) Career jumps in Security and current Role</p><p>(00:47:32) OAuth Bug methodology and cool bug stories</p><p>(01:02:35) Social Engineering and Bug Bounty</p><p>(01:13:41) Arbitrary ATO bug</p><p>(01:19:41) SSTI to RCE bug</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 61: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Jasmin Landry to share some stories about startup security, bug bounty, and the challenges of balancing both. He also shares his methodology for discovering O...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>61</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">f9c99f1d-64ff-4bca-a5b8-4c5a47727ad3</guid>
  <title><![CDATA[Episode 60: Our Take on PortSwigger's Top 10 Web Hacking Techniques of 2023]]></title>
  <description><![CDATA[<p>Episode 60: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel review the Portswigger Research list of top 10 web hacking techniques of 2023.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>------ Links ------</strong></p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">Discord</a></p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc. </p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2023">Top 10 web hacking techniques of 2023</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/smashing-the-state-machine">1: Smashing the state machine</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.malicious.group/from-akamai-to-f5-to-ntlm/">8: From Akamai to F5 to NTLM</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/">3: SMTP Smuggling</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.synacktiv.com/publications/php-filter-chains-file-read-from-error-based-oracle">4: PHP filter chains</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.synacktiv.com/publications/php-filters-chain-what-is-it-and-how-to-use-it.html">(Bonus Read)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://rafa.hashnode.dev/exploiting-http-parsers-inconsistencies">5: HTTP Parsers Inconsistencies</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://offzone.moscow/upload/iblock/11a/sagouc86idiapdb8f29w41yaupqv6fwv.pdf">6: HTTP Request Splitting</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://speakerdeck.com/masatokinugawa/how-i-hacked-microsoft-teams-and-got-150000-dollars-in-pwn2own">7: How I Hacked Microsoft Teams</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.usenix.org/conference/usenixsecurity23/presentation/squarcina">9: Cookie Crumbles</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.ankursundara.com/cookie-bugs/">(Bonus Read)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackcompute.com/hacking-epp-servers/">10: Hacking root EPP servers to take control of zones</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:04:26) 1: Smashing the state machine</p><p>(00:11:56) 8: From Akamai to F5 to NTLM... with love</p><p>(00:17:11) 3: SMTP Smuggling</p><p>(00:26:27) 4: PHP filter chains</p><p>(00:36:40) 5: HTTP Parsers Inconsistencies</p><p>(00:44:56) 6: HTTP Request Splitting</p><p>(00:53:43) 7: How I Hacked Microsoft Teams</p><p>(01:02:25) 9: Cookie Crumbles</p><p>(01:11:36) 10: EPP Server Takeover</p>]]></description>
  <embed_id>9144cf06-87aa-44e9-93a3-7f5a573ab871</embed_id>
  <pubDate>Thu, 29 Feb 2024 11:00:42 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="81233847" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/9c014b0f-f95a-4192-b3d3-0601fd494c03/episode.mp3" />
  <itunes:title><![CDATA[Episode 60: Our Take on PortSwigger's Top 10 Web Hacking Techniques of 2023]]></itunes:title>
  <itunes:duration>1:24:37</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 60: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel review the Portswigger Research list of top 10 web hacking techniques of 2023.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>------ Links ------</strong></p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">Discord</a></p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc. </p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2023">Top 10 web hacking techniques of 2023</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/smashing-the-state-machine">1: Smashing the state machine</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.malicious.group/from-akamai-to-f5-to-ntlm/">8: From Akamai to F5 to NTLM</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/">3: SMTP Smuggling</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.synacktiv.com/publications/php-filter-chains-file-read-from-error-based-oracle">4: PHP filter chains</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.synacktiv.com/publications/php-filters-chain-what-is-it-and-how-to-use-it.html">(Bonus Read)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://rafa.hashnode.dev/exploiting-http-parsers-inconsistencies">5: HTTP Parsers Inconsistencies</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://offzone.moscow/upload/iblock/11a/sagouc86idiapdb8f29w41yaupqv6fwv.pdf">6: HTTP Request Splitting</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://speakerdeck.com/masatokinugawa/how-i-hacked-microsoft-teams-and-got-150000-dollars-in-pwn2own">7: How I Hacked Microsoft Teams</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.usenix.org/conference/usenixsecurity23/presentation/squarcina">9: Cookie Crumbles</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.ankursundara.com/cookie-bugs/">(Bonus Read)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackcompute.com/hacking-epp-servers/">10: Hacking root EPP servers to take control of zones</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:04:26) 1: Smashing the state machine</p><p>(00:11:56) 8: From Akamai to F5 to NTLM... with love</p><p>(00:17:11) 3: SMTP Smuggling</p><p>(00:26:27) 4: PHP filter chains</p><p>(00:36:40) 5: HTTP Parsers Inconsistencies</p><p>(00:44:56) 6: HTTP Request Splitting</p><p>(00:53:43) 7: How I Hacked Microsoft Teams</p><p>(01:02:25) 9: Cookie Crumbles</p><p>(01:11:36) 10: EPP Server Takeover</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 60: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel review the Portswigger Research list of top 10 web hacking techniques of 2023.</p><p>Follow us on twitter at:<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p><strong>------ Links ------</strong></p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Hop on the CTBB <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">Discord</a></p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc. </p><p><strong>Resources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2023">Top 10 web hacking techniques of 2023</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/research/smashing-the-state-machine">1: Smashing the state machine</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.malicious.group/from-akamai-to-f5-to-ntlm/">8: From Akamai to F5 to NTLM</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/">3: SMTP Smuggling</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.synacktiv.com/publications/php-filter-chains-file-read-from-error-based-oracle">4: PHP filter chains</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.synacktiv.com/publications/php-filters-chain-what-is-it-and-how-to-use-it.html">(Bonus Read)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://rafa.hashnode.dev/exploiting-http-parsers-inconsistencies">5: HTTP Parsers Inconsistencies</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://offzone.moscow/upload/iblock/11a/sagouc86idiapdb8f29w41yaupqv6fwv.pdf">6: HTTP Request Splitting</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://speakerdeck.com/masatokinugawa/how-i-hacked-microsoft-teams-and-got-150000-dollars-in-pwn2own">7: How I Hacked Microsoft Teams</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.usenix.org/conference/usenixsecurity23/presentation/squarcina">9: Cookie Crumbles</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.ankursundara.com/cookie-bugs/">(Bonus Read)</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackcompute.com/hacking-epp-servers/">10: Hacking root EPP servers to take control of zones</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Introduction</p><p>(00:04:26) 1: Smashing the state machine</p><p>(00:11:56) 8: From Akamai to F5 to NTLM... with love</p><p>(00:17:11) 3: SMTP Smuggling</p><p>(00:26:27) 4: PHP filter chains</p><p>(00:36:40) 5: HTTP Parsers Inconsistencies</p><p>(00:44:56) 6: HTTP Request Splitting</p><p>(00:53:43) 7: How I Hacked Microsoft Teams</p><p>(01:02:25) 9: Cookie Crumbles</p><p>(01:11:36) 10: EPP Server Takeover</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 60: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel review the Portswigger Research list of top 10 web hacking techniques of 2023.Follow us on twitter at: @ctbbpodcastSend us any feedback here: info@criticalthinkin...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>60</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">42cf90b1-ac78-4b73-abd9-5ea607559aef</guid>
  <title><![CDATA[Episode 59: Bug Bounty Gadget Hunting & Hacker's Intuition]]></title>
  <description><![CDATA[<p>Episode 59: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss the concept of gadgets and how they can be used to escalate the impact of vulnerabilities. We talk through things like HTML injection, image injection, CRLF injection, web cache deception, leaking window location, self-stored XSS, and much more.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.&nbsp;</p><p>Resources:</p><p><a href="https://github.com/bebiksior/EvenBetter">Even Better</a></p><p><a href="https://twitter.com/NahamSec/status/1757082111100768277">NahamSec's 5 Week Program</a></p><p><a href="https://twitter.com/NahamSec/status/1757117371507216852">NahamCon News</a></p><p><a href="https://portswigger.net/research/blind-css-exfiltration">CSS Injection Research</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:31) Caido's New Features</p><p>(00:15:20) Nahamcon News and 5 week Bootcamp and pentest opportunity</p><p>(00:19:54) HTML Injection, CSS Injection, and Clickjacking</p><p>(00:33:11) Image Injection</p><p>(00:37:19) Open Redirects, Client-side path traversal, and Client-side Open Redirect</p><p>(00:49:51) Leaking window.location.href</p><p>(00:57:15) Cookie refresh gadget</p><p>(01:01:40) Stored XXS</p><p>(01:09:01) CRLF Injection</p><p>(01:13:24) 'A Place To Stand' in&nbsp; GraphQL and ID Oracle</p><p>(01:18:23) Auth gadgets, Web Cache Deception, &amp; LocalStorage poisoning</p><p>(01:27:46) Cookie Injection &amp; Context Breaks</p>]]></description>
  <embed_id>ea158c17-48ec-43d0-b3f6-86ee7b5d3577</embed_id>
  <pubDate>Thu, 22 Feb 2024 11:00:30 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="95186160" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/1cefe20c-b2eb-4f90-9706-5407904628a1/episode.mp3" />
  <itunes:title><![CDATA[Episode 59: Bug Bounty Gadget Hunting & Hacker's Intuition]]></itunes:title>
  <itunes:duration>1:39:09</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 59: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss the concept of gadgets and how they can be used to escalate the impact of vulnerabilities. We talk through things like HTML injection, image injection, CRLF injection, web cache deception, leaking window location, self-stored XSS, and much more.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.&nbsp;</p><p>Resources:</p><p><a href="https://github.com/bebiksior/EvenBetter">Even Better</a></p><p><a href="https://twitter.com/NahamSec/status/1757082111100768277">NahamSec's 5 Week Program</a></p><p><a href="https://twitter.com/NahamSec/status/1757117371507216852">NahamCon News</a></p><p><a href="https://portswigger.net/research/blind-css-exfiltration">CSS Injection Research</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:31) Caido's New Features</p><p>(00:15:20) Nahamcon News and 5 week Bootcamp and pentest opportunity</p><p>(00:19:54) HTML Injection, CSS Injection, and Clickjacking</p><p>(00:33:11) Image Injection</p><p>(00:37:19) Open Redirects, Client-side path traversal, and Client-side Open Redirect</p><p>(00:49:51) Leaking window.location.href</p><p>(00:57:15) Cookie refresh gadget</p><p>(01:01:40) Stored XXS</p><p>(01:09:01) CRLF Injection</p><p>(01:13:24) 'A Place To Stand' in&nbsp; GraphQL and ID Oracle</p><p>(01:18:23) Auth gadgets, Web Cache Deception, &amp; LocalStorage poisoning</p><p>(01:27:46) Cookie Injection &amp; Context Breaks</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 59: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss the concept of gadgets and how they can be used to escalate the impact of vulnerabilities. We talk through things like HTML injection, image injection, CRLF injection, web cache deception, leaking window location, self-stored XSS, and much more.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.&nbsp;</p><p>Resources:</p><p><a href="https://github.com/bebiksior/EvenBetter">Even Better</a></p><p><a href="https://twitter.com/NahamSec/status/1757082111100768277">NahamSec's 5 Week Program</a></p><p><a href="https://twitter.com/NahamSec/status/1757117371507216852">NahamCon News</a></p><p><a href="https://portswigger.net/research/blind-css-exfiltration">CSS Injection Research</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:31) Caido's New Features</p><p>(00:15:20) Nahamcon News and 5 week Bootcamp and pentest opportunity</p><p>(00:19:54) HTML Injection, CSS Injection, and Clickjacking</p><p>(00:33:11) Image Injection</p><p>(00:37:19) Open Redirects, Client-side path traversal, and Client-side Open Redirect</p><p>(00:49:51) Leaking window.location.href</p><p>(00:57:15) Cookie refresh gadget</p><p>(01:01:40) Stored XXS</p><p>(01:09:01) CRLF Injection</p><p>(01:13:24) 'A Place To Stand' in&nbsp; GraphQL and ID Oracle</p><p>(01:18:23) Auth gadgets, Web Cache Deception, &amp; LocalStorage poisoning</p><p>(01:27:46) Cookie Injection &amp; Context Breaks</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 59: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss the concept of gadgets and how they can be used to escalate the impact of vulnerabilities. We talk through things like HTML injection, image injection, CR...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>59</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">358bdfbe-7155-44e7-a46a-58dedfb10388</guid>
  <title><![CDATA[Episode 58: Youssef Sammouda - Client-Side & ATO War Stories]]></title>
  <description><![CDATA[<p>Episode 58: In this episode of Critical Thinking - Bug Bounty Podcast we finally sit down with Youssef Samouda and grill him on his various techniques for finding and exploiting client-side bugs and postMessage vulnerabilities. He shares some crazy stories about race conditions, exploiting hash change events, and leveraging scroll to text fragments.&nbsp;</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.&nbsp;</p><p>Today’s Guest: <a href="https://twitter.com/samm0uda?lang=en">https://twitter.com/samm0uda?lang=en</a></p><p><a href="https://ysamm.com/">https://ysamm.com/</a></p><p>Resources:</p><p>Client-side race conditions with postMessage:&nbsp;</p><p><a href="https://ysamm.com/?p=742">https://ysamm.com/?p=742</a>&nbsp;</p><p>Transferable Objects</p><p><a href="https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Transferable_objects">https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Transferable_objects</a></p><p>Every known way to get references to windows, in javascript:</p><p><a href="https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d">https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d</a></p><p>Youssef’s interview with BBRE</p><p><a href="https://www.youtube.com/watch?v=MXH1HqTFNm0">https://www.youtube.com/watch?v=MXH1HqTFNm0</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:27) Client-side race conditions with postMessage</p><p>(00:18:12) On Hash Change Events and Scroll To Text Fragments</p><p>(00:32:00) Finding, documenting, and reporting complex bugs</p><p>(00:37:32) PostMessage Methodology</p><p>(00:45:05) Youssef's Vuln Story</p><p>(00:53:42) Where and how to look for ATO vulns</p><p>(01:05:21) MessagePort</p><p>(01:14:37) Window frame relationships</p><p>(01:20:24) Recon and JS monitoring</p><p>(01:37:03) Client-side routing</p><p>(01:48:05) MITMProxy</p>]]></description>
  <embed_id>50367741-e5d5-4d29-b967-4b862dccd368</embed_id>
  <pubDate>Thu, 15 Feb 2024 11:00:28 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="110258186" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/f8eeab79-983a-43a5-bc19-6ff3e095e5da/episode.mp3" />
  <itunes:title><![CDATA[Episode 58: Youssef Sammouda - Client-Side & ATO War Stories]]></itunes:title>
  <itunes:duration>1:54:51</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 58: In this episode of Critical Thinking - Bug Bounty Podcast we finally sit down with Youssef Samouda and grill him on his various techniques for finding and exploiting client-side bugs and postMessage vulnerabilities. He shares some crazy stories about race conditions, exploiting hash change events, and leveraging scroll to text fragments.&nbsp;</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.&nbsp;</p><p>Today’s Guest: <a href="https://twitter.com/samm0uda?lang=en">https://twitter.com/samm0uda?lang=en</a></p><p><a href="https://ysamm.com/">https://ysamm.com/</a></p><p>Resources:</p><p>Client-side race conditions with postMessage:&nbsp;</p><p><a href="https://ysamm.com/?p=742">https://ysamm.com/?p=742</a>&nbsp;</p><p>Transferable Objects</p><p><a href="https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Transferable_objects">https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Transferable_objects</a></p><p>Every known way to get references to windows, in javascript:</p><p><a href="https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d">https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d</a></p><p>Youssef’s interview with BBRE</p><p><a href="https://www.youtube.com/watch?v=MXH1HqTFNm0">https://www.youtube.com/watch?v=MXH1HqTFNm0</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:27) Client-side race conditions with postMessage</p><p>(00:18:12) On Hash Change Events and Scroll To Text Fragments</p><p>(00:32:00) Finding, documenting, and reporting complex bugs</p><p>(00:37:32) PostMessage Methodology</p><p>(00:45:05) Youssef's Vuln Story</p><p>(00:53:42) Where and how to look for ATO vulns</p><p>(01:05:21) MessagePort</p><p>(01:14:37) Window frame relationships</p><p>(01:20:24) Recon and JS monitoring</p><p>(01:37:03) Client-side routing</p><p>(01:48:05) MITMProxy</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 58: In this episode of Critical Thinking - Bug Bounty Podcast we finally sit down with Youssef Samouda and grill him on his various techniques for finding and exploiting client-side bugs and postMessage vulnerabilities. He shares some crazy stories about race conditions, exploiting hash change events, and leveraging scroll to text fragments.&nbsp;</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.&nbsp;</p><p>Today’s Guest: <a href="https://twitter.com/samm0uda?lang=en">https://twitter.com/samm0uda?lang=en</a></p><p><a href="https://ysamm.com/">https://ysamm.com/</a></p><p>Resources:</p><p>Client-side race conditions with postMessage:&nbsp;</p><p><a href="https://ysamm.com/?p=742">https://ysamm.com/?p=742</a>&nbsp;</p><p>Transferable Objects</p><p><a href="https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Transferable_objects">https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Transferable_objects</a></p><p>Every known way to get references to windows, in javascript:</p><p><a href="https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d">https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d</a></p><p>Youssef’s interview with BBRE</p><p><a href="https://www.youtube.com/watch?v=MXH1HqTFNm0">https://www.youtube.com/watch?v=MXH1HqTFNm0</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:27) Client-side race conditions with postMessage</p><p>(00:18:12) On Hash Change Events and Scroll To Text Fragments</p><p>(00:32:00) Finding, documenting, and reporting complex bugs</p><p>(00:37:32) PostMessage Methodology</p><p>(00:45:05) Youssef's Vuln Story</p><p>(00:53:42) Where and how to look for ATO vulns</p><p>(01:05:21) MessagePort</p><p>(01:14:37) Window frame relationships</p><p>(01:20:24) Recon and JS monitoring</p><p>(01:37:03) Client-side routing</p><p>(01:48:05) MITMProxy</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 58: In this episode of Critical Thinking - Bug Bounty Podcast we finally sit down with Youssef Samouda and grill him on his various techniques for finding and exploiting client-side bugs and postMessage vulnerabilities. He shares some crazy...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>58</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">c92cc966-2b34-4d43-9400-9d84eb475dcd</guid>
  <title><![CDATA[Episode 57: Technical breakdown from Miami Hacking Event - H1-305]]></title>
  <description><![CDATA[<p>Episode 57: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are live from Miami, and recap their experience and share takeaways from the live hacking event. They highlight the importance of paying attention to client-side routing and the growing bug class of client-side path traversal. They also discuss the challenges of knowing when to cut your losses and the value of tracking time and setting goals.&nbsp;</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.&nbsp;</p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:50) Miami LHE Recap and Takeaways</p><p>(00:05:57) Keeping time and cutting losses.</p><p>(00:19:07) Roles and Goals</p><p>(00:23:33) OAuth</p><p>(00:28:52) HTML5 image to img Tip</p>]]></description>
  <embed_id>f74de1af-e524-439e-b9a0-7a2b065b8a2b</embed_id>
  <pubDate>Thu, 08 Feb 2024 11:01:22 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="31265990" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/8de12375-1a67-4711-9f60-737662e60b3a/episode.mp3" />
  <itunes:title><![CDATA[Episode 57: Technical breakdown from Miami Hacking Event - H1-305]]></itunes:title>
  <itunes:duration>32:34</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 57: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are live from Miami, and recap their experience and share takeaways from the live hacking event. They highlight the importance of paying attention to client-side routing and the growing bug class of client-side path traversal. They also discuss the challenges of knowing when to cut your losses and the value of tracking time and setting goals.&nbsp;</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.&nbsp;</p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:50) Miami LHE Recap and Takeaways</p><p>(00:05:57) Keeping time and cutting losses.</p><p>(00:19:07) Roles and Goals</p><p>(00:23:33) OAuth</p><p>(00:28:52) HTML5 image to img Tip</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 57: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are live from Miami, and recap their experience and share takeaways from the live hacking event. They highlight the importance of paying attention to client-side routing and the growing bug class of client-side path traversal. They also discuss the challenges of knowing when to cut your losses and the value of tracking time and setting goals.&nbsp;</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.&nbsp;</p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:50) Miami LHE Recap and Takeaways</p><p>(00:05:57) Keeping time and cutting losses.</p><p>(00:19:07) Roles and Goals</p><p>(00:23:33) OAuth</p><p>(00:28:52) HTML5 image to img Tip</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 57: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are live from Miami, and recap their experience and share takeaways from the live hacking event. They highlight the importance of paying attention to client-side...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>57</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">45b3574a-c988-46d2-ba18-8cec34cc8c67</guid>
  <title><![CDATA[Episode 56: Using Data Science to win Bug Bounty - Mayonaise (aka Jon Colston)]]></title>
  <description><![CDATA[<p>Episode 56: Using Data Science to win Bug Bounty - Mayonaise (aka Jon Colston)</p><p>Episode 56: In this episode of Critical Thinking - Bug Bounty Podcast, Justin sits down with Jon Colston to discuss how his background in digital marketing and data science has influenced his hunting methodology. We dive into subjects like data sources, automation, working backwards from vulnerabilities, applying conversion funnels to bug bounty, and the mayonaise signature 'Mother of All Bugs'&nbsp;</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>WordFence - Sign up as a researcher!<a href="https://ctbb.show/wf"> https://ctbb.show/wf</a></p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.&nbsp;</p><p>Today’s Guest:</p><p><a href="https://hackerone.com/mayonaise?type=user">https://hackerone.com/mayonaise?type=user</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:12:07) Evolving Hacking Methodologies &amp; B2B Hacking</p><p>(00:23:57) Data Science + Bug Bounty</p><p>(00:34:37) 'Lead Generation for Vulns'</p><p>(00:41:39) Ingredients and Recipes</p><p>(00:49:45) Keyword Categorization</p><p>(00:54:30) Manual Processes and Recap</p><p>(01:07:08) Data Sources</p><p>(01:19:59) Digital Marketing + Bug Bounty</p><p>(01:32:22) M.O.A.B.s</p><p>(01:41:02) Burnout Protection and Dupe Analysis</p>]]></description>
  <embed_id>49c2816a-a48c-44c8-ab25-f18e029f58a4</embed_id>
  <pubDate>Thu, 01 Feb 2024 11:01:14 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="103361860" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/c4198140-bdb5-4859-bfac-f0bf818223b1/episode.mp3" />
  <itunes:title><![CDATA[Episode 56: Using Data Science to win Bug Bounty - Mayonaise (aka Jon Colston)]]></itunes:title>
  <itunes:duration>1:47:40</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 56: Using Data Science to win Bug Bounty - Mayonaise (aka Jon Colston)</p><p>Episode 56: In this episode of Critical Thinking - Bug Bounty Podcast, Justin sits down with Jon Colston to discuss how his background in digital marketing and data science has influenced his hunting methodology. We dive into subjects like data sources, automation, working backwards from vulnerabilities, applying conversion funnels to bug bounty, and the mayonaise signature 'Mother of All Bugs'&nbsp;</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>WordFence - Sign up as a researcher!<a href="https://ctbb.show/wf"> https://ctbb.show/wf</a></p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.&nbsp;</p><p>Today’s Guest:</p><p><a href="https://hackerone.com/mayonaise?type=user">https://hackerone.com/mayonaise?type=user</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:12:07) Evolving Hacking Methodologies &amp; B2B Hacking</p><p>(00:23:57) Data Science + Bug Bounty</p><p>(00:34:37) 'Lead Generation for Vulns'</p><p>(00:41:39) Ingredients and Recipes</p><p>(00:49:45) Keyword Categorization</p><p>(00:54:30) Manual Processes and Recap</p><p>(01:07:08) Data Sources</p><p>(01:19:59) Digital Marketing + Bug Bounty</p><p>(01:32:22) M.O.A.B.s</p><p>(01:41:02) Burnout Protection and Dupe Analysis</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 56: Using Data Science to win Bug Bounty - Mayonaise (aka Jon Colston)</p><p>Episode 56: In this episode of Critical Thinking - Bug Bounty Podcast, Justin sits down with Jon Colston to discuss how his background in digital marketing and data science has influenced his hunting methodology. We dive into subjects like data sources, automation, working backwards from vulnerabilities, applying conversion funnels to bug bounty, and the mayonaise signature 'Mother of All Bugs'&nbsp;</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>WordFence - Sign up as a researcher!<a href="https://ctbb.show/wf"> https://ctbb.show/wf</a></p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.&nbsp;</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.&nbsp;</p><p>Today’s Guest:</p><p><a href="https://hackerone.com/mayonaise?type=user">https://hackerone.com/mayonaise?type=user</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:12:07) Evolving Hacking Methodologies &amp; B2B Hacking</p><p>(00:23:57) Data Science + Bug Bounty</p><p>(00:34:37) 'Lead Generation for Vulns'</p><p>(00:41:39) Ingredients and Recipes</p><p>(00:49:45) Keyword Categorization</p><p>(00:54:30) Manual Processes and Recap</p><p>(01:07:08) Data Sources</p><p>(01:19:59) Digital Marketing + Bug Bounty</p><p>(01:32:22) M.O.A.B.s</p><p>(01:41:02) Burnout Protection and Dupe Analysis</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 56: Using Data Science to win Bug Bounty - Mayonaise (aka Jon Colston)Episode 56: In this episode of Critical Thinking - Bug Bounty Podcast, Justin sits down with Jon Colston to discuss how his background in digital marketing and data scien...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>56</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">1ddf6902-21b2-4451-88c8-03440fcd2667</guid>
  <title><![CDATA[Episode 55: Popping WordPress Plugins - Methodology Braindump]]></title>
  <description><![CDATA[<p>Episode 55: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is joined by Wordpress Security Researcher Ram Gall to discuss both functionality and vulnerabilities within Wordpress Plugins.</p><p>Follow us on <a href>twitter</a></p><p>Send us any feedback <a href="mailto:info@criticalthinkingpodcast.io">here</a>:</p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>WordFence - Sign up as a researcher! <a href="https://ctbb.show/wf">https://ctbb.show/wf</a></p><p>---</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB <a href="https://ctbb.show/discord">Discord</a></p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest:</p><p><a href="https://twitter.com/ramuelgall">Ramuel Gall</a></p><p><a href="https://www.wordfence.com/blog/2022/02/vulnerability-in-updraftplus-allowed-subscribers-to-download-sensitive-backups/">UpdraftPlus Vuln</a></p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/wordpress-xml-rpc-pingback-vulnerability-analysis/">XML-RPC PingBack</a></p><p><a href="https://www.joelonsoftware.com/2003/10/08/the-absolute-minimum-every-software-developer-absolutely-positively-must-know-about-unicode-and-character-sets-no-excuses/">Unicode and Character Sets</a></p><p><a href="https://www.wordfence.com/blog/2022/02/reflected-xss-in-header-footer-code-manager/">Reflected XSS</a></p><p><a href="https://www.wordfence.com/blog/2023/12/psa-critical-pop-chain-allowing-remote-code-execution-patched-in-wordpress-6-4-2/">POP Chain</a></p><p><a href="https://github.com/WordPressplugindirectory">WordpressPluginDirectory</a></p><p><a href="https://www.wordfence.com/blog/2022/04/elementor-critical-remote-code-execution-vulnerability/">Subscriber+ RCE in Elementor</a></p><p><a href="https://www.wordfence.com/blog/2023/06/credential-stealing-server-side-request-forgery-patched-in-getwid/">Subscriber+ SSRF</a></p><p><a href="https://www.wordfence.com/blog/2023/04/multiple-vulnerabilities-patched-in-shield-security/">Unauthed XSS via User-Agent header</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:55) Add_action &amp; Nonces</p><p>(00:26:16) Add_filter &amp; Register_rest_routes</p><p>(00:38:39) Page-related code &amp; Shortcodes</p><p>(00:50:24) Top Sinks for WP</p><p>(01:02:19) Echo &amp; SQLI Sinks</p><p>(01:15:07) Nonce Leak and wp_handle_upload</p><p>(01:18:16) Page variables &amp; Pop Chains</p><p>(01:26:55) WP Escalations &amp; Bug Reports</p>]]></description>
  <embed_id>c0315432-559c-434f-b6ec-458e9ca6c90e</embed_id>
  <pubDate>Thu, 25 Jan 2024 11:00:49 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="99906173" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/0f26ffb7-17a4-43aa-806c-12f0c28fe871/episode.mp3" />
  <itunes:title><![CDATA[Episode 55: Popping WordPress Plugins - Methodology Braindump]]></itunes:title>
  <itunes:duration>1:44:04</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 55: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is joined by Wordpress Security Researcher Ram Gall to discuss both functionality and vulnerabilities within Wordpress Plugins.</p><p>Follow us on <a href>twitter</a></p><p>Send us any feedback <a href="mailto:info@criticalthinkingpodcast.io">here</a>:</p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>WordFence - Sign up as a researcher! <a href="https://ctbb.show/wf">https://ctbb.show/wf</a></p><p>---</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB <a href="https://ctbb.show/discord">Discord</a></p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest:</p><p><a href="https://twitter.com/ramuelgall">Ramuel Gall</a></p><p><a href="https://www.wordfence.com/blog/2022/02/vulnerability-in-updraftplus-allowed-subscribers-to-download-sensitive-backups/">UpdraftPlus Vuln</a></p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/wordpress-xml-rpc-pingback-vulnerability-analysis/">XML-RPC PingBack</a></p><p><a href="https://www.joelonsoftware.com/2003/10/08/the-absolute-minimum-every-software-developer-absolutely-positively-must-know-about-unicode-and-character-sets-no-excuses/">Unicode and Character Sets</a></p><p><a href="https://www.wordfence.com/blog/2022/02/reflected-xss-in-header-footer-code-manager/">Reflected XSS</a></p><p><a href="https://www.wordfence.com/blog/2023/12/psa-critical-pop-chain-allowing-remote-code-execution-patched-in-wordpress-6-4-2/">POP Chain</a></p><p><a href="https://github.com/WordPressplugindirectory">WordpressPluginDirectory</a></p><p><a href="https://www.wordfence.com/blog/2022/04/elementor-critical-remote-code-execution-vulnerability/">Subscriber+ RCE in Elementor</a></p><p><a href="https://www.wordfence.com/blog/2023/06/credential-stealing-server-side-request-forgery-patched-in-getwid/">Subscriber+ SSRF</a></p><p><a href="https://www.wordfence.com/blog/2023/04/multiple-vulnerabilities-patched-in-shield-security/">Unauthed XSS via User-Agent header</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:55) Add_action &amp; Nonces</p><p>(00:26:16) Add_filter &amp; Register_rest_routes</p><p>(00:38:39) Page-related code &amp; Shortcodes</p><p>(00:50:24) Top Sinks for WP</p><p>(01:02:19) Echo &amp; SQLI Sinks</p><p>(01:15:07) Nonce Leak and wp_handle_upload</p><p>(01:18:16) Page variables &amp; Pop Chains</p><p>(01:26:55) WP Escalations &amp; Bug Reports</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 55: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is joined by Wordpress Security Researcher Ram Gall to discuss both functionality and vulnerabilities within Wordpress Plugins.</p><p>Follow us on <a href>twitter</a></p><p>Send us any feedback <a href="mailto:info@criticalthinkingpodcast.io">here</a>:</p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>WordFence - Sign up as a researcher! <a href="https://ctbb.show/wf">https://ctbb.show/wf</a></p><p>---</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB <a href="https://ctbb.show/discord">Discord</a></p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest:</p><p><a href="https://twitter.com/ramuelgall">Ramuel Gall</a></p><p><a href="https://www.wordfence.com/blog/2022/02/vulnerability-in-updraftplus-allowed-subscribers-to-download-sensitive-backups/">UpdraftPlus Vuln</a></p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/wordpress-xml-rpc-pingback-vulnerability-analysis/">XML-RPC PingBack</a></p><p><a href="https://www.joelonsoftware.com/2003/10/08/the-absolute-minimum-every-software-developer-absolutely-positively-must-know-about-unicode-and-character-sets-no-excuses/">Unicode and Character Sets</a></p><p><a href="https://www.wordfence.com/blog/2022/02/reflected-xss-in-header-footer-code-manager/">Reflected XSS</a></p><p><a href="https://www.wordfence.com/blog/2023/12/psa-critical-pop-chain-allowing-remote-code-execution-patched-in-wordpress-6-4-2/">POP Chain</a></p><p><a href="https://github.com/WordPressplugindirectory">WordpressPluginDirectory</a></p><p><a href="https://www.wordfence.com/blog/2022/04/elementor-critical-remote-code-execution-vulnerability/">Subscriber+ RCE in Elementor</a></p><p><a href="https://www.wordfence.com/blog/2023/06/credential-stealing-server-side-request-forgery-patched-in-getwid/">Subscriber+ SSRF</a></p><p><a href="https://www.wordfence.com/blog/2023/04/multiple-vulnerabilities-patched-in-shield-security/">Unauthed XSS via User-Agent header</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:55) Add_action &amp; Nonces</p><p>(00:26:16) Add_filter &amp; Register_rest_routes</p><p>(00:38:39) Page-related code &amp; Shortcodes</p><p>(00:50:24) Top Sinks for WP</p><p>(01:02:19) Echo &amp; SQLI Sinks</p><p>(01:15:07) Nonce Leak and wp_handle_upload</p><p>(01:18:16) Page variables &amp; Pop Chains</p><p>(01:26:55) WP Escalations &amp; Bug Reports</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 55: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is joined by Wordpress Security Researcher Ram Gall to discuss both functionality and vulnerabilities within Wordpress Plugins.Follow us on twitterSend us any feedback he...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>55</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">b0c51607-e5d4-45e5-b18e-124cc51d2ba9</guid>
  <title><![CDATA[Episode 54: White Box Formulas - Vulnerable Coding Patterns]]></title>
  <description><![CDATA[<p>Episode 54: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel are back with news items and new projects. Joel shares about his personal scraping project to gather data on bug bounty programs and distribution Next, they announce the launch of HackerNotes, a podcast companion that will summarize the main technical points of each episode. They also discuss a recent GitLab CVE and an invisible prompt injection, before diving into a discussion (or debate) about vulnerable code patterns.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Gitlab CVE</p><p><a href="https://github.com/Vozec/CVE-2023-7028">https://github.com/Vozec/CVE-2023-7028</a></p><p><a href="https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/">https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/</a></p><p>Fix commit: <a href="https://gitlab.com/gitlab-org/gitlab/-/commit/abe79e4ec437988cf16534a9dbba81b98a2e7f18">https://gitlab.com/gitlab-org/gitlab/-/commit/abe79e4ec437988cf16534a9dbba81b98a2e7f18</a></p><p>Invisible Prompt Injection</p><p><a href="https://x.com/goodside/status/1745511940351287394?s=20">https://x.com/goodside/status/1745511940351287394?s=20</a></p><p>Regex 101</p><p><a href="https://regex101.com">https://regex101.com</a></p><p>Regex to Strings</p><p><a href="https://www.wimpyprogrammer.com/regex-to-strings/">https://www.wimpyprogrammer.com/regex-to-strings/</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:01:54) Joel’s H1 Data Scraping Research</p><p>(00:19:23) HackerNotes launch</p><p>(00:21:29) Gitlab CVE</p><p>(00:27:45) Invisible Prompt Injection</p><p>(00:33:52) Vulnerable Code Patterns</p><p>(00:37:51) Sanitization, but then modification of data afterward</p><p>(00:45:39) Auth check inside body of if statement</p><p>(00:48:15) sCheck for bad patterns with if, but then don't do any control flow</p><p>(00:50:21) Bad Regex</p><p>(01:00:36) Replace statements for sanitization</p><p>(01:04:32) Anything that allows you to call functions or control code flow in uncommon ways</p>]]></description>
  <embed_id>f3ae6812-bc9c-4938-85b7-3be2fe589272</embed_id>
  <pubDate>Thu, 18 Jan 2024 11:01:03 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="69729938" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/14cb03b1-45c1-4745-9ba8-3d13e93f3a40/episode.mp3" />
  <itunes:title><![CDATA[Episode 54: White Box Formulas - Vulnerable Coding Patterns]]></itunes:title>
  <itunes:duration>1:12:38</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 54: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel are back with news items and new projects. Joel shares about his personal scraping project to gather data on bug bounty programs and distribution Next, they announce the launch of HackerNotes, a podcast companion that will summarize the main technical points of each episode. They also discuss a recent GitLab CVE and an invisible prompt injection, before diving into a discussion (or debate) about vulnerable code patterns.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Gitlab CVE</p><p><a href="https://github.com/Vozec/CVE-2023-7028">https://github.com/Vozec/CVE-2023-7028</a></p><p><a href="https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/">https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/</a></p><p>Fix commit: <a href="https://gitlab.com/gitlab-org/gitlab/-/commit/abe79e4ec437988cf16534a9dbba81b98a2e7f18">https://gitlab.com/gitlab-org/gitlab/-/commit/abe79e4ec437988cf16534a9dbba81b98a2e7f18</a></p><p>Invisible Prompt Injection</p><p><a href="https://x.com/goodside/status/1745511940351287394?s=20">https://x.com/goodside/status/1745511940351287394?s=20</a></p><p>Regex 101</p><p><a href="https://regex101.com">https://regex101.com</a></p><p>Regex to Strings</p><p><a href="https://www.wimpyprogrammer.com/regex-to-strings/">https://www.wimpyprogrammer.com/regex-to-strings/</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:01:54) Joel’s H1 Data Scraping Research</p><p>(00:19:23) HackerNotes launch</p><p>(00:21:29) Gitlab CVE</p><p>(00:27:45) Invisible Prompt Injection</p><p>(00:33:52) Vulnerable Code Patterns</p><p>(00:37:51) Sanitization, but then modification of data afterward</p><p>(00:45:39) Auth check inside body of if statement</p><p>(00:48:15) sCheck for bad patterns with if, but then don't do any control flow</p><p>(00:50:21) Bad Regex</p><p>(01:00:36) Replace statements for sanitization</p><p>(01:04:32) Anything that allows you to call functions or control code flow in uncommon ways</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 54: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel are back with news items and new projects. Joel shares about his personal scraping project to gather data on bug bounty programs and distribution Next, they announce the launch of HackerNotes, a podcast companion that will summarize the main technical points of each episode. They also discuss a recent GitLab CVE and an invisible prompt injection, before diving into a discussion (or debate) about vulnerable code patterns.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Gitlab CVE</p><p><a href="https://github.com/Vozec/CVE-2023-7028">https://github.com/Vozec/CVE-2023-7028</a></p><p><a href="https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/">https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/</a></p><p>Fix commit: <a href="https://gitlab.com/gitlab-org/gitlab/-/commit/abe79e4ec437988cf16534a9dbba81b98a2e7f18">https://gitlab.com/gitlab-org/gitlab/-/commit/abe79e4ec437988cf16534a9dbba81b98a2e7f18</a></p><p>Invisible Prompt Injection</p><p><a href="https://x.com/goodside/status/1745511940351287394?s=20">https://x.com/goodside/status/1745511940351287394?s=20</a></p><p>Regex 101</p><p><a href="https://regex101.com">https://regex101.com</a></p><p>Regex to Strings</p><p><a href="https://www.wimpyprogrammer.com/regex-to-strings/">https://www.wimpyprogrammer.com/regex-to-strings/</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:01:54) Joel’s H1 Data Scraping Research</p><p>(00:19:23) HackerNotes launch</p><p>(00:21:29) Gitlab CVE</p><p>(00:27:45) Invisible Prompt Injection</p><p>(00:33:52) Vulnerable Code Patterns</p><p>(00:37:51) Sanitization, but then modification of data afterward</p><p>(00:45:39) Auth check inside body of if statement</p><p>(00:48:15) sCheck for bad patterns with if, but then don't do any control flow</p><p>(00:50:21) Bad Regex</p><p>(01:00:36) Replace statements for sanitization</p><p>(01:04:32) Anything that allows you to call functions or control code flow in uncommon ways</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 54: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel are back with news items and new projects. Joel shares about his personal scraping project to gather data on bug bounty programs and distribution Next, they annou...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>54</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">d6304e17-7075-4b0a-883b-783bd006e5f0</guid>
  <title><![CDATA[Episode 53: 500k/yr as Full-Time Bug Hunter & Content Creator - Nahamsec]]></title>
  <description><![CDATA[<p>Episode 53: In this episode of Critical Thinking - Bug Bounty Podcast,we’re joined by none other than NahamSec. We start by discusses the challenges he faced on his journey in bug bounty hunting and content creation, including personal struggles and the pressure of success.We also talk about finding balance and managing mental energy, going the extra mile, and the importance of planning and setting goals for yourself before he walks us through some Blind XSS techniques.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:37) Costs of Content Creation</p><p>(00:21:12) Hacking 'identities' and Pivoting</p><p>(00:36:49) Hacking Methodology</p><p>(00:58:59) Planning, Goals, and Nahamsec's 2023 Performance</p><p>(01:10:19) Blind XSS</p><p>(01:35:19) Going the extra mile in Bug Bounty</p>]]></description>
  <embed_id>9267b060-6b3d-42af-9ace-8eb3089b9733</embed_id>
  <pubDate>Thu, 11 Jan 2024 11:00:39 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="96753925" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/aa8d5b6b-baa8-45b3-b106-5cbe25f69d93/episode.mp3" />
  <itunes:title><![CDATA[Episode 53: 500k/yr as Full-Time Bug Hunter & Content Creator - Nahamsec]]></itunes:title>
  <itunes:duration>1:40:47</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 53: In this episode of Critical Thinking - Bug Bounty Podcast,we’re joined by none other than NahamSec. We start by discusses the challenges he faced on his journey in bug bounty hunting and content creation, including personal struggles and the pressure of success.We also talk about finding balance and managing mental energy, going the extra mile, and the importance of planning and setting goals for yourself before he walks us through some Blind XSS techniques.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:37) Costs of Content Creation</p><p>(00:21:12) Hacking 'identities' and Pivoting</p><p>(00:36:49) Hacking Methodology</p><p>(00:58:59) Planning, Goals, and Nahamsec's 2023 Performance</p><p>(01:10:19) Blind XSS</p><p>(01:35:19) Going the extra mile in Bug Bounty</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 53: In this episode of Critical Thinking - Bug Bounty Podcast,we’re joined by none other than NahamSec. We start by discusses the challenges he faced on his journey in bug bounty hunting and content creation, including personal struggles and the pressure of success.We also talk about finding balance and managing mental energy, going the extra mile, and the importance of planning and setting goals for yourself before he walks us through some Blind XSS techniques.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:37) Costs of Content Creation</p><p>(00:21:12) Hacking 'identities' and Pivoting</p><p>(00:36:49) Hacking Methodology</p><p>(00:58:59) Planning, Goals, and Nahamsec's 2023 Performance</p><p>(01:10:19) Blind XSS</p><p>(01:35:19) Going the extra mile in Bug Bounty</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 53: In this episode of Critical Thinking - Bug Bounty Podcast,we’re joined by none other than NahamSec. We start by discusses the challenges he faced on his journey in bug bounty hunting and content creation, including personal struggles an...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>53</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">609c6fa8-bb75-4fff-a453-259ed4eae8ec</guid>
  <title><![CDATA[Episode 52: Best Technical Content from Year 1 of CTBB Podcast]]></title>
  <description><![CDATA[<p>Episode 52: In this episode of Critical Thinking - Bug Bounty Podcast we're going back and highlighting some of the best technical moments from the past year! Hope you enjoy this best of 2023 Supercut!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for Caido using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:55) Episode 26: Meta tags and base tags in HTML</p><p>(00:15:20) Episode 27: Client-side path traversal</p><p>(00:23:18) Episode 27: Cookie bombing + cookie jar overflow</p><p>(00:35:47) Episode 44: Cross environment authentication bugs</p><p>(00:43:17) Episode 47: The open-faced Iframe Sandwich</p><p>(00:50:19) Episode 47: js hoisting and classic Joel nerdsnipe</p><p>(00:58:28) Episode 29: Sean Yeoh on Subdomains vs IP in recon</p><p>(01:04:05) Episode 30: Shubs on reversing enterprise software</p><p>(01:24:58) Episode 30: Shubs on building out a recon flow</p><p>(01:29:36) Episode 30: Shubs on Hacking IIS Servers</p><p>(01:36:45) Episode 37: 0xLupin on smart JavaScript analysis tools</p><p>(01:45:42) Episode 45: Frans Rosen On App cache,  Service workers cookie stuffing, and postMessage</p><p>(02:15:02) Episode 50: Mathias Karlsson on XSLT and MXSS</p><p>(02:39:26) Episode 27: Assetnote's sharefile RCE</p><p>(02:48:18) Episode 31: Perforce RCE</p><p>(02:53:48) Episode 48: Sam Erb's XSLT bug story</p><p>(02:58:47) Final thoughts and Special Thanks</p>]]></description>
  <embed_id>c6900f33-b82c-4ca1-8839-f79e5343fdf7</embed_id>
  <pubDate>Thu, 04 Jan 2024 11:00:22 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="172802442" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/a04ab30a-ff53-4d69-ab2a-4809f12b0642/episode.mp3" />
  <itunes:title><![CDATA[Episode 52: Best Technical Content from Year 1 of CTBB Podcast]]></itunes:title>
  <itunes:duration>3:00:00</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 52: In this episode of Critical Thinking - Bug Bounty Podcast we're going back and highlighting some of the best technical moments from the past year! Hope you enjoy this best of 2023 Supercut!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for Caido using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:55) Episode 26: Meta tags and base tags in HTML</p><p>(00:15:20) Episode 27: Client-side path traversal</p><p>(00:23:18) Episode 27: Cookie bombing + cookie jar overflow</p><p>(00:35:47) Episode 44: Cross environment authentication bugs</p><p>(00:43:17) Episode 47: The open-faced Iframe Sandwich</p><p>(00:50:19) Episode 47: js hoisting and classic Joel nerdsnipe</p><p>(00:58:28) Episode 29: Sean Yeoh on Subdomains vs IP in recon</p><p>(01:04:05) Episode 30: Shubs on reversing enterprise software</p><p>(01:24:58) Episode 30: Shubs on building out a recon flow</p><p>(01:29:36) Episode 30: Shubs on Hacking IIS Servers</p><p>(01:36:45) Episode 37: 0xLupin on smart JavaScript analysis tools</p><p>(01:45:42) Episode 45: Frans Rosen On App cache,  Service workers cookie stuffing, and postMessage</p><p>(02:15:02) Episode 50: Mathias Karlsson on XSLT and MXSS</p><p>(02:39:26) Episode 27: Assetnote's sharefile RCE</p><p>(02:48:18) Episode 31: Perforce RCE</p><p>(02:53:48) Episode 48: Sam Erb's XSLT bug story</p><p>(02:58:47) Final thoughts and Special Thanks</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 52: In this episode of Critical Thinking - Bug Bounty Podcast we're going back and highlighting some of the best technical moments from the past year! Hope you enjoy this best of 2023 Supercut!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for Caido using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:55) Episode 26: Meta tags and base tags in HTML</p><p>(00:15:20) Episode 27: Client-side path traversal</p><p>(00:23:18) Episode 27: Cookie bombing + cookie jar overflow</p><p>(00:35:47) Episode 44: Cross environment authentication bugs</p><p>(00:43:17) Episode 47: The open-faced Iframe Sandwich</p><p>(00:50:19) Episode 47: js hoisting and classic Joel nerdsnipe</p><p>(00:58:28) Episode 29: Sean Yeoh on Subdomains vs IP in recon</p><p>(01:04:05) Episode 30: Shubs on reversing enterprise software</p><p>(01:24:58) Episode 30: Shubs on building out a recon flow</p><p>(01:29:36) Episode 30: Shubs on Hacking IIS Servers</p><p>(01:36:45) Episode 37: 0xLupin on smart JavaScript analysis tools</p><p>(01:45:42) Episode 45: Frans Rosen On App cache,  Service workers cookie stuffing, and postMessage</p><p>(02:15:02) Episode 50: Mathias Karlsson on XSLT and MXSS</p><p>(02:39:26) Episode 27: Assetnote's sharefile RCE</p><p>(02:48:18) Episode 31: Perforce RCE</p><p>(02:53:48) Episode 48: Sam Erb's XSLT bug story</p><p>(02:58:47) Final thoughts and Special Thanks</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 52: In this episode of Critical Thinking - Bug Bounty Podcast we're going back and highlighting some of the best technical moments from the past year! Hope you enjoy this best of 2023 Supercut!Follow us on twitter at: @ctbbpodcastWe're new ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>52</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">6735466c-da7d-49c3-bb26-4316bb53b0bf</guid>
  <title><![CDATA[Episode 51: Hacker Stats 2023 & 2024 Goals]]></title>
  <description><![CDATA[<p>Episode 51: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are back for the last episode of 2023. We discuss some noteworthy news items including a Hacker One Crit, Caido updates, and some Blind CSS. Then we dive into our own personal ‘Hackers Wrapped’ recap of the year, before laying out some goals for 2024.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><strong>Resources</strong></p><p><a href="https://www.flowlauncher.com/">Flow</a></p><p><a href="https://github.com/microsoft/PowerToys/releases/">Powertoys</a></p><p><a href="https://www.alfredapp.com/">Alfred</a></p><p><a href="https://pypi.org/project/pyperclip/">Pyperclip</a></p><p><a href="https://github.com/TheJoeFin/Text-Grab">Textgrab</a></p><p><a href="https://twitter.com/fransrosen/status/1735585896265556264">CTF Payload Challenge</a></p><p><a href="https://hackerone.com/reports/2262382">Hacker One Crit Report</a></p><p><a href="https://twitter.com/PortSwiggerRes/status/1732061703741768060">Blind CSS Injection</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:08:43) Keyboard Shortcut Utility Systems</p><p>(00:21:28) CTF Challenge By Frans</p><p>(00:32:40) Hacker One 25K Crit Disclosure</p><p>(00:36:31) Caido Searchbar Rework.</p><p>(00:40:51) Blind CSS Exfiltration</p><p>(00:44:10) 2023 Personal Bug Bounty Stats</p><p>(01:01:15) 2024 Personal Bug Bounty Goals</p>]]></description>
  <embed_id>e3a7fbf4-e09f-4c35-b13f-9cbade237aa6</embed_id>
  <pubDate>Thu, 28 Dec 2023 11:00:44 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="78257977" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/e8453f94-6d05-40d6-a7b4-54ac1b1bef61/episode.mp3" />
  <itunes:title><![CDATA[Episode 51: Hacker Stats 2023 & 2024 Goals]]></itunes:title>
  <itunes:duration>1:21:31</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 51: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are back for the last episode of 2023. We discuss some noteworthy news items including a Hacker One Crit, Caido updates, and some Blind CSS. Then we dive into our own personal ‘Hackers Wrapped’ recap of the year, before laying out some goals for 2024.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><strong>Resources</strong></p><p><a href="https://www.flowlauncher.com/">Flow</a></p><p><a href="https://github.com/microsoft/PowerToys/releases/">Powertoys</a></p><p><a href="https://www.alfredapp.com/">Alfred</a></p><p><a href="https://pypi.org/project/pyperclip/">Pyperclip</a></p><p><a href="https://github.com/TheJoeFin/Text-Grab">Textgrab</a></p><p><a href="https://twitter.com/fransrosen/status/1735585896265556264">CTF Payload Challenge</a></p><p><a href="https://hackerone.com/reports/2262382">Hacker One Crit Report</a></p><p><a href="https://twitter.com/PortSwiggerRes/status/1732061703741768060">Blind CSS Injection</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:08:43) Keyboard Shortcut Utility Systems</p><p>(00:21:28) CTF Challenge By Frans</p><p>(00:32:40) Hacker One 25K Crit Disclosure</p><p>(00:36:31) Caido Searchbar Rework.</p><p>(00:40:51) Blind CSS Exfiltration</p><p>(00:44:10) 2023 Personal Bug Bounty Stats</p><p>(01:01:15) 2024 Personal Bug Bounty Goals</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 51: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are back for the last episode of 2023. We discuss some noteworthy news items including a Hacker One Crit, Caido updates, and some Blind CSS. Then we dive into our own personal ‘Hackers Wrapped’ recap of the year, before laying out some goals for 2024.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><strong>Resources</strong></p><p><a href="https://www.flowlauncher.com/">Flow</a></p><p><a href="https://github.com/microsoft/PowerToys/releases/">Powertoys</a></p><p><a href="https://www.alfredapp.com/">Alfred</a></p><p><a href="https://pypi.org/project/pyperclip/">Pyperclip</a></p><p><a href="https://github.com/TheJoeFin/Text-Grab">Textgrab</a></p><p><a href="https://twitter.com/fransrosen/status/1735585896265556264">CTF Payload Challenge</a></p><p><a href="https://hackerone.com/reports/2262382">Hacker One Crit Report</a></p><p><a href="https://twitter.com/PortSwiggerRes/status/1732061703741768060">Blind CSS Injection</a></p><p><strong>Timestamps</strong></p><p>(00:00:00) Introduction</p><p>(00:08:43) Keyboard Shortcut Utility Systems</p><p>(00:21:28) CTF Challenge By Frans</p><p>(00:32:40) Hacker One 25K Crit Disclosure</p><p>(00:36:31) Caido Searchbar Rework.</p><p>(00:40:51) Blind CSS Exfiltration</p><p>(00:44:10) 2023 Personal Bug Bounty Stats</p><p>(01:01:15) 2024 Personal Bug Bounty Goals</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 51: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are back for the last episode of 2023. We discuss some noteworthy news items including a Hacker One Crit, Caido updates, and some Blind CSS. Then we dive into ou...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>51</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">809c5a5c-77d4-4c58-8c36-a6068134f547</guid>
  <title><![CDATA[Episode 50: ­Mathias 'Fall in a well' Karlsson - Bug Bounty Prophet]]></title>
  <description><![CDATA[<p>Episode 50: In this episode of Critical Thinking - Bug Bounty Podcast, Justin catches up with hacking master Mathias Karlsson, and talks about burnout, collaboration, and the importance of specialization. Then we dive into the technical details of MXSS and XSLT, character encoding, and give some predictions of what Bug Bounty might look like in the future…</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p><a href="https://ctbb.show/discord">Hop on the CTBB Discord!</a></p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a href="https://twitter.com/avlidienbrunn">Today’s Guest</a></p><p><strong>Episode Resources</strong></p><p><a href="https://www.youtube.com/watch?v=WTH6f0R7uzo">How to Differentiate Yourself as a Hunter</a></p><p><a href="https://gist.github.com/defparam/840f7d9e31f77b3c5460c5921e0787ef">MutateMethods</a></p><p><a href="https://htmlparse.hackaplaneten.se/">hackaplaneten</a></p><p><a href="https://www.joelonsoftware.com/2003/10/08/the-absolute-minimum-every-software-developer-absolutely-positively-must-know-about-unicode-and-character-sets-no-excuses/">Article About Unicode and Character Sets</a></p><p><a href="https://en.wikipedia.org/wiki/Byte_order_mark">Byte Order Mark:</a></p><p><a href="https://chromium.googlesource.com/chromium/+/refs/heads/trunk/chrome/browser/character_encoding.cc#35">Character Encodings</a></p><p><a href="https://shapecatcher.com/unicode/info/65533">ShapeCatcher</a></p><p><a href="https://soroush.me/blog/2018/08/waf-bypass-techniques-using-http-standard-and-web-servers-behaviour/">WAF Bypass</a></p><p><a href="https://github.com/avlidienbrunn/bountydash">BountyDash</a></p><p><a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface.pdf">EXPLOITING HTTP'S HIDDEN ATTACK-SURFACE</a></p><p></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:10:06) Automation Setup and Assetnote Origins</p><p>(00:16:49) Sharing Tips, and Content Creation</p><p>(00:22:27) Collaboration and Optimization</p><p>(00:36:44) Working at Detectify</p><p>(00:51:45) Bug Bounty Burnout</p><p>(00:56:15) Early Days of Bug Bounty and Future Predictions</p><p>(01:19:00) Nerdsnipeability</p><p>(01:29:38) MXSS and XSLT</p><p>(01:54:20) Learning through being wrong</p><p>(02:00:15) Go-to Vulns</p>]]></description>
  <embed_id>85d9388e-5134-4a0f-ba6c-dab3a4301116</embed_id>
  <pubDate>Thu, 21 Dec 2023 11:01:06 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="138737933" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/d79f3a72-b3e6-4f04-9acb-db7da04687b4/episode.mp3" />
  <itunes:title><![CDATA[Episode 50: ­Mathias 'Fall in a well' Karlsson - Bug Bounty Prophet]]></itunes:title>
  <itunes:duration>2:24:31</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 50: In this episode of Critical Thinking - Bug Bounty Podcast, Justin catches up with hacking master Mathias Karlsson, and talks about burnout, collaboration, and the importance of specialization. Then we dive into the technical details of MXSS and XSLT, character encoding, and give some predictions of what Bug Bounty might look like in the future…</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p><a href="https://ctbb.show/discord">Hop on the CTBB Discord!</a></p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a href="https://twitter.com/avlidienbrunn">Today’s Guest</a></p><p><strong>Episode Resources</strong></p><p><a href="https://www.youtube.com/watch?v=WTH6f0R7uzo">How to Differentiate Yourself as a Hunter</a></p><p><a href="https://gist.github.com/defparam/840f7d9e31f77b3c5460c5921e0787ef">MutateMethods</a></p><p><a href="https://htmlparse.hackaplaneten.se/">hackaplaneten</a></p><p><a href="https://www.joelonsoftware.com/2003/10/08/the-absolute-minimum-every-software-developer-absolutely-positively-must-know-about-unicode-and-character-sets-no-excuses/">Article About Unicode and Character Sets</a></p><p><a href="https://en.wikipedia.org/wiki/Byte_order_mark">Byte Order Mark:</a></p><p><a href="https://chromium.googlesource.com/chromium/+/refs/heads/trunk/chrome/browser/character_encoding.cc#35">Character Encodings</a></p><p><a href="https://shapecatcher.com/unicode/info/65533">ShapeCatcher</a></p><p><a href="https://soroush.me/blog/2018/08/waf-bypass-techniques-using-http-standard-and-web-servers-behaviour/">WAF Bypass</a></p><p><a href="https://github.com/avlidienbrunn/bountydash">BountyDash</a></p><p><a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface.pdf">EXPLOITING HTTP'S HIDDEN ATTACK-SURFACE</a></p><p></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:10:06) Automation Setup and Assetnote Origins</p><p>(00:16:49) Sharing Tips, and Content Creation</p><p>(00:22:27) Collaboration and Optimization</p><p>(00:36:44) Working at Detectify</p><p>(00:51:45) Bug Bounty Burnout</p><p>(00:56:15) Early Days of Bug Bounty and Future Predictions</p><p>(01:19:00) Nerdsnipeability</p><p>(01:29:38) MXSS and XSLT</p><p>(01:54:20) Learning through being wrong</p><p>(02:00:15) Go-to Vulns</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 50: In this episode of Critical Thinking - Bug Bounty Podcast, Justin catches up with hacking master Mathias Karlsson, and talks about burnout, collaboration, and the importance of specialization. Then we dive into the technical details of MXSS and XSLT, character encoding, and give some predictions of what Bug Bounty might look like in the future…</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p><a href="https://ctbb.show/discord">Hop on the CTBB Discord!</a></p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p><a href="https://twitter.com/avlidienbrunn">Today’s Guest</a></p><p><strong>Episode Resources</strong></p><p><a href="https://www.youtube.com/watch?v=WTH6f0R7uzo">How to Differentiate Yourself as a Hunter</a></p><p><a href="https://gist.github.com/defparam/840f7d9e31f77b3c5460c5921e0787ef">MutateMethods</a></p><p><a href="https://htmlparse.hackaplaneten.se/">hackaplaneten</a></p><p><a href="https://www.joelonsoftware.com/2003/10/08/the-absolute-minimum-every-software-developer-absolutely-positively-must-know-about-unicode-and-character-sets-no-excuses/">Article About Unicode and Character Sets</a></p><p><a href="https://en.wikipedia.org/wiki/Byte_order_mark">Byte Order Mark:</a></p><p><a href="https://chromium.googlesource.com/chromium/+/refs/heads/trunk/chrome/browser/character_encoding.cc#35">Character Encodings</a></p><p><a href="https://shapecatcher.com/unicode/info/65533">ShapeCatcher</a></p><p><a href="https://soroush.me/blog/2018/08/waf-bypass-techniques-using-http-standard-and-web-servers-behaviour/">WAF Bypass</a></p><p><a href="https://github.com/avlidienbrunn/bountydash">BountyDash</a></p><p><a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface.pdf">EXPLOITING HTTP'S HIDDEN ATTACK-SURFACE</a></p><p></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:10:06) Automation Setup and Assetnote Origins</p><p>(00:16:49) Sharing Tips, and Content Creation</p><p>(00:22:27) Collaboration and Optimization</p><p>(00:36:44) Working at Detectify</p><p>(00:51:45) Bug Bounty Burnout</p><p>(00:56:15) Early Days of Bug Bounty and Future Predictions</p><p>(01:19:00) Nerdsnipeability</p><p>(01:29:38) MXSS and XSLT</p><p>(01:54:20) Learning through being wrong</p><p>(02:00:15) Go-to Vulns</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 50: In this episode of Critical Thinking - Bug Bounty Podcast, Justin catches up with hacking master Mathias Karlsson, and talks about burnout, collaboration, and the importance of specialization. Then we dive into the technical details of ...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>50</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">9c6e638f-73e0-4439-91fc-12ebc1c27a13</guid>
  <title><![CDATA[Episode 49: Getting Live Hacking Event Invites & Bug Bounty Collab with Nagli]]></title>
  <description><![CDATA[<p>Episode 49: In this episode of Critical Thinking - Bug Bounty Podcast, Justin Gardner is once again joined by Nagli to discuss some of their recent hacking discoveries. They talk about finding and exploiting a backup file in an <a href="http://ASP.NET">ASP.NET</a> app, discovering vulnerabilities through Swagger files, and debating the vulnerability of a specific ‘undisclosed’ domain. Then they reflect on 2023’s Live Hacking Event circuit, and preview what’s to come in 2024’s.</p><p><strong>This episode sponsored by Wordfence! </strong>Wordfence recently launched a game-changer of a bug bounty program with ALL WordPress plugins over 50k installs are in-scope. They are currently paying 6.25x their normal bounty amounts, and have agreed to give CT listeners a 10% bonus on top of that! If you wanna pop some crits and see those bounties roll in, head over to <a href="https://ctbb.show/wf">https://ctbb.show/wf</a> for more info and keep an eye on the CTBB Discord for inspiration/collabs.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount. </p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc. </p><p><a href="https://twitter.com/naglinagli">Today’s Guest</a></p><p><strong>Episode Resources:</strong></p><p><a href>Shockwave</a></p><p><a href="https://github.com/frohoff/ysoserial">Why So Serial</a></p><p><a href="https://www.hackerone.com/lhe/2024-lhe-invitations">New LHE Standards Dropped</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:37) wwwroot .zip Hack Recap</p><p>(00:13:44) Swagger File Hack Recap</p><p>(00:18:27) Undisclosed URL Hack Recap</p><p>(00:24:29) 2023 LHE Circut Recap</p><p>(00:37:14) 2024 LHE Preview and New Standards</p><p>(00:47:22) Bug Bounty Motivation</p>]]></description>
  <embed_id>d1f14593-24ab-4ca3-be49-62394ab2d3d3</embed_id>
  <pubDate>Thu, 14 Dec 2023 11:00:28 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="49489847" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/2448acbb-8004-4d8e-86ef-422a8766048a/episode.mp3" />
  <itunes:title><![CDATA[Episode 49: Getting Live Hacking Event Invites & Bug Bounty Collab with Nagli]]></itunes:title>
  <itunes:duration>51:33</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 49: In this episode of Critical Thinking - Bug Bounty Podcast, Justin Gardner is once again joined by Nagli to discuss some of their recent hacking discoveries. They talk about finding and exploiting a backup file in an <a href="http://ASP.NET">ASP.NET</a> app, discovering vulnerabilities through Swagger files, and debating the vulnerability of a specific ‘undisclosed’ domain. Then they reflect on 2023’s Live Hacking Event circuit, and preview what’s to come in 2024’s.</p><p><strong>This episode sponsored by Wordfence! </strong>Wordfence recently launched a game-changer of a bug bounty program with ALL WordPress plugins over 50k installs are in-scope. They are currently paying 6.25x their normal bounty amounts, and have agreed to give CT listeners a 10% bonus on top of that! If you wanna pop some crits and see those bounties roll in, head over to <a href="https://ctbb.show/wf">https://ctbb.show/wf</a> for more info and keep an eye on the CTBB Discord for inspiration/collabs.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount. </p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc. </p><p><a href="https://twitter.com/naglinagli">Today’s Guest</a></p><p><strong>Episode Resources:</strong></p><p><a href>Shockwave</a></p><p><a href="https://github.com/frohoff/ysoserial">Why So Serial</a></p><p><a href="https://www.hackerone.com/lhe/2024-lhe-invitations">New LHE Standards Dropped</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:37) wwwroot .zip Hack Recap</p><p>(00:13:44) Swagger File Hack Recap</p><p>(00:18:27) Undisclosed URL Hack Recap</p><p>(00:24:29) 2023 LHE Circut Recap</p><p>(00:37:14) 2024 LHE Preview and New Standards</p><p>(00:47:22) Bug Bounty Motivation</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 49: In this episode of Critical Thinking - Bug Bounty Podcast, Justin Gardner is once again joined by Nagli to discuss some of their recent hacking discoveries. They talk about finding and exploiting a backup file in an <a href="http://ASP.NET">ASP.NET</a> app, discovering vulnerabilities through Swagger files, and debating the vulnerability of a specific ‘undisclosed’ domain. Then they reflect on 2023’s Live Hacking Event circuit, and preview what’s to come in 2024’s.</p><p><strong>This episode sponsored by Wordfence! </strong>Wordfence recently launched a game-changer of a bug bounty program with ALL WordPress plugins over 50k installs are in-scope. They are currently paying 6.25x their normal bounty amounts, and have agreed to give CT listeners a 10% bonus on top of that! If you wanna pop some crits and see those bounties roll in, head over to <a href="https://ctbb.show/wf">https://ctbb.show/wf</a> for more info and keep an eye on the CTBB Discord for inspiration/collabs.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount. </p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc. </p><p><a href="https://twitter.com/naglinagli">Today’s Guest</a></p><p><strong>Episode Resources:</strong></p><p><a href>Shockwave</a></p><p><a href="https://github.com/frohoff/ysoserial">Why So Serial</a></p><p><a href="https://www.hackerone.com/lhe/2024-lhe-invitations">New LHE Standards Dropped</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:37) wwwroot .zip Hack Recap</p><p>(00:13:44) Swagger File Hack Recap</p><p>(00:18:27) Undisclosed URL Hack Recap</p><p>(00:24:29) 2023 LHE Circut Recap</p><p>(00:37:14) 2024 LHE Preview and New Standards</p><p>(00:47:22) Bug Bounty Motivation</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 49: In this episode of Critical Thinking - Bug Bounty Podcast, Justin Gardner is once again joined by Nagli to discuss some of their recent hacking discoveries. They talk about finding and exploiting a backup file in an ASP.NET app, discove...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>49</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">f6f5b160-9e53-4f00-bc28-f76c882674d9</guid>
  <title><![CDATA[Episode 48: MVH, DEFCON Black Badge, Googler - Sam Erb]]></title>
  <description><![CDATA[<p>Episode 48: In this episode, joined by the spectacular Sam Erb, Google Security Engineer and DEFCON Black Badge winner. We talk about the importance of understanding how systems work to find vulnerabilities, and how his engineering background influences his hunting style and methodologies. Then we jump over to his Career Development and his work with Google, and then chat about some of the recent Google Vulnerability Programs.</p><p><strong>This episode is sponsored by Wordfence! </strong>Wordfence recently launched a game-changer of a bug bounty program with ALL WordPress plugins over 50k installs are in-scope. They are currently paying 6.25x their normal bounty amounts, and have agreed to give CT listeners a 10% bonus on top of that! Head over to <a href="https://ctbb.show/wf">https://ctbb.show/wf</a> for more info and keep an eye on the CTBB Discord for inspiration/collabs.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>—— Links ——</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>—— Ways to Support CTBBPodcast ——</p><p>Sign up for <a href="https://caido.io/">Caido</a> using code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB <a href="https://ctbb.show/discord">Discord</a></p><p>Discord premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest:</p><p><a href="https://twitter.com/erbbysam">https://twitter.com/erbbysam</a></p><p><a href="https://github.com/google/security-research/security/advisories/GHSA-5jw3-3rpx-7p27">Sam Erbs Static Secret</a></p><p><a href="https://twit.tv/shows/security-now">Security Now Podcast</a></p><p><a href="https://en.wikipedia.org/wiki/Brand_Indicators_for_Message_Identification">BIMI:</a></p><p>And</p><p><a href="https://bimigroup.org/">https://bimigroup.org/</a></p><p><a href="https://security.googleblog.com/2023/05/new-android-google-device-VRP.html">Google Device Vulnerability Reward Program Initiatives</a></p><p><a href="https://bughunters.google.com/learn/invalid-reports">Google Invalid Reports</a></p><p><a href="https://youtube.com/playlist?list=PL590L5WQmH8dsxxz7ooJAgmijwOz0lh2H">Hacking Google</a></p><p>Transcripts</p><p>(00:00:00) Introduction</p><p>(00:02:50) Hacker Methodology with Sam Erb</p><p>(00:12:20) Balancing Bug Hunting and Personal Life</p><p>(00:15:53) Deep Diving on a program and using automation.</p><p>(00:27:00) Optimizing Bug Hunting and Understanding Attack Vectors</p><p>(00:39:22) Collaboration and Boundaries</p><p>(00:45:42) Career Development and Entrepreneurship</p><p>(00:55:13) Winning Black Badges at DEFCON</p><p>(00:58:02) BufferOver</p><p>(01:09:11) Working at Google</p><p>(01:19:23) Google Bug Bounty Programs</p><p>(01:31:41) BONUS Cool Bugs</p>]]></description>
  <embed_id>47f8bba0-34cb-4bfc-9453-bd0a937583fc</embed_id>
  <pubDate>Thu, 07 Dec 2023 11:00:17 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="92882369" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/7293ddf3-9ed1-4402-b2a1-eb9b0e20e97a/episode.mp3" />
  <itunes:title><![CDATA[Episode 48: MVH, DEFCON Black Badge, Googler - Sam Erb]]></itunes:title>
  <itunes:duration>1:36:45</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 48: In this episode, joined by the spectacular Sam Erb, Google Security Engineer and DEFCON Black Badge winner. We talk about the importance of understanding how systems work to find vulnerabilities, and how his engineering background influences his hunting style and methodologies. Then we jump over to his Career Development and his work with Google, and then chat about some of the recent Google Vulnerability Programs.</p><p><strong>This episode is sponsored by Wordfence! </strong>Wordfence recently launched a game-changer of a bug bounty program with ALL WordPress plugins over 50k installs are in-scope. They are currently paying 6.25x their normal bounty amounts, and have agreed to give CT listeners a 10% bonus on top of that! Head over to <a href="https://ctbb.show/wf">https://ctbb.show/wf</a> for more info and keep an eye on the CTBB Discord for inspiration/collabs.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>—— Links ——</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>—— Ways to Support CTBBPodcast ——</p><p>Sign up for <a href="https://caido.io/">Caido</a> using code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB <a href="https://ctbb.show/discord">Discord</a></p><p>Discord premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest:</p><p><a href="https://twitter.com/erbbysam">https://twitter.com/erbbysam</a></p><p><a href="https://github.com/google/security-research/security/advisories/GHSA-5jw3-3rpx-7p27">Sam Erbs Static Secret</a></p><p><a href="https://twit.tv/shows/security-now">Security Now Podcast</a></p><p><a href="https://en.wikipedia.org/wiki/Brand_Indicators_for_Message_Identification">BIMI:</a></p><p>And</p><p><a href="https://bimigroup.org/">https://bimigroup.org/</a></p><p><a href="https://security.googleblog.com/2023/05/new-android-google-device-VRP.html">Google Device Vulnerability Reward Program Initiatives</a></p><p><a href="https://bughunters.google.com/learn/invalid-reports">Google Invalid Reports</a></p><p><a href="https://youtube.com/playlist?list=PL590L5WQmH8dsxxz7ooJAgmijwOz0lh2H">Hacking Google</a></p><p>Transcripts</p><p>(00:00:00) Introduction</p><p>(00:02:50) Hacker Methodology with Sam Erb</p><p>(00:12:20) Balancing Bug Hunting and Personal Life</p><p>(00:15:53) Deep Diving on a program and using automation.</p><p>(00:27:00) Optimizing Bug Hunting and Understanding Attack Vectors</p><p>(00:39:22) Collaboration and Boundaries</p><p>(00:45:42) Career Development and Entrepreneurship</p><p>(00:55:13) Winning Black Badges at DEFCON</p><p>(00:58:02) BufferOver</p><p>(01:09:11) Working at Google</p><p>(01:19:23) Google Bug Bounty Programs</p><p>(01:31:41) BONUS Cool Bugs</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 48: In this episode, joined by the spectacular Sam Erb, Google Security Engineer and DEFCON Black Badge winner. We talk about the importance of understanding how systems work to find vulnerabilities, and how his engineering background influences his hunting style and methodologies. Then we jump over to his Career Development and his work with Google, and then chat about some of the recent Google Vulnerability Programs.</p><p><strong>This episode is sponsored by Wordfence! </strong>Wordfence recently launched a game-changer of a bug bounty program with ALL WordPress plugins over 50k installs are in-scope. They are currently paying 6.25x their normal bounty amounts, and have agreed to give CT listeners a 10% bonus on top of that! Head over to <a href="https://ctbb.show/wf">https://ctbb.show/wf</a> for more info and keep an eye on the CTBB Discord for inspiration/collabs.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>—— Links ——</p><p>Follow your hosts <a href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>—— Ways to Support CTBBPodcast ——</p><p>Sign up for <a href="https://caido.io/">Caido</a> using code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB <a href="https://ctbb.show/discord">Discord</a></p><p>Discord premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>Today’s Guest:</p><p><a href="https://twitter.com/erbbysam">https://twitter.com/erbbysam</a></p><p><a href="https://github.com/google/security-research/security/advisories/GHSA-5jw3-3rpx-7p27">Sam Erbs Static Secret</a></p><p><a href="https://twit.tv/shows/security-now">Security Now Podcast</a></p><p><a href="https://en.wikipedia.org/wiki/Brand_Indicators_for_Message_Identification">BIMI:</a></p><p>And</p><p><a href="https://bimigroup.org/">https://bimigroup.org/</a></p><p><a href="https://security.googleblog.com/2023/05/new-android-google-device-VRP.html">Google Device Vulnerability Reward Program Initiatives</a></p><p><a href="https://bughunters.google.com/learn/invalid-reports">Google Invalid Reports</a></p><p><a href="https://youtube.com/playlist?list=PL590L5WQmH8dsxxz7ooJAgmijwOz0lh2H">Hacking Google</a></p><p>Transcripts</p><p>(00:00:00) Introduction</p><p>(00:02:50) Hacker Methodology with Sam Erb</p><p>(00:12:20) Balancing Bug Hunting and Personal Life</p><p>(00:15:53) Deep Diving on a program and using automation.</p><p>(00:27:00) Optimizing Bug Hunting and Understanding Attack Vectors</p><p>(00:39:22) Collaboration and Boundaries</p><p>(00:45:42) Career Development and Entrepreneurship</p><p>(00:55:13) Winning Black Badges at DEFCON</p><p>(00:58:02) BufferOver</p><p>(01:09:11) Working at Google</p><p>(01:19:23) Google Bug Bounty Programs</p><p>(01:31:41) BONUS Cool Bugs</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 48: In this episode, joined by the spectacular Sam Erb, Google Security Engineer and DEFCON Black Badge winner. We talk about the importance of understanding how systems work to find vulnerabilities, and how his engineering background influ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>48</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">f8d46896-6965-42ce-b6fb-3489fe10e007</guid>
  <title><![CDATA[Episode 47: CSP Research, Iframe Hopping, and Client-side Shenanigans]]></title>
  <description><![CDATA[<p>Episode 47: In this episode of Critical Thinking - Bug Bounty Podcast, the holidays are fast approaching, and Justin and Joel discuss some of the struggles of getting back into the hacking groove during and after breaks. We also celebrate the newly launched Critical Thinking Discord Community before diving into Iframe Sandwhiches, JS Hoisting, CSP Bypasses, and a host of new tools, techniques, and tangents.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p><a href="https://github.com/c3l3si4n/thankunext">ThankUNext</a></p><p><a href="https://www.jswzl.io/">jswzl</a></p><p><a href="https://rapidapi.com/">Rapid API</a></p><p><a href="https://ssrf.cvssadvisor.com/">SSRF Utility tool by Bebiks</a></p><p><a href="https://x.com/joaxcar/status/1724788299875958821?s=20">Tweet from Johan Carlsson</a></p><p><a href="https://twitter.com/GoogleVRP/status/1724512175799079236">Burp Extension from Google VRP</a></p><p><a href="https://twitter.com/Rhynorater/status/1722636015070744713">Justin's Tweet about JS Hoisting</a></p><p><a href="https://octagon.net/blog/2022/05/29/bypass-csp-using-wordpress-by-abusing-same-origin-method-execution/">Bypass CSP Using WordPress</a></p><p><a href="https://www.google.com/amp/s/lab.wallarm.com/how-to-trick-csp-in-letting-you-run-whatever-you-want-73cb5ff428aa/amp/">How to trick CSP in letting you run whatever you want</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:58) Overcoming Bug Bounty struggles and getting back into the hacking groove</p><p>(00:07:46) Taking notes and sticking to one program</p><p>(00:14:50) Critical Thinking Discord, Community highlights, and Competition vs Collaboration</p><p>(00:22:25) Secondary context bugs and Automationism</p><p>(00:28:42) ThankUNext and Client-side Paths</p><p>(00:33:45) Tool Tangents: Jswzl, Caido, Postman, and Rapid API</p><p>(00:46:49) New SSRF Utility tool by Bebiks and the continuing evolution of hacking tools</p><p>(00:51:45) Iframe Sandwiches</p><p>(00:58:54) News Items</p><p>(01:06:12) JS Hoisting</p><p>(01:15:05) CSP Bypasses</p>]]></description>
  <embed_id>5939a7bf-d1fb-41a3-bdf1-b155bd16ee85</embed_id>
  <pubDate>Thu, 30 Nov 2023 11:00:20 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="88194121" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/51479d07-9165-40a1-b8ed-c5e453da080b/episode.mp3" />
  <itunes:title><![CDATA[Episode 47: CSP Research, Iframe Hopping, and Client-side Shenanigans]]></itunes:title>
  <itunes:duration>1:31:52</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 47: In this episode of Critical Thinking - Bug Bounty Podcast, the holidays are fast approaching, and Justin and Joel discuss some of the struggles of getting back into the hacking groove during and after breaks. We also celebrate the newly launched Critical Thinking Discord Community before diving into Iframe Sandwhiches, JS Hoisting, CSP Bypasses, and a host of new tools, techniques, and tangents.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p><a href="https://github.com/c3l3si4n/thankunext">ThankUNext</a></p><p><a href="https://www.jswzl.io/">jswzl</a></p><p><a href="https://rapidapi.com/">Rapid API</a></p><p><a href="https://ssrf.cvssadvisor.com/">SSRF Utility tool by Bebiks</a></p><p><a href="https://x.com/joaxcar/status/1724788299875958821?s=20">Tweet from Johan Carlsson</a></p><p><a href="https://twitter.com/GoogleVRP/status/1724512175799079236">Burp Extension from Google VRP</a></p><p><a href="https://twitter.com/Rhynorater/status/1722636015070744713">Justin's Tweet about JS Hoisting</a></p><p><a href="https://octagon.net/blog/2022/05/29/bypass-csp-using-wordpress-by-abusing-same-origin-method-execution/">Bypass CSP Using WordPress</a></p><p><a href="https://www.google.com/amp/s/lab.wallarm.com/how-to-trick-csp-in-letting-you-run-whatever-you-want-73cb5ff428aa/amp/">How to trick CSP in letting you run whatever you want</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:58) Overcoming Bug Bounty struggles and getting back into the hacking groove</p><p>(00:07:46) Taking notes and sticking to one program</p><p>(00:14:50) Critical Thinking Discord, Community highlights, and Competition vs Collaboration</p><p>(00:22:25) Secondary context bugs and Automationism</p><p>(00:28:42) ThankUNext and Client-side Paths</p><p>(00:33:45) Tool Tangents: Jswzl, Caido, Postman, and Rapid API</p><p>(00:46:49) New SSRF Utility tool by Bebiks and the continuing evolution of hacking tools</p><p>(00:51:45) Iframe Sandwiches</p><p>(00:58:54) News Items</p><p>(01:06:12) JS Hoisting</p><p>(01:15:05) CSP Bypasses</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 47: In this episode of Critical Thinking - Bug Bounty Podcast, the holidays are fast approaching, and Justin and Joel discuss some of the struggles of getting back into the hacking groove during and after breaks. We also celebrate the newly launched Critical Thinking Discord Community before diving into Iframe Sandwhiches, JS Hoisting, CSP Bypasses, and a host of new tools, techniques, and tangents.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Hop on the CTBB Discord at <a href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p><a href="https://github.com/c3l3si4n/thankunext">ThankUNext</a></p><p><a href="https://www.jswzl.io/">jswzl</a></p><p><a href="https://rapidapi.com/">Rapid API</a></p><p><a href="https://ssrf.cvssadvisor.com/">SSRF Utility tool by Bebiks</a></p><p><a href="https://x.com/joaxcar/status/1724788299875958821?s=20">Tweet from Johan Carlsson</a></p><p><a href="https://twitter.com/GoogleVRP/status/1724512175799079236">Burp Extension from Google VRP</a></p><p><a href="https://twitter.com/Rhynorater/status/1722636015070744713">Justin's Tweet about JS Hoisting</a></p><p><a href="https://octagon.net/blog/2022/05/29/bypass-csp-using-wordpress-by-abusing-same-origin-method-execution/">Bypass CSP Using WordPress</a></p><p><a href="https://www.google.com/amp/s/lab.wallarm.com/how-to-trick-csp-in-letting-you-run-whatever-you-want-73cb5ff428aa/amp/">How to trick CSP in letting you run whatever you want</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:58) Overcoming Bug Bounty struggles and getting back into the hacking groove</p><p>(00:07:46) Taking notes and sticking to one program</p><p>(00:14:50) Critical Thinking Discord, Community highlights, and Competition vs Collaboration</p><p>(00:22:25) Secondary context bugs and Automationism</p><p>(00:28:42) ThankUNext and Client-side Paths</p><p>(00:33:45) Tool Tangents: Jswzl, Caido, Postman, and Rapid API</p><p>(00:46:49) New SSRF Utility tool by Bebiks and the continuing evolution of hacking tools</p><p>(00:51:45) Iframe Sandwiches</p><p>(00:58:54) News Items</p><p>(01:06:12) JS Hoisting</p><p>(01:15:05) CSP Bypasses</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 47: In this episode of Critical Thinking - Bug Bounty Podcast, the holidays are fast approaching, and Justin and Joel discuss some of the struggles of getting back into the hacking groove during and after breaks. We also celebrate the newly...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>47</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">641b7144-6013-4341-a8c7-dab75a1d1993</guid>
  <title><![CDATA[Episode 46: The SAML Ramble]]></title>
  <description><![CDATA[<p>Episode 46: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is deep diving the topic of SAML (Security Assertion Markup Language), and walks through what it is and why it can be intimidating, before going over some key attack vectors to look for. Then he closes out with a commentary on a sample payload, and some HackerOne reports.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>KazHACKstan</p><p><a href="https://kazhackstan.com/en">https://kazhackstan.com/en</a></p><p>Testing SAML security with DAST</p><p><a href="https://agrrrdog.blogspot.com/2023/01/testing-saml-security-with-dast.html">https://agrrrdog.blogspot.com/2023/01/testing-saml-security-with-dast.html</a></p><p>How to break SAML if I have paws?</p><p><a href="https://speakerdeck.com/greendog/how-to-break-saml-if-i-have-paws?slide=20">https://speakerdeck.com/greendog/how-to-break-saml-if-i-have-paws?slide=20</a></p><p>How to Hunt Bugs in SAML; a Methodology</p><p><a href="https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-part-three/">https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-part-three/</a></p><p>SAML Raider</p><p><a href="https://portswigger.net/bappstore/c61cfa893bb14db4b01775554f7b802e">https://portswigger.net/bappstore/c61cfa893bb14db4b01775554f7b802e</a></p><p>External Entity Injection during XML signature verification</p><p><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2313">https://bugs.chromium.org/p/project-zero/issues/detail?id=2313</a></p><p>mTLS: When certificate authentication is done wrong</p><p><a href="https://github.blog/2023-08-17-mtls-when-certificate-authentication-is-done-wrong/">https://github.blog/2023-08-17-mtls-when-certificate-authentication-is-done-wrong/</a></p><p>HackerOne Uber Report</p><p><a href="https://hackerone.com/reports/136169">https://hackerone.com/reports/136169</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:25) Understanding SAML and its complexities</p><p>(00:08:30) SAML Attack Vectors</p><p>(00:14:15) XML Signature Wrapping</p><p>(00:19:50) Some SAML tests to try</p><p>(00:30:30) Sample Payload description</p><p>(00:34:10) Token Recipient confusion</p><p>(00:36:05) HackerOne Reports</p>]]></description>
  <embed_id>6d719703-9276-4586-b3b9-0c2e982eeff5</embed_id>
  <pubDate>Thu, 23 Nov 2023 11:00:23 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="41921860" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/2ac7f6db-ffe5-420f-912a-5844b39443d8/episode.mp3" />
  <itunes:title><![CDATA[Episode 46: The SAML Ramble]]></itunes:title>
  <itunes:duration>43:40</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 46: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is deep diving the topic of SAML (Security Assertion Markup Language), and walks through what it is and why it can be intimidating, before going over some key attack vectors to look for. Then he closes out with a commentary on a sample payload, and some HackerOne reports.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>KazHACKstan</p><p><a href="https://kazhackstan.com/en">https://kazhackstan.com/en</a></p><p>Testing SAML security with DAST</p><p><a href="https://agrrrdog.blogspot.com/2023/01/testing-saml-security-with-dast.html">https://agrrrdog.blogspot.com/2023/01/testing-saml-security-with-dast.html</a></p><p>How to break SAML if I have paws?</p><p><a href="https://speakerdeck.com/greendog/how-to-break-saml-if-i-have-paws?slide=20">https://speakerdeck.com/greendog/how-to-break-saml-if-i-have-paws?slide=20</a></p><p>How to Hunt Bugs in SAML; a Methodology</p><p><a href="https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-part-three/">https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-part-three/</a></p><p>SAML Raider</p><p><a href="https://portswigger.net/bappstore/c61cfa893bb14db4b01775554f7b802e">https://portswigger.net/bappstore/c61cfa893bb14db4b01775554f7b802e</a></p><p>External Entity Injection during XML signature verification</p><p><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2313">https://bugs.chromium.org/p/project-zero/issues/detail?id=2313</a></p><p>mTLS: When certificate authentication is done wrong</p><p><a href="https://github.blog/2023-08-17-mtls-when-certificate-authentication-is-done-wrong/">https://github.blog/2023-08-17-mtls-when-certificate-authentication-is-done-wrong/</a></p><p>HackerOne Uber Report</p><p><a href="https://hackerone.com/reports/136169">https://hackerone.com/reports/136169</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:25) Understanding SAML and its complexities</p><p>(00:08:30) SAML Attack Vectors</p><p>(00:14:15) XML Signature Wrapping</p><p>(00:19:50) Some SAML tests to try</p><p>(00:30:30) Sample Payload description</p><p>(00:34:10) Token Recipient confusion</p><p>(00:36:05) HackerOne Reports</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 46: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is deep diving the topic of SAML (Security Assertion Markup Language), and walks through what it is and why it can be intimidating, before going over some key attack vectors to look for. Then he closes out with a commentary on a sample payload, and some HackerOne reports.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>KazHACKstan</p><p><a href="https://kazhackstan.com/en">https://kazhackstan.com/en</a></p><p>Testing SAML security with DAST</p><p><a href="https://agrrrdog.blogspot.com/2023/01/testing-saml-security-with-dast.html">https://agrrrdog.blogspot.com/2023/01/testing-saml-security-with-dast.html</a></p><p>How to break SAML if I have paws?</p><p><a href="https://speakerdeck.com/greendog/how-to-break-saml-if-i-have-paws?slide=20">https://speakerdeck.com/greendog/how-to-break-saml-if-i-have-paws?slide=20</a></p><p>How to Hunt Bugs in SAML; a Methodology</p><p><a href="https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-part-three/">https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-part-three/</a></p><p>SAML Raider</p><p><a href="https://portswigger.net/bappstore/c61cfa893bb14db4b01775554f7b802e">https://portswigger.net/bappstore/c61cfa893bb14db4b01775554f7b802e</a></p><p>External Entity Injection during XML signature verification</p><p><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2313">https://bugs.chromium.org/p/project-zero/issues/detail?id=2313</a></p><p>mTLS: When certificate authentication is done wrong</p><p><a href="https://github.blog/2023-08-17-mtls-when-certificate-authentication-is-done-wrong/">https://github.blog/2023-08-17-mtls-when-certificate-authentication-is-done-wrong/</a></p><p>HackerOne Uber Report</p><p><a href="https://hackerone.com/reports/136169">https://hackerone.com/reports/136169</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:25) Understanding SAML and its complexities</p><p>(00:08:30) SAML Attack Vectors</p><p>(00:14:15) XML Signature Wrapping</p><p>(00:19:50) Some SAML tests to try</p><p>(00:30:30) Sample Payload description</p><p>(00:34:10) Token Recipient confusion</p><p>(00:36:05) HackerOne Reports</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 46: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is deep diving the topic of SAML (Security Assertion Markup Language), and walks through what it is and why it can be intimidating, before going over some key attack vect...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>46</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">e568a5fc-e368-45c3-87db-1d31b7e921d7</guid>
  <title><![CDATA[Episode 45: The OG Bug Bounty King - Frans Rosen]]></title>
  <description><![CDATA[<p>Episode 45: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome Frans Rosén, an OG bug bounty hunter and co-founder of Detectify. We kick off with Frans sharing his journey bug bounty and security startups, before diving headfirst into a host of his blog posts. We also cover the value of pseudo-code for bug exploitation, understanding developer terminology, the challenges of collaboration and delegating tasks, and balancing hacking with parenting. If you're interested in bug bounty or entrepreneurship, you won't want to miss it!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Join our <a href="https://www.criticalthinkingpodcast.io/discord">Discord!</a></p><p>Today's Guest:</p><p><a href="https://twitter.com/fransrosen">https://twitter.com/fransrosen</a></p><p><a href="https://labs.detectify.com/">Detectify</a></p><p><a href="https://labs.detectify.com/writeups/hostile-subdomain-takeover-using-heroku-github-desk-more/">Discovering s3 subdomain takeovers</a></p><p><a href="https://gist.github.com/fransr/a155e5bd7ab11c93923ec8ce788e3368">Bucket Disclose</a></p><p><a href="https://labs.detectify.com/writeups/a-deep-dive-into-aws-s3-access-controls-taking-full-control-over-your-assets/">A deep dive into AWS S3 access controls</a></p><p><a href="https://www.slideshare.net/OWASP_Poland/owasp-poland-day-2018-frans-rosen-attacking-modern-web-technologies">Attacking Modern Web Technologies</a></p><p><a href="https://speakerdeck.com/fransrosen/live-hacking-like-a-mvh-a-walkthrough-on-methodology-and-strategies-to-win-big">Live Hacking like a MVH</a></p><p><a href="https://labs.detectify.com/2022/07/06/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows/">Account hijacking using Dirty Dancing in sign-in OAuth flows</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:50) Franz Rosen's Bug Bounty Journey and the creation of Detectify</p><p>(00:13:30) Benefits of pseudo-code, typing, and thinking like a developer</p><p>(00:20:20) Hunter Methodologies</p><p>(00:35:40) Time on targets, Iteration vs. Ideation, and tips for standing out</p><p>(00:51:10) S3 subdomain takeovers</p><p>(01:05:02) Blog posting and hosting motivations</p><p>(01:13:30) Detectify and entrepreneurial endeavors</p><p>(01:29:50) Attacking Modern Web Technologies</p><p>(01:46:00) postMessage and MessagePort</p><p>(01:58:09) Live Hacking and Collaboration</p><p>(02:13:50) Account Hijacking and OAuth Flows</p><p>(02:28:48) Hacking/Parenting</p>]]></description>
  <embed_id>3997f7be-558d-422d-8dba-e5dd4349d6ed</embed_id>
  <pubDate>Thu, 16 Nov 2023 11:00:31 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="150322086" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/c13f2236-bed7-430a-a11f-484709454ee4/episode.mp3" />
  <itunes:title><![CDATA[Episode 45: The OG Bug Bounty King - Frans Rosen]]></itunes:title>
  <itunes:duration>2:36:35</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 45: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome Frans Rosén, an OG bug bounty hunter and co-founder of Detectify. We kick off with Frans sharing his journey bug bounty and security startups, before diving headfirst into a host of his blog posts. We also cover the value of pseudo-code for bug exploitation, understanding developer terminology, the challenges of collaboration and delegating tasks, and balancing hacking with parenting. If you're interested in bug bounty or entrepreneurship, you won't want to miss it!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Join our <a href="https://www.criticalthinkingpodcast.io/discord">Discord!</a></p><p>Today's Guest:</p><p><a href="https://twitter.com/fransrosen">https://twitter.com/fransrosen</a></p><p><a href="https://labs.detectify.com/">Detectify</a></p><p><a href="https://labs.detectify.com/writeups/hostile-subdomain-takeover-using-heroku-github-desk-more/">Discovering s3 subdomain takeovers</a></p><p><a href="https://gist.github.com/fransr/a155e5bd7ab11c93923ec8ce788e3368">Bucket Disclose</a></p><p><a href="https://labs.detectify.com/writeups/a-deep-dive-into-aws-s3-access-controls-taking-full-control-over-your-assets/">A deep dive into AWS S3 access controls</a></p><p><a href="https://www.slideshare.net/OWASP_Poland/owasp-poland-day-2018-frans-rosen-attacking-modern-web-technologies">Attacking Modern Web Technologies</a></p><p><a href="https://speakerdeck.com/fransrosen/live-hacking-like-a-mvh-a-walkthrough-on-methodology-and-strategies-to-win-big">Live Hacking like a MVH</a></p><p><a href="https://labs.detectify.com/2022/07/06/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows/">Account hijacking using Dirty Dancing in sign-in OAuth flows</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:50) Franz Rosen's Bug Bounty Journey and the creation of Detectify</p><p>(00:13:30) Benefits of pseudo-code, typing, and thinking like a developer</p><p>(00:20:20) Hunter Methodologies</p><p>(00:35:40) Time on targets, Iteration vs. Ideation, and tips for standing out</p><p>(00:51:10) S3 subdomain takeovers</p><p>(01:05:02) Blog posting and hosting motivations</p><p>(01:13:30) Detectify and entrepreneurial endeavors</p><p>(01:29:50) Attacking Modern Web Technologies</p><p>(01:46:00) postMessage and MessagePort</p><p>(01:58:09) Live Hacking and Collaboration</p><p>(02:13:50) Account Hijacking and OAuth Flows</p><p>(02:28:48) Hacking/Parenting</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 45: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome Frans Rosén, an OG bug bounty hunter and co-founder of Detectify. We kick off with Frans sharing his journey bug bounty and security startups, before diving headfirst into a host of his blog posts. We also cover the value of pseudo-code for bug exploitation, understanding developer terminology, the challenges of collaboration and delegating tasks, and balancing hacking with parenting. If you're interested in bug bounty or entrepreneurship, you won't want to miss it!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Join our <a href="https://www.criticalthinkingpodcast.io/discord">Discord!</a></p><p>Today's Guest:</p><p><a href="https://twitter.com/fransrosen">https://twitter.com/fransrosen</a></p><p><a href="https://labs.detectify.com/">Detectify</a></p><p><a href="https://labs.detectify.com/writeups/hostile-subdomain-takeover-using-heroku-github-desk-more/">Discovering s3 subdomain takeovers</a></p><p><a href="https://gist.github.com/fransr/a155e5bd7ab11c93923ec8ce788e3368">Bucket Disclose</a></p><p><a href="https://labs.detectify.com/writeups/a-deep-dive-into-aws-s3-access-controls-taking-full-control-over-your-assets/">A deep dive into AWS S3 access controls</a></p><p><a href="https://www.slideshare.net/OWASP_Poland/owasp-poland-day-2018-frans-rosen-attacking-modern-web-technologies">Attacking Modern Web Technologies</a></p><p><a href="https://speakerdeck.com/fransrosen/live-hacking-like-a-mvh-a-walkthrough-on-methodology-and-strategies-to-win-big">Live Hacking like a MVH</a></p><p><a href="https://labs.detectify.com/2022/07/06/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows/">Account hijacking using Dirty Dancing in sign-in OAuth flows</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:50) Franz Rosen's Bug Bounty Journey and the creation of Detectify</p><p>(00:13:30) Benefits of pseudo-code, typing, and thinking like a developer</p><p>(00:20:20) Hunter Methodologies</p><p>(00:35:40) Time on targets, Iteration vs. Ideation, and tips for standing out</p><p>(00:51:10) S3 subdomain takeovers</p><p>(01:05:02) Blog posting and hosting motivations</p><p>(01:13:30) Detectify and entrepreneurial endeavors</p><p>(01:29:50) Attacking Modern Web Technologies</p><p>(01:46:00) postMessage and MessagePort</p><p>(01:58:09) Live Hacking and Collaboration</p><p>(02:13:50) Account Hijacking and OAuth Flows</p><p>(02:28:48) Hacking/Parenting</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 45: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome Frans Rosén, an OG bug bounty hunter and co-founder of Detectify. We kick off with Frans sharing his journey bug bounty and security startups, before d...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>45</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">94f90354-954e-4731-b5b2-9296dba68e30</guid>
  <title><![CDATA[Episode 44: URL Parsing & Auth Bypass Magic]]></title>
  <description><![CDATA[<p>Episode 44: In this episode of Critical Thinking - Bug Bounty Podcast, the topic is URL structure, and Justin and Joel break down the elements that make up a URL and some common tips and tricks surrounding them which allow for all sorts of bypasses. We also round out the episode with some new tools, ato stories, and some controversial current events in the hacker scene.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p><a href="https://twitter.com/xnl_h4ck3r/status/1718419702194593973">"XnlReveal" XNL h4ck3r</a></p><p><a href="https://salt.security/blog/oh-auth-abusing-oauth-to-take-over-millions-of-accounts">OAuth article by Salt Labs</a></p><p><a href="https://hackerone.com/reports/2180521">H1 controversy recap</a></p><p>ATO through Facebook Login</p><p><a href="https://twitter.com/Jayesh25_/status/1718543152296939861">https://twitter.com/Jayesh25_/status/1718543152296939861</a></p><p><a href="https://twitter.com/itscachemoney/status/1721658450613346557">https://twitter.com/itscachemoney/status/1721658450613346557</a></p><p><a href="https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/">When URL Parsers disagree</a></p><p><a href="https://hackerone.com/reports/431002">Golden techniques to bypass host validations in Android apps</a></p><p><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Authentication#access_using_credentials_in_the_url">Mozilla article on HTTP Authentication</a></p><p><a href="https://i.blackhat.com/us-18/Wed-August-8/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf">Breaking Parser Logic talk by Orange Tsai</a></p><p><a href="https://engineering.linkedin.com/blog/2016/06/open-sourcing-url-detector--a-java-library-to-detect-and-normali">URL Detector</a></p><p><a href="https://cheatsheetseries.owasp.org/assets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet_SSRF_Bible.pdf">SSRF Bible</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:10) “Xnl-Reveal”</p><p>(00:07:22) OAuth vulnerabilities</p><p>(00:13:17) Recap of controversy surrounding the handling of a vulnerability report on H1</p><p>(00:18:55) Hacker Success Manager Program</p><p>(00:22:30) Facebook login ATO</p><p>(00:27:45) When URL parsers disagree</p><p>(00:34:34) URL Structures</p><p>(01:02:22) Shared secrets across environments</p><p>(01:09:40) Social Media Logins</p>]]></description>
  <embed_id>a7e41c98-5c74-4857-9636-f8a177ebb71c</embed_id>
  <pubDate>Thu, 09 Nov 2023 11:00:28 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="68593931" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/ecaba417-5271-4187-a71a-0a1cc68df7c8/episode.mp3" />
  <itunes:title><![CDATA[Episode 44: URL Parsing & Auth Bypass Magic]]></itunes:title>
  <itunes:duration>1:11:27</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 44: In this episode of Critical Thinking - Bug Bounty Podcast, the topic is URL structure, and Justin and Joel break down the elements that make up a URL and some common tips and tricks surrounding them which allow for all sorts of bypasses. We also round out the episode with some new tools, ato stories, and some controversial current events in the hacker scene.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p><a href="https://twitter.com/xnl_h4ck3r/status/1718419702194593973">"XnlReveal" XNL h4ck3r</a></p><p><a href="https://salt.security/blog/oh-auth-abusing-oauth-to-take-over-millions-of-accounts">OAuth article by Salt Labs</a></p><p><a href="https://hackerone.com/reports/2180521">H1 controversy recap</a></p><p>ATO through Facebook Login</p><p><a href="https://twitter.com/Jayesh25_/status/1718543152296939861">https://twitter.com/Jayesh25_/status/1718543152296939861</a></p><p><a href="https://twitter.com/itscachemoney/status/1721658450613346557">https://twitter.com/itscachemoney/status/1721658450613346557</a></p><p><a href="https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/">When URL Parsers disagree</a></p><p><a href="https://hackerone.com/reports/431002">Golden techniques to bypass host validations in Android apps</a></p><p><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Authentication#access_using_credentials_in_the_url">Mozilla article on HTTP Authentication</a></p><p><a href="https://i.blackhat.com/us-18/Wed-August-8/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf">Breaking Parser Logic talk by Orange Tsai</a></p><p><a href="https://engineering.linkedin.com/blog/2016/06/open-sourcing-url-detector--a-java-library-to-detect-and-normali">URL Detector</a></p><p><a href="https://cheatsheetseries.owasp.org/assets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet_SSRF_Bible.pdf">SSRF Bible</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:10) “Xnl-Reveal”</p><p>(00:07:22) OAuth vulnerabilities</p><p>(00:13:17) Recap of controversy surrounding the handling of a vulnerability report on H1</p><p>(00:18:55) Hacker Success Manager Program</p><p>(00:22:30) Facebook login ATO</p><p>(00:27:45) When URL parsers disagree</p><p>(00:34:34) URL Structures</p><p>(01:02:22) Shared secrets across environments</p><p>(01:09:40) Social Media Logins</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 44: In this episode of Critical Thinking - Bug Bounty Podcast, the topic is URL structure, and Justin and Joel break down the elements that make up a URL and some common tips and tricks surrounding them which allow for all sorts of bypasses. We also round out the episode with some new tools, ato stories, and some controversial current events in the hacker scene.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p><a href="https://twitter.com/xnl_h4ck3r/status/1718419702194593973">"XnlReveal" XNL h4ck3r</a></p><p><a href="https://salt.security/blog/oh-auth-abusing-oauth-to-take-over-millions-of-accounts">OAuth article by Salt Labs</a></p><p><a href="https://hackerone.com/reports/2180521">H1 controversy recap</a></p><p>ATO through Facebook Login</p><p><a href="https://twitter.com/Jayesh25_/status/1718543152296939861">https://twitter.com/Jayesh25_/status/1718543152296939861</a></p><p><a href="https://twitter.com/itscachemoney/status/1721658450613346557">https://twitter.com/itscachemoney/status/1721658450613346557</a></p><p><a href="https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/">When URL Parsers disagree</a></p><p><a href="https://hackerone.com/reports/431002">Golden techniques to bypass host validations in Android apps</a></p><p><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Authentication#access_using_credentials_in_the_url">Mozilla article on HTTP Authentication</a></p><p><a href="https://i.blackhat.com/us-18/Wed-August-8/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf">Breaking Parser Logic talk by Orange Tsai</a></p><p><a href="https://engineering.linkedin.com/blog/2016/06/open-sourcing-url-detector--a-java-library-to-detect-and-normali">URL Detector</a></p><p><a href="https://cheatsheetseries.owasp.org/assets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet_SSRF_Bible.pdf">SSRF Bible</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:10) “Xnl-Reveal”</p><p>(00:07:22) OAuth vulnerabilities</p><p>(00:13:17) Recap of controversy surrounding the handling of a vulnerability report on H1</p><p>(00:18:55) Hacker Success Manager Program</p><p>(00:22:30) Facebook login ATO</p><p>(00:27:45) When URL parsers disagree</p><p>(00:34:34) URL Structures</p><p>(01:02:22) Shared secrets across environments</p><p>(01:09:40) Social Media Logins</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 44: In this episode of Critical Thinking - Bug Bounty Podcast, the topic is URL structure, and Justin and Joel break down the elements that make up a URL and some common tips and tricks surrounding them which allow for all sorts of bypasses...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>44</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">fea78143-3fa8-4b1a-95c0-7c7953f40489</guid>
  <title><![CDATA[Episode 43: Caido - The Up-And-Coming HTTP Proxy]]></title>
  <description><![CDATA[<p>Episode 43: In this episode of Critical Thinking - Bug Bounty Podcast, we're joined by Emile from Caido, who shares his journey into the bug bounty and ethical hacking world. We kick off with a hilarious incident involving Joel, a child on an airplane, and an unfortunate cough. We then dive into the challenges of building an HTTP proxy tool, balancing basic features with nice-to-have features, and the importance of user feedback in shaping the development of Caido, a bug bounty tool.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount on the annual license. </p><p>Today’s Guest:</p><p><a href="https://twitter.com/TheSytten">https://twitter.com/TheSytten</a> </p><p>Caido</p><p><a href="https://caido.io/">https://caido.io/</a></p><p>Caido’s Discord</p><p><a href="https://discord.com/invite/KgGkkpKFaq">https://discord.com/invite/KgGkkpKFaq</a></p><p>VS Code</p><p><a href="https://code.visualstudio.com/">https://code.visualstudio.com/</a></p><p>DNSChef</p><p><a href="https://github.com/iphelix/dnschef">https://github.com/iphelix/dnschef</a></p><p>HackMD</p><p><a href="https://hackmd.io/">https://hackmd.io/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:34) Emile’s journey from general infrastructure development to co-founding Caido</p><p>(00:07:00) The rundown on Caido, a lightweight and flexible HTTP proxy tool</p><p>(00:11:00) Current and upcoming Caido Features</p><p>(00:17:00) Caido crew and division of duties</p><p>(00:19:40) Missing features and feature requests</p><p>(00:23:49) Decision to use Rust</p><p>(00:28:25) Workflows and walkthroughs</p><p>(00:36:27) Intercepts and the Roadmap</p><p>(00:41:15) Opinions on collaborator Functionality and HTTP Callback</p><p>(00:46:19) Reporting and Collaboration</p>]]></description>
  <embed_id>2c691d0b-2b96-49c7-bc98-d5510822c7b3</embed_id>
  <pubDate>Thu, 02 Nov 2023 10:00:24 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="58146197" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/a1759888-6ccf-4c18-a4da-82af4b85f18f/episode.mp3" />
  <itunes:title><![CDATA[Episode 43: Caido - The Up-And-Coming HTTP Proxy]]></itunes:title>
  <itunes:duration>1:00:34</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 43: In this episode of Critical Thinking - Bug Bounty Podcast, we're joined by Emile from Caido, who shares his journey into the bug bounty and ethical hacking world. We kick off with a hilarious incident involving Joel, a child on an airplane, and an unfortunate cough. We then dive into the challenges of building an HTTP proxy tool, balancing basic features with nice-to-have features, and the importance of user feedback in shaping the development of Caido, a bug bounty tool.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount on the annual license. </p><p>Today’s Guest:</p><p><a href="https://twitter.com/TheSytten">https://twitter.com/TheSytten</a> </p><p>Caido</p><p><a href="https://caido.io/">https://caido.io/</a></p><p>Caido’s Discord</p><p><a href="https://discord.com/invite/KgGkkpKFaq">https://discord.com/invite/KgGkkpKFaq</a></p><p>VS Code</p><p><a href="https://code.visualstudio.com/">https://code.visualstudio.com/</a></p><p>DNSChef</p><p><a href="https://github.com/iphelix/dnschef">https://github.com/iphelix/dnschef</a></p><p>HackMD</p><p><a href="https://hackmd.io/">https://hackmd.io/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:34) Emile’s journey from general infrastructure development to co-founding Caido</p><p>(00:07:00) The rundown on Caido, a lightweight and flexible HTTP proxy tool</p><p>(00:11:00) Current and upcoming Caido Features</p><p>(00:17:00) Caido crew and division of duties</p><p>(00:19:40) Missing features and feature requests</p><p>(00:23:49) Decision to use Rust</p><p>(00:28:25) Workflows and walkthroughs</p><p>(00:36:27) Intercepts and the Roadmap</p><p>(00:41:15) Opinions on collaborator Functionality and HTTP Callback</p><p>(00:46:19) Reporting and Collaboration</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 43: In this episode of Critical Thinking - Bug Bounty Podcast, we're joined by Emile from Caido, who shares his journey into the bug bounty and ethical hacking world. We kick off with a hilarious incident involving Joel, a child on an airplane, and an unfortunate cough. We then dive into the challenges of building an HTTP proxy tool, balancing basic features with nice-to-have features, and the importance of user feedback in shaping the development of Caido, a bug bounty tool.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount on the annual license. </p><p>Today’s Guest:</p><p><a href="https://twitter.com/TheSytten">https://twitter.com/TheSytten</a> </p><p>Caido</p><p><a href="https://caido.io/">https://caido.io/</a></p><p>Caido’s Discord</p><p><a href="https://discord.com/invite/KgGkkpKFaq">https://discord.com/invite/KgGkkpKFaq</a></p><p>VS Code</p><p><a href="https://code.visualstudio.com/">https://code.visualstudio.com/</a></p><p>DNSChef</p><p><a href="https://github.com/iphelix/dnschef">https://github.com/iphelix/dnschef</a></p><p>HackMD</p><p><a href="https://hackmd.io/">https://hackmd.io/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:34) Emile’s journey from general infrastructure development to co-founding Caido</p><p>(00:07:00) The rundown on Caido, a lightweight and flexible HTTP proxy tool</p><p>(00:11:00) Current and upcoming Caido Features</p><p>(00:17:00) Caido crew and division of duties</p><p>(00:19:40) Missing features and feature requests</p><p>(00:23:49) Decision to use Rust</p><p>(00:28:25) Workflows and walkthroughs</p><p>(00:36:27) Intercepts and the Roadmap</p><p>(00:41:15) Opinions on collaborator Functionality and HTTP Callback</p><p>(00:46:19) Reporting and Collaboration</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 43: In this episode of Critical Thinking - Bug Bounty Podcast, we're joined by Emile from Caido, who shares his journey into the bug bounty and ethical hacking world. We kick off with a hilarious incident involving Joel, a child on an airpl...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>43</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">1cbd2c29-3168-4f81-8025-7139ab964764</guid>
  <title><![CDATA[Episode 42: Renniepak Interview & Intigriti LHE Recap]]></title>
  <description><![CDATA[<p>Episode 42: In this episode of Critical Thinking - Bug Bounty Podcast, we're live from a hacking event in Portugal, and joined by the extremely talented René de Sain! He helps us cover a host of topics like NFT, XSS, LHE, and tips for success. We also talk about the correlation between creativity and hacking, shared workspaces, and last but certainly not least, hacker tattoos.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Today’s Guest:</p><p><a href="https://twitter.com/renniepak">https://twitter.com/renniepak</a></p><p><a href="https://www.linkedin.com/in/rene-de-sain/">https://www.linkedin.com/in/rene-de-sain/</a> <a href="https://app.intigriti.com/researcher/profile/renniepak">https://app.intigriti.com/researcher/profile/renniepak</a></p><p>Hacker Hideout</p><p><a href="https://hackerhideout.xyz">https://hackerhideout.xyz</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:40) NFT Vulns and web3 hacking</p><p>(00:08:15) Hacker Tattoos</p><p>(00:12:30) Intigriti vs. other platforms, and LHE approaches.</p><p>(00:20:10) Loneliness, budgeting, and the pros and cons of full-time hunting</p><p>(00:28:36) Target approaches, XSS, and extension tools.</p><p>(00:37:40) Fostering hacker intuition and relationships</p><p>(00:47:15) Final thoughts on the Intigriti Event</p>]]></description>
  <embed_id>73858338-7279-4fee-9b95-f9b47adaf8c8</embed_id>
  <pubDate>Thu, 26 Oct 2023 10:00:45 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="56690029" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/45ebd29f-fbdc-4784-a797-7c6ec270b109/episode.mp3" />
  <itunes:title><![CDATA[Episode 42: Renniepak Interview & Intigriti LHE Recap]]></itunes:title>
  <itunes:duration>59:03</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 42: In this episode of Critical Thinking - Bug Bounty Podcast, we're live from a hacking event in Portugal, and joined by the extremely talented René de Sain! He helps us cover a host of topics like NFT, XSS, LHE, and tips for success. We also talk about the correlation between creativity and hacking, shared workspaces, and last but certainly not least, hacker tattoos.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Today’s Guest:</p><p><a href="https://twitter.com/renniepak">https://twitter.com/renniepak</a></p><p><a href="https://www.linkedin.com/in/rene-de-sain/">https://www.linkedin.com/in/rene-de-sain/</a> <a href="https://app.intigriti.com/researcher/profile/renniepak">https://app.intigriti.com/researcher/profile/renniepak</a></p><p>Hacker Hideout</p><p><a href="https://hackerhideout.xyz">https://hackerhideout.xyz</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:40) NFT Vulns and web3 hacking</p><p>(00:08:15) Hacker Tattoos</p><p>(00:12:30) Intigriti vs. other platforms, and LHE approaches.</p><p>(00:20:10) Loneliness, budgeting, and the pros and cons of full-time hunting</p><p>(00:28:36) Target approaches, XSS, and extension tools.</p><p>(00:37:40) Fostering hacker intuition and relationships</p><p>(00:47:15) Final thoughts on the Intigriti Event</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 42: In this episode of Critical Thinking - Bug Bounty Podcast, we're live from a hacking event in Portugal, and joined by the extremely talented René de Sain! He helps us cover a host of topics like NFT, XSS, LHE, and tips for success. We also talk about the correlation between creativity and hacking, shared workspaces, and last but certainly not least, hacker tattoos.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount.</p><p>Today’s Guest:</p><p><a href="https://twitter.com/renniepak">https://twitter.com/renniepak</a></p><p><a href="https://www.linkedin.com/in/rene-de-sain/">https://www.linkedin.com/in/rene-de-sain/</a> <a href="https://app.intigriti.com/researcher/profile/renniepak">https://app.intigriti.com/researcher/profile/renniepak</a></p><p>Hacker Hideout</p><p><a href="https://hackerhideout.xyz">https://hackerhideout.xyz</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:40) NFT Vulns and web3 hacking</p><p>(00:08:15) Hacker Tattoos</p><p>(00:12:30) Intigriti vs. other platforms, and LHE approaches.</p><p>(00:20:10) Loneliness, budgeting, and the pros and cons of full-time hunting</p><p>(00:28:36) Target approaches, XSS, and extension tools.</p><p>(00:37:40) Fostering hacker intuition and relationships</p><p>(00:47:15) Final thoughts on the Intigriti Event</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 42: In this episode of Critical Thinking - Bug Bounty Podcast, we're live from a hacking event in Portugal, and joined by the extremely talented René de Sain! He helps us cover a host of topics like NFT, XSS, LHE, and tips for success. We a...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>42</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">4c5b7c7a-9b34-423b-9ccc-70f231a8fb36</guid>
  <title><![CDATA[Episode 41: Mini Masterclass: Attack Vector Ideation]]></title>
  <description><![CDATA[<p>Episode 41: In this episode of Critical Thinking - Bug Bounty Podcast, Justin takes a break from his busy travel schedule to walk us through a few of his Attack Vector formulation strategies. We’re keeping this one short and sweet, so it can be better used as a reference when looking for new vectors.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for Caido using the referral code CTBBPODCAST for a 10% discount.</p><p>Nahamcon talk by Douglas Day</p><p><a href="https://youtu.be/G1RHa7l1Ys4?t=295">https://youtu.be/G1RHa7l1Ys4?t=295</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:53) Use the application like a human, not like a hacker</p><p>(00:05:02) Reading documentation looking for "Cannot" statements</p><p>(00:08:16) Look at the grayed out areas</p><p>(00:10:08) Look for information in the API response</p><p>(00:12:38) Differences in the UI between different accounts</p><p>(00:13:42) Pay the paywall.</p>]]></description>
  <embed_id>f042f7f8-da59-4b4d-b925-5ea4bd294ddc</embed_id>
  <pubDate>Thu, 19 Oct 2023 10:00:27 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="16466047" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/ce362b59-c82b-40d4-b94a-5f1d76806dee/episode.mp3" />
  <itunes:title><![CDATA[Episode 41: Mini Masterclass: Attack Vector Ideation]]></itunes:title>
  <itunes:duration>17:09</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 41: In this episode of Critical Thinking - Bug Bounty Podcast, Justin takes a break from his busy travel schedule to walk us through a few of his Attack Vector formulation strategies. We’re keeping this one short and sweet, so it can be better used as a reference when looking for new vectors.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for Caido using the referral code CTBBPODCAST for a 10% discount.</p><p>Nahamcon talk by Douglas Day</p><p><a href="https://youtu.be/G1RHa7l1Ys4?t=295">https://youtu.be/G1RHa7l1Ys4?t=295</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:53) Use the application like a human, not like a hacker</p><p>(00:05:02) Reading documentation looking for "Cannot" statements</p><p>(00:08:16) Look at the grayed out areas</p><p>(00:10:08) Look for information in the API response</p><p>(00:12:38) Differences in the UI between different accounts</p><p>(00:13:42) Pay the paywall.</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 41: In this episode of Critical Thinking - Bug Bounty Podcast, Justin takes a break from his busy travel schedule to walk us through a few of his Attack Vector formulation strategies. We’re keeping this one short and sweet, so it can be better used as a reference when looking for new vectors.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for Caido using the referral code CTBBPODCAST for a 10% discount.</p><p>Nahamcon talk by Douglas Day</p><p><a href="https://youtu.be/G1RHa7l1Ys4?t=295">https://youtu.be/G1RHa7l1Ys4?t=295</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:53) Use the application like a human, not like a hacker</p><p>(00:05:02) Reading documentation looking for "Cannot" statements</p><p>(00:08:16) Look at the grayed out areas</p><p>(00:10:08) Look for information in the API response</p><p>(00:12:38) Differences in the UI between different accounts</p><p>(00:13:42) Pay the paywall.</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 41: In this episode of Critical Thinking - Bug Bounty Podcast, Justin takes a break from his busy travel schedule to walk us through a few of his Attack Vector formulation strategies. We’re keeping this one short and sweet, so it can be bet...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>41</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">098c07f0-8324-4ce7-9267-1398f1146d93</guid>
  <title><![CDATA[Episode 40: Bug Bounty Mentoring]]></title>
  <description><![CDATA[<p>Episode 40: In this episode of Critical Thinking - Bug Bounty Podcast, it’s all about mentorships! Justin sits down with Kodai and So, two hackers he helped mentor, to discuss what worked and what didn’t. We talk about the importance of mentorship, what mentors might look for in a candidate, the challenges of transitioning from being mentored to self-education, and the necessity of continuous learning in this ever-evolving field that is bug bounty. This episode is a treasure trove of insights, and if you’re interested in either side of the mentorship coin, you won’t want to miss it.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount. </p><p>Today’s Guests:</p><p><a href="https://twitter.com/weeshter">https://twitter.com/weeshter</a></p><p><a href="https://twitter.com/Mokusou4">https://twitter.com/Mokusou4</a></p><p>Congrats to @nchickens as our giveaway winner!</p><p>The Bug Hunter's Methodology Live Course</p><p><a href="https://jasonhaddix.gumroad.com/l/lycucs">https://jasonhaddix.gumroad.com/l/lycucs</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:00) Guest backgrounds and introduction into hacking</p><p>(00:17:49) Where to start Learning and Teaching</p><p>(00:25:40) Technical Training vs Conceptual Teaching</p><p>(00:28:34) Mentorship Styles and Techniques.</p><p>(00:39:15) Moving from being mentored to self-learning</p><p>(00:46:20) Developing mental resilience and healthy habits</p><p>(00:50:32) Elements in mentorships that were hard or haven’t worked</p><p>(01:02:21) Being influenced by other hackers through mentorship or collaboration</p><p>(01:06:20) Hacking Bilingually and language barriers</p><p>(01:11:30) Hacking and learning goals for the future</p>]]></description>
  <embed_id>21178617-2f2e-4de1-b93d-884de8a1af1f</embed_id>
  <pubDate>Thu, 12 Oct 2023 10:00:50 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="88034051" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/b412760d-f671-46c6-8475-046e32677d9c/episode.mp3" />
  <itunes:title><![CDATA[Episode 40: Bug Bounty Mentoring]]></itunes:title>
  <itunes:duration>1:31:42</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 40: In this episode of Critical Thinking - Bug Bounty Podcast, it’s all about mentorships! Justin sits down with Kodai and So, two hackers he helped mentor, to discuss what worked and what didn’t. We talk about the importance of mentorship, what mentors might look for in a candidate, the challenges of transitioning from being mentored to self-education, and the necessity of continuous learning in this ever-evolving field that is bug bounty. This episode is a treasure trove of insights, and if you’re interested in either side of the mentorship coin, you won’t want to miss it.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount. </p><p>Today’s Guests:</p><p><a href="https://twitter.com/weeshter">https://twitter.com/weeshter</a></p><p><a href="https://twitter.com/Mokusou4">https://twitter.com/Mokusou4</a></p><p>Congrats to @nchickens as our giveaway winner!</p><p>The Bug Hunter's Methodology Live Course</p><p><a href="https://jasonhaddix.gumroad.com/l/lycucs">https://jasonhaddix.gumroad.com/l/lycucs</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:00) Guest backgrounds and introduction into hacking</p><p>(00:17:49) Where to start Learning and Teaching</p><p>(00:25:40) Technical Training vs Conceptual Teaching</p><p>(00:28:34) Mentorship Styles and Techniques.</p><p>(00:39:15) Moving from being mentored to self-learning</p><p>(00:46:20) Developing mental resilience and healthy habits</p><p>(00:50:32) Elements in mentorships that were hard or haven’t worked</p><p>(01:02:21) Being influenced by other hackers through mentorship or collaboration</p><p>(01:06:20) Hacking Bilingually and language barriers</p><p>(01:11:30) Hacking and learning goals for the future</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 40: In this episode of Critical Thinking - Bug Bounty Podcast, it’s all about mentorships! Justin sits down with Kodai and So, two hackers he helped mentor, to discuss what worked and what didn’t. We talk about the importance of mentorship, what mentors might look for in a candidate, the challenges of transitioning from being mentored to self-education, and the necessity of continuous learning in this ever-evolving field that is bug bounty. This episode is a treasure trove of insights, and if you’re interested in either side of the mentorship coin, you won’t want to miss it.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>------ Ways to Support CTBBPodcast ------</p><p>Sign up for <a href="https://caido.io/">Caido</a> using the referral code CTBBPODCAST for a 10% discount. </p><p>Today’s Guests:</p><p><a href="https://twitter.com/weeshter">https://twitter.com/weeshter</a></p><p><a href="https://twitter.com/Mokusou4">https://twitter.com/Mokusou4</a></p><p>Congrats to @nchickens as our giveaway winner!</p><p>The Bug Hunter's Methodology Live Course</p><p><a href="https://jasonhaddix.gumroad.com/l/lycucs">https://jasonhaddix.gumroad.com/l/lycucs</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:00) Guest backgrounds and introduction into hacking</p><p>(00:17:49) Where to start Learning and Teaching</p><p>(00:25:40) Technical Training vs Conceptual Teaching</p><p>(00:28:34) Mentorship Styles and Techniques.</p><p>(00:39:15) Moving from being mentored to self-learning</p><p>(00:46:20) Developing mental resilience and healthy habits</p><p>(00:50:32) Elements in mentorships that were hard or haven’t worked</p><p>(01:02:21) Being influenced by other hackers through mentorship or collaboration</p><p>(01:06:20) Hacking Bilingually and language barriers</p><p>(01:11:30) Hacking and learning goals for the future</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 40: In this episode of Critical Thinking - Bug Bounty Podcast, it’s all about mentorships! Justin sits down with Kodai and So, two hackers he helped mentor, to discuss what worked and what didn’t. We talk about the importance of mentorship,...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>40</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">103dca5b-eb88-4374-9a34-79b35ccc1b53</guid>
  <title><![CDATA[Episode 39: The Art of Architectures]]></title>
  <description><![CDATA[<p>Episode 39: In this episode of Critical Thinking - Bug Bounty Podcast, We're catching up on news, including new override updates from Chrome, GPT-4, SAML presentations, and even a shoutout from Live Overflow! Then we get busy laying the groundwork on a discussion of web architecture. better get started on this one, cause we're going to need a part two!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>CT shoutout from Live Overflow</p><p><a href="https://www.youtube.com/watch?v=3zShGLEqDn8">https://www.youtube.com/watch?v=3zShGLEqDn8</a></p><p>Chrome Override updates</p><p><a href="https://developer.chrome.com/blog/new-in-devtools-117/#overrides">https://developer.chrome.com/blog/new-in-devtools-117/#overrides</a></p><p>GPT-4/AI Prompt Injection</p><p><a href="https://x.com/rez0__/status/1706334160569213343?s=20">https://x.com/rez0__/status/1706334160569213343?s=20</a> &amp; <a href="https://x.com/evrnyalcin/status/1707298475216425400?s=20">https://x.com/evrnyalcin/status/1707298475216425400?s=20</a></p><p>Caido Releases Pro free for students</p><p><a href="https://twitter.com/CaidoIO/status/1707099640846250433">https://twitter.com/CaidoIO/status/1707099640846250433</a></p><p>Or, use code ctbbpodcast for 10% of the subscription price</p><p>Aleksei Tiurin on SAML hacking</p><p><a href="https://twitter.com/antyurin/status/1704906212913951187">https://twitter.com/antyurin/status/1704906212913951187</a></p><p>Account Takeover on Tesla</p><p><a href="https://medium.com/@evan.connelly/post-account-takeover-account-takeover-of-internal-tesla-accounts-bc720603e67d">https://medium.com/@evan.connelly/post-account-takeover-account-takeover-of-internal-tesla-accounts-bc720603e67d</a></p><p>Joseph</p><p><a href="https://portswigger.net/bappstore/82d6c60490b540369d6d5d01822bdf61">https://portswigger.net/bappstore/82d6c60490b540369d6d5d01822bdf61</a></p><p>Cookie Monster</p><p><a href="https://github.com/iangcarroll/cookiemonster">https://github.com/iangcarroll/cookiemonster</a></p><p>HTMX</p><p><a href="https://htmx.org/">https://htmx.org/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:40) Shoutout from Live Overflow</p><p>(00:06:40) Chrome Overrides update</p><p>(00:08:48) GPT-4V and AI Prompt Injection</p><p>(00:14:35) Caido Promos </p><p>(00:15:40) SAML Vulns</p><p>(00:17:55) Account takeover on Tesla, and auth token from one context in a different context</p><p>(00:24:30) Testing for vulnerabilities in JWT-based authentication</p><p>(00:28:07) Web Architectures</p><p>(00:32:49) Single page apps + a rest API</p><p>(00:45:20) XSS vulnerabilities in single page apps</p><p>(00:49:00) Direct endpoint architecture</p><p>(00:55:50) Content Enumeration</p><p>(01:02:23) gRPC &amp; Protobuf</p><p>(01:06:08) Microservices and Reverse Proxy</p><p>(01:12:10) Request Smuggling/Parameter Injections</p>]]></description>
  <embed_id>36ffe75b-c356-485b-b4a2-4e01f6ef26ef</embed_id>
  <pubDate>Thu, 05 Oct 2023 10:01:11 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="78002186" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/f23e1260-0c77-46e0-a272-1cd45f3e7de8/episode.mp3" />
  <itunes:title><![CDATA[Episode 39: The Art of Architectures]]></itunes:title>
  <itunes:duration>1:21:15</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 39: In this episode of Critical Thinking - Bug Bounty Podcast, We're catching up on news, including new override updates from Chrome, GPT-4, SAML presentations, and even a shoutout from Live Overflow! Then we get busy laying the groundwork on a discussion of web architecture. better get started on this one, cause we're going to need a part two!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>CT shoutout from Live Overflow</p><p><a href="https://www.youtube.com/watch?v=3zShGLEqDn8">https://www.youtube.com/watch?v=3zShGLEqDn8</a></p><p>Chrome Override updates</p><p><a href="https://developer.chrome.com/blog/new-in-devtools-117/#overrides">https://developer.chrome.com/blog/new-in-devtools-117/#overrides</a></p><p>GPT-4/AI Prompt Injection</p><p><a href="https://x.com/rez0__/status/1706334160569213343?s=20">https://x.com/rez0__/status/1706334160569213343?s=20</a> &amp; <a href="https://x.com/evrnyalcin/status/1707298475216425400?s=20">https://x.com/evrnyalcin/status/1707298475216425400?s=20</a></p><p>Caido Releases Pro free for students</p><p><a href="https://twitter.com/CaidoIO/status/1707099640846250433">https://twitter.com/CaidoIO/status/1707099640846250433</a></p><p>Or, use code ctbbpodcast for 10% of the subscription price</p><p>Aleksei Tiurin on SAML hacking</p><p><a href="https://twitter.com/antyurin/status/1704906212913951187">https://twitter.com/antyurin/status/1704906212913951187</a></p><p>Account Takeover on Tesla</p><p><a href="https://medium.com/@evan.connelly/post-account-takeover-account-takeover-of-internal-tesla-accounts-bc720603e67d">https://medium.com/@evan.connelly/post-account-takeover-account-takeover-of-internal-tesla-accounts-bc720603e67d</a></p><p>Joseph</p><p><a href="https://portswigger.net/bappstore/82d6c60490b540369d6d5d01822bdf61">https://portswigger.net/bappstore/82d6c60490b540369d6d5d01822bdf61</a></p><p>Cookie Monster</p><p><a href="https://github.com/iangcarroll/cookiemonster">https://github.com/iangcarroll/cookiemonster</a></p><p>HTMX</p><p><a href="https://htmx.org/">https://htmx.org/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:40) Shoutout from Live Overflow</p><p>(00:06:40) Chrome Overrides update</p><p>(00:08:48) GPT-4V and AI Prompt Injection</p><p>(00:14:35) Caido Promos </p><p>(00:15:40) SAML Vulns</p><p>(00:17:55) Account takeover on Tesla, and auth token from one context in a different context</p><p>(00:24:30) Testing for vulnerabilities in JWT-based authentication</p><p>(00:28:07) Web Architectures</p><p>(00:32:49) Single page apps + a rest API</p><p>(00:45:20) XSS vulnerabilities in single page apps</p><p>(00:49:00) Direct endpoint architecture</p><p>(00:55:50) Content Enumeration</p><p>(01:02:23) gRPC &amp; Protobuf</p><p>(01:06:08) Microservices and Reverse Proxy</p><p>(01:12:10) Request Smuggling/Parameter Injections</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 39: In this episode of Critical Thinking - Bug Bounty Podcast, We're catching up on news, including new override updates from Chrome, GPT-4, SAML presentations, and even a shoutout from Live Overflow! Then we get busy laying the groundwork on a discussion of web architecture. better get started on this one, cause we're going to need a part two!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>CT shoutout from Live Overflow</p><p><a href="https://www.youtube.com/watch?v=3zShGLEqDn8">https://www.youtube.com/watch?v=3zShGLEqDn8</a></p><p>Chrome Override updates</p><p><a href="https://developer.chrome.com/blog/new-in-devtools-117/#overrides">https://developer.chrome.com/blog/new-in-devtools-117/#overrides</a></p><p>GPT-4/AI Prompt Injection</p><p><a href="https://x.com/rez0__/status/1706334160569213343?s=20">https://x.com/rez0__/status/1706334160569213343?s=20</a> &amp; <a href="https://x.com/evrnyalcin/status/1707298475216425400?s=20">https://x.com/evrnyalcin/status/1707298475216425400?s=20</a></p><p>Caido Releases Pro free for students</p><p><a href="https://twitter.com/CaidoIO/status/1707099640846250433">https://twitter.com/CaidoIO/status/1707099640846250433</a></p><p>Or, use code ctbbpodcast for 10% of the subscription price</p><p>Aleksei Tiurin on SAML hacking</p><p><a href="https://twitter.com/antyurin/status/1704906212913951187">https://twitter.com/antyurin/status/1704906212913951187</a></p><p>Account Takeover on Tesla</p><p><a href="https://medium.com/@evan.connelly/post-account-takeover-account-takeover-of-internal-tesla-accounts-bc720603e67d">https://medium.com/@evan.connelly/post-account-takeover-account-takeover-of-internal-tesla-accounts-bc720603e67d</a></p><p>Joseph</p><p><a href="https://portswigger.net/bappstore/82d6c60490b540369d6d5d01822bdf61">https://portswigger.net/bappstore/82d6c60490b540369d6d5d01822bdf61</a></p><p>Cookie Monster</p><p><a href="https://github.com/iangcarroll/cookiemonster">https://github.com/iangcarroll/cookiemonster</a></p><p>HTMX</p><p><a href="https://htmx.org/">https://htmx.org/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:40) Shoutout from Live Overflow</p><p>(00:06:40) Chrome Overrides update</p><p>(00:08:48) GPT-4V and AI Prompt Injection</p><p>(00:14:35) Caido Promos </p><p>(00:15:40) SAML Vulns</p><p>(00:17:55) Account takeover on Tesla, and auth token from one context in a different context</p><p>(00:24:30) Testing for vulnerabilities in JWT-based authentication</p><p>(00:28:07) Web Architectures</p><p>(00:32:49) Single page apps + a rest API</p><p>(00:45:20) XSS vulnerabilities in single page apps</p><p>(00:49:00) Direct endpoint architecture</p><p>(00:55:50) Content Enumeration</p><p>(01:02:23) gRPC &amp; Protobuf</p><p>(01:06:08) Microservices and Reverse Proxy</p><p>(01:12:10) Request Smuggling/Parameter Injections</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 39: In this episode of Critical Thinking - Bug Bounty Podcast, We're catching up on news, including new override updates from Chrome, GPT-4, SAML presentations, and even a shoutout from Live Overflow! Then we get busy laying the groundwork ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>39</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">1a18ef48-0446-4dea-99b6-a9bb9dc6a5f9</guid>
  <title><![CDATA[Episode 38: Mobile Hacking Maestro: Sergey Toshin]]></title>
  <description><![CDATA[<p>Episode 38: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome mobile hacking maestro Sergey Toshin (aka @bagipro). We kick off with Sergey sharing his unexpected journey into mobile security, and how he rose to become the number one hacker in both Google Play Security and Samsung Bug Bounty programs. We then delve into the evolving perception of mobile bugs, a myriad of new and existing attack vectors, and discuss Sergey's creation of mobile security company Oversecured. You’re going to want to make time for this one!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today's Guest:</p><p><a href="https://twitter.com/_bagipro">https://twitter.com/_bagipro</a></p><p>Oversecured</p><p><a href="https://oversecured.com/">https://oversecured.com/</a></p><p>Oversecured Blog</p><p><a href="https://blog.oversecured.com/">https://blog.oversecured.com/</a></p><p>jadx</p><p><a href="https://github.com/skylot/jadx">https://github.com/skylot/jadx</a></p><p>'Golden Android Techniques'</p><p><a href="https://hackerone.com/reports/431002">https://hackerone.com/reports/431002</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:28) Sergey Toshin’s hacking journey and achievements</p><p>(00:08:20) Mobile hacking: Devices and attack vectors</p><p>(00:12:35) Using Jadx</p><p>(00:15:40) The creation of Oversecured</p><p>(00:23:10) The Oversecured Blog and Sharing Information</p><p>(00:28:08) New Spheres and Strategies of Mobile Hacking</p><p>(00:35:13) Tips for getting into Mobile Hacking</p>]]></description>
  <embed_id>f3b39dcd-142f-428d-9b3e-88ca989327ff</embed_id>
  <pubDate>Thu, 28 Sep 2023 10:00:31 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="41745899" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/5c49d6ab-bef3-42cc-b99a-07e16913fca7/episode.mp3" />
  <itunes:title><![CDATA[Episode 38: Mobile Hacking Maestro: Sergey Toshin]]></itunes:title>
  <itunes:duration>43:29</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 38: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome mobile hacking maestro Sergey Toshin (aka @bagipro). We kick off with Sergey sharing his unexpected journey into mobile security, and how he rose to become the number one hacker in both Google Play Security and Samsung Bug Bounty programs. We then delve into the evolving perception of mobile bugs, a myriad of new and existing attack vectors, and discuss Sergey's creation of mobile security company Oversecured. You’re going to want to make time for this one!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today's Guest:</p><p><a href="https://twitter.com/_bagipro">https://twitter.com/_bagipro</a></p><p>Oversecured</p><p><a href="https://oversecured.com/">https://oversecured.com/</a></p><p>Oversecured Blog</p><p><a href="https://blog.oversecured.com/">https://blog.oversecured.com/</a></p><p>jadx</p><p><a href="https://github.com/skylot/jadx">https://github.com/skylot/jadx</a></p><p>'Golden Android Techniques'</p><p><a href="https://hackerone.com/reports/431002">https://hackerone.com/reports/431002</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:28) Sergey Toshin’s hacking journey and achievements</p><p>(00:08:20) Mobile hacking: Devices and attack vectors</p><p>(00:12:35) Using Jadx</p><p>(00:15:40) The creation of Oversecured</p><p>(00:23:10) The Oversecured Blog and Sharing Information</p><p>(00:28:08) New Spheres and Strategies of Mobile Hacking</p><p>(00:35:13) Tips for getting into Mobile Hacking</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 38: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome mobile hacking maestro Sergey Toshin (aka @bagipro). We kick off with Sergey sharing his unexpected journey into mobile security, and how he rose to become the number one hacker in both Google Play Security and Samsung Bug Bounty programs. We then delve into the evolving perception of mobile bugs, a myriad of new and existing attack vectors, and discuss Sergey's creation of mobile security company Oversecured. You’re going to want to make time for this one!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today's Guest:</p><p><a href="https://twitter.com/_bagipro">https://twitter.com/_bagipro</a></p><p>Oversecured</p><p><a href="https://oversecured.com/">https://oversecured.com/</a></p><p>Oversecured Blog</p><p><a href="https://blog.oversecured.com/">https://blog.oversecured.com/</a></p><p>jadx</p><p><a href="https://github.com/skylot/jadx">https://github.com/skylot/jadx</a></p><p>'Golden Android Techniques'</p><p><a href="https://hackerone.com/reports/431002">https://hackerone.com/reports/431002</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:28) Sergey Toshin’s hacking journey and achievements</p><p>(00:08:20) Mobile hacking: Devices and attack vectors</p><p>(00:12:35) Using Jadx</p><p>(00:15:40) The creation of Oversecured</p><p>(00:23:10) The Oversecured Blog and Sharing Information</p><p>(00:28:08) New Spheres and Strategies of Mobile Hacking</p><p>(00:35:13) Tips for getting into Mobile Hacking</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 38: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome mobile hacking maestro Sergey Toshin (aka @bagipro). We kick off with Sergey sharing his unexpected journey into mobile security, and how he rose to be...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>38</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">1f013301-35e0-4ccf-bd4d-0a0033369a81</guid>
  <title><![CDATA[Episode 37: Tokyo Hacking & Interview with 0xLupin]]></title>
  <description><![CDATA[<p>Episode 37: In this episode of Critical Thinking - Bug Bounty Podcast we're joined by none other than Lupin himself! We recap the Tokyo LHE and the lessons we learned from it before diving into his legendary journey into security research and bug bounty. We also talk collaboration of all kinds: pair hacking, joining a team, and starting a business together. We even touch on some great tools that can collaborate with each other! This was a fun one, and we don't want you to miss it!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/0xLupin">https://twitter.com/0xLupin</a></p><p>Lupin and Holmes</p><p><a href="https://landh.tech/">https://landh.tech/</a></p><p>JSWZL</p><p><a href="https://jswzl.io/">https://jswzl.io/</a></p><p>Cursor</p><p><a href="https://cursor.so/">https://cursor.so/</a></p><p>Clairvoyance</p><p><a href="https://github.com/nikitastupin/clairvoyance">https://github.com/nikitastupin/clairvoyance</a></p><p>Tweet about Command Injections</p><p><a href="https://twitter.com/win3zz/status/1703702550372078074">https://twitter.com/win3zz/status/1703702550372078074</a></p><p>James Kettle article on security research</p><p><a href="https://portswigger.net/research/so-you-want-to-be-a-web-security-researcher">https://portswigger.net/research/so-you-want-to-be-a-web-security-researcher</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:00) Lessons learned from the latest LHE</p><p>(00:09:30) JSWZL and the Cursor Combo</p><p>(00:19:15) The Legend of Lupin</p><p>(00:34:35) Code and Collaborating</p><p>(00:38:48) Requests, Automation, and Testing</p><p>(00:50:28) Joel's Helper scripts</p><p>(00:52:50) Teamwork and Pair Hacking</p><p>(00:57:29) Tips for learning to Hack</p><p>(01:00:35) UUID and CTF</p><p>(01:08:35) Dynamics of Collaboration with French Team</p>]]></description>
  <embed_id>bcaebfce-fdd0-40fe-aef7-0f0c8c1c852b</embed_id>
  <pubDate>Thu, 21 Sep 2023 10:00:57 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="72434134" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/c1f3778c-27c6-4206-af75-e163e36e88e0/episode.mp3" />
  <itunes:title><![CDATA[Episode 37: Tokyo Hacking & Interview with 0xLupin]]></itunes:title>
  <itunes:duration>1:15:27</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 37: In this episode of Critical Thinking - Bug Bounty Podcast we're joined by none other than Lupin himself! We recap the Tokyo LHE and the lessons we learned from it before diving into his legendary journey into security research and bug bounty. We also talk collaboration of all kinds: pair hacking, joining a team, and starting a business together. We even touch on some great tools that can collaborate with each other! This was a fun one, and we don't want you to miss it!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/0xLupin">https://twitter.com/0xLupin</a></p><p>Lupin and Holmes</p><p><a href="https://landh.tech/">https://landh.tech/</a></p><p>JSWZL</p><p><a href="https://jswzl.io/">https://jswzl.io/</a></p><p>Cursor</p><p><a href="https://cursor.so/">https://cursor.so/</a></p><p>Clairvoyance</p><p><a href="https://github.com/nikitastupin/clairvoyance">https://github.com/nikitastupin/clairvoyance</a></p><p>Tweet about Command Injections</p><p><a href="https://twitter.com/win3zz/status/1703702550372078074">https://twitter.com/win3zz/status/1703702550372078074</a></p><p>James Kettle article on security research</p><p><a href="https://portswigger.net/research/so-you-want-to-be-a-web-security-researcher">https://portswigger.net/research/so-you-want-to-be-a-web-security-researcher</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:00) Lessons learned from the latest LHE</p><p>(00:09:30) JSWZL and the Cursor Combo</p><p>(00:19:15) The Legend of Lupin</p><p>(00:34:35) Code and Collaborating</p><p>(00:38:48) Requests, Automation, and Testing</p><p>(00:50:28) Joel's Helper scripts</p><p>(00:52:50) Teamwork and Pair Hacking</p><p>(00:57:29) Tips for learning to Hack</p><p>(01:00:35) UUID and CTF</p><p>(01:08:35) Dynamics of Collaboration with French Team</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 37: In this episode of Critical Thinking - Bug Bounty Podcast we're joined by none other than Lupin himself! We recap the Tokyo LHE and the lessons we learned from it before diving into his legendary journey into security research and bug bounty. We also talk collaboration of all kinds: pair hacking, joining a team, and starting a business together. We even touch on some great tools that can collaborate with each other! This was a fun one, and we don't want you to miss it!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/0xLupin">https://twitter.com/0xLupin</a></p><p>Lupin and Holmes</p><p><a href="https://landh.tech/">https://landh.tech/</a></p><p>JSWZL</p><p><a href="https://jswzl.io/">https://jswzl.io/</a></p><p>Cursor</p><p><a href="https://cursor.so/">https://cursor.so/</a></p><p>Clairvoyance</p><p><a href="https://github.com/nikitastupin/clairvoyance">https://github.com/nikitastupin/clairvoyance</a></p><p>Tweet about Command Injections</p><p><a href="https://twitter.com/win3zz/status/1703702550372078074">https://twitter.com/win3zz/status/1703702550372078074</a></p><p>James Kettle article on security research</p><p><a href="https://portswigger.net/research/so-you-want-to-be-a-web-security-researcher">https://portswigger.net/research/so-you-want-to-be-a-web-security-researcher</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:00) Lessons learned from the latest LHE</p><p>(00:09:30) JSWZL and the Cursor Combo</p><p>(00:19:15) The Legend of Lupin</p><p>(00:34:35) Code and Collaborating</p><p>(00:38:48) Requests, Automation, and Testing</p><p>(00:50:28) Joel's Helper scripts</p><p>(00:52:50) Teamwork and Pair Hacking</p><p>(00:57:29) Tips for learning to Hack</p><p>(01:00:35) UUID and CTF</p><p>(01:08:35) Dynamics of Collaboration with French Team</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 37: In this episode of Critical Thinking - Bug Bounty Podcast we're joined by none other than Lupin himself! We recap the Tokyo LHE and the lessons we learned from it before diving into his legendary journey into security research and bug b...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>37</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">4a34b746-7054-4366-96e0-140e9f1a3001</guid>
  <title><![CDATA[Episode 36: Bug Bounty Ethics & CT Exclusive Bug Reports]]></title>
  <description><![CDATA[<p>Episode 36: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel take a break from LHE prep to answer questions about the ethics of bug bounty and share their recent bug finds. We talk Iframes, mobile intercept proxies, open redirects, and that time Justin got shot at…</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Timeshifter:</p><p><a href="https://www.timeshifter.com/">https://www.timeshifter.com/</a></p><p>Tweet about Google Open Redirect</p><p><a href="https://twitter.com/Rhynorater/status/1697357773690818844">https://twitter.com/Rhynorater/status/1697357773690818844</a> </p><p>Tweet about XSS Exploitation </p><p><a href="https://twitter.com/Rhynorater/status/1698059391700701424">https://twitter.com/Rhynorater/status/1698059391700701424</a> </p><p>Request Minimizer</p><p><a href="https://portswigger.net/bappstore/cc16f37549ff416b990d4312490f5fd1">https://portswigger.net/bappstore/cc16f37549ff416b990d4312490f5fd1</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:45) Hacker One LHE Preview</p><p>(00:05:40) Is Bug Bounty Inherently Ethical</p><p>(00:19:25) Ethics of Going out of scope</p><p>(00:27:56) Justin’s story of getting shot at</p><p>(00:30:22) Setting up a mobile intercept proxy</p><p>(00:33:40) How to approach a new target</p><p>(00:40:30) Google Open Redirect</p><p>(00:43:35) Recent XSS Exploitation</p><p>(00:46:28) ATO Trick</p><p>(00:50:25) Joel’s Bug Report</p><p>(00:55:40) Justin’s Bug Report</p>]]></description>
  <embed_id>0b8adc8f-566e-41c3-8872-35c3f03f7c96</embed_id>
  <pubDate>Thu, 14 Sep 2023 10:00:46 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="61425916" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/e4e8d9ea-8893-4d3e-a130-d53843fc0b9d/episode.mp3" />
  <itunes:title><![CDATA[Episode 36: Bug Bounty Ethics & CT Exclusive Bug Reports]]></itunes:title>
  <itunes:duration>1:03:59</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 36: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel take a break from LHE prep to answer questions about the ethics of bug bounty and share their recent bug finds. We talk Iframes, mobile intercept proxies, open redirects, and that time Justin got shot at…</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Timeshifter:</p><p><a href="https://www.timeshifter.com/">https://www.timeshifter.com/</a></p><p>Tweet about Google Open Redirect</p><p><a href="https://twitter.com/Rhynorater/status/1697357773690818844">https://twitter.com/Rhynorater/status/1697357773690818844</a> </p><p>Tweet about XSS Exploitation </p><p><a href="https://twitter.com/Rhynorater/status/1698059391700701424">https://twitter.com/Rhynorater/status/1698059391700701424</a> </p><p>Request Minimizer</p><p><a href="https://portswigger.net/bappstore/cc16f37549ff416b990d4312490f5fd1">https://portswigger.net/bappstore/cc16f37549ff416b990d4312490f5fd1</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:45) Hacker One LHE Preview</p><p>(00:05:40) Is Bug Bounty Inherently Ethical</p><p>(00:19:25) Ethics of Going out of scope</p><p>(00:27:56) Justin’s story of getting shot at</p><p>(00:30:22) Setting up a mobile intercept proxy</p><p>(00:33:40) How to approach a new target</p><p>(00:40:30) Google Open Redirect</p><p>(00:43:35) Recent XSS Exploitation</p><p>(00:46:28) ATO Trick</p><p>(00:50:25) Joel’s Bug Report</p><p>(00:55:40) Justin’s Bug Report</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 36: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel take a break from LHE prep to answer questions about the ethics of bug bounty and share their recent bug finds. We talk Iframes, mobile intercept proxies, open redirects, and that time Justin got shot at…</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Timeshifter:</p><p><a href="https://www.timeshifter.com/">https://www.timeshifter.com/</a></p><p>Tweet about Google Open Redirect</p><p><a href="https://twitter.com/Rhynorater/status/1697357773690818844">https://twitter.com/Rhynorater/status/1697357773690818844</a> </p><p>Tweet about XSS Exploitation </p><p><a href="https://twitter.com/Rhynorater/status/1698059391700701424">https://twitter.com/Rhynorater/status/1698059391700701424</a> </p><p>Request Minimizer</p><p><a href="https://portswigger.net/bappstore/cc16f37549ff416b990d4312490f5fd1">https://portswigger.net/bappstore/cc16f37549ff416b990d4312490f5fd1</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:45) Hacker One LHE Preview</p><p>(00:05:40) Is Bug Bounty Inherently Ethical</p><p>(00:19:25) Ethics of Going out of scope</p><p>(00:27:56) Justin’s story of getting shot at</p><p>(00:30:22) Setting up a mobile intercept proxy</p><p>(00:33:40) How to approach a new target</p><p>(00:40:30) Google Open Redirect</p><p>(00:43:35) Recent XSS Exploitation</p><p>(00:46:28) ATO Trick</p><p>(00:50:25) Joel’s Bug Report</p><p>(00:55:40) Justin’s Bug Report</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 36: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel take a break from LHE prep to answer questions about the ethics of bug bounty and share their recent bug finds. We talk Iframes, mobile intercept proxies, open r...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>36</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">ee2e45f6-1524-43eb-9705-4039b6dbf799</guid>
  <title><![CDATA[Episode 35: King of Collaboration: Douglas Day]]></title>
  <description><![CDATA[<p>Episode 35: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome Douglas Day, a bug bounty hunter known for his unique methodologies and collaborative spirit. We talk about his approach to finding new endpoints in applications, his ingenious technique of exploiting Intercom widgets, and collaboration preferences and tips at LHEs. We also touch on the struggle of justifying hobbies that don't generate income and the importance of finding enjoyment in the process.We hope you enjoy this episode as much as we did!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/ArchAngelDDay">https://twitter.com/ArchAngelDDay</a></p><p><a href="https://hackerone.com/the_arch_angel">https://hackerone.com/the_arch_angel</a></p><p><a href="https://bugcrowd.com/arch_angel">https://bugcrowd.com/arch_angel</a></p><p>100 Short Bug Bounty Rules</p><p><a href="https://twitter.com/ArchAngelDDay/status/1661924038875435008">https://twitter.com/ArchAngelDDay/status/1661924038875435008</a></p><p>Blog about Intercom</p><p><a href="https://dday.us/2021/11/03/h1vendorATO.html">https://dday.us/2021/11/03/h1vendorATO.html</a></p><p>Blog about Mapping Hacking</p><p><a href="http://dday.us/2021/10/09/Mapyourhacking.html">http://dday.us/2021/10/09/Mapyourhacking.html</a></p><p>Timestamps: (00:00:00) Introduction</p><p>(00:03:01) Douglas Day’s infosec and LHE intro</p><p>(00:10:42) Evolution and philosophy of collaboration</p><p>(00:23:08) Balancing Collaboration and Money</p><p>(00:29:43) Recap of 100 Short Bug Bounty Rules</p><p>(00:37:15) Bug-hunting Methodology</p><p>(00:45:45) Using match and replace to find new endpoints in bug hunting</p><p>(00:49:07) Exploiting Intercom widgets</p><p>(00:52:35) Facing Failure and enjoying the journey</p><p>(00:57:00) Managing work-life balance</p><p>(01:05:55) Auth-Z testing and documentation</p><p>(01:12:25) Vulnerabilities in applications</p><p>(01:17:05) Mapping Hacking Sessions</p>]]></description>
  <embed_id>9c85dede-0892-4e7a-ac9c-33b5464bd560</embed_id>
  <pubDate>Thu, 07 Sep 2023 10:01:36 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="81986164" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/743fca3a-4610-4013-b6cb-23abf1d8ec5f/episode.mp3" />
  <itunes:title><![CDATA[Episode 35: King of Collaboration: Douglas Day]]></itunes:title>
  <itunes:duration>1:25:24</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 35: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome Douglas Day, a bug bounty hunter known for his unique methodologies and collaborative spirit. We talk about his approach to finding new endpoints in applications, his ingenious technique of exploiting Intercom widgets, and collaboration preferences and tips at LHEs. We also touch on the struggle of justifying hobbies that don't generate income and the importance of finding enjoyment in the process.We hope you enjoy this episode as much as we did!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/ArchAngelDDay">https://twitter.com/ArchAngelDDay</a></p><p><a href="https://hackerone.com/the_arch_angel">https://hackerone.com/the_arch_angel</a></p><p><a href="https://bugcrowd.com/arch_angel">https://bugcrowd.com/arch_angel</a></p><p>100 Short Bug Bounty Rules</p><p><a href="https://twitter.com/ArchAngelDDay/status/1661924038875435008">https://twitter.com/ArchAngelDDay/status/1661924038875435008</a></p><p>Blog about Intercom</p><p><a href="https://dday.us/2021/11/03/h1vendorATO.html">https://dday.us/2021/11/03/h1vendorATO.html</a></p><p>Blog about Mapping Hacking</p><p><a href="http://dday.us/2021/10/09/Mapyourhacking.html">http://dday.us/2021/10/09/Mapyourhacking.html</a></p><p>Timestamps: (00:00:00) Introduction</p><p>(00:03:01) Douglas Day’s infosec and LHE intro</p><p>(00:10:42) Evolution and philosophy of collaboration</p><p>(00:23:08) Balancing Collaboration and Money</p><p>(00:29:43) Recap of 100 Short Bug Bounty Rules</p><p>(00:37:15) Bug-hunting Methodology</p><p>(00:45:45) Using match and replace to find new endpoints in bug hunting</p><p>(00:49:07) Exploiting Intercom widgets</p><p>(00:52:35) Facing Failure and enjoying the journey</p><p>(00:57:00) Managing work-life balance</p><p>(01:05:55) Auth-Z testing and documentation</p><p>(01:12:25) Vulnerabilities in applications</p><p>(01:17:05) Mapping Hacking Sessions</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 35: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome Douglas Day, a bug bounty hunter known for his unique methodologies and collaborative spirit. We talk about his approach to finding new endpoints in applications, his ingenious technique of exploiting Intercom widgets, and collaboration preferences and tips at LHEs. We also touch on the struggle of justifying hobbies that don't generate income and the importance of finding enjoyment in the process.We hope you enjoy this episode as much as we did!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/ArchAngelDDay">https://twitter.com/ArchAngelDDay</a></p><p><a href="https://hackerone.com/the_arch_angel">https://hackerone.com/the_arch_angel</a></p><p><a href="https://bugcrowd.com/arch_angel">https://bugcrowd.com/arch_angel</a></p><p>100 Short Bug Bounty Rules</p><p><a href="https://twitter.com/ArchAngelDDay/status/1661924038875435008">https://twitter.com/ArchAngelDDay/status/1661924038875435008</a></p><p>Blog about Intercom</p><p><a href="https://dday.us/2021/11/03/h1vendorATO.html">https://dday.us/2021/11/03/h1vendorATO.html</a></p><p>Blog about Mapping Hacking</p><p><a href="http://dday.us/2021/10/09/Mapyourhacking.html">http://dday.us/2021/10/09/Mapyourhacking.html</a></p><p>Timestamps: (00:00:00) Introduction</p><p>(00:03:01) Douglas Day’s infosec and LHE intro</p><p>(00:10:42) Evolution and philosophy of collaboration</p><p>(00:23:08) Balancing Collaboration and Money</p><p>(00:29:43) Recap of 100 Short Bug Bounty Rules</p><p>(00:37:15) Bug-hunting Methodology</p><p>(00:45:45) Using match and replace to find new endpoints in bug hunting</p><p>(00:49:07) Exploiting Intercom widgets</p><p>(00:52:35) Facing Failure and enjoying the journey</p><p>(00:57:00) Managing work-life balance</p><p>(01:05:55) Auth-Z testing and documentation</p><p>(01:12:25) Vulnerabilities in applications</p><p>(01:17:05) Mapping Hacking Sessions</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 35: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to welcome Douglas Day, a bug bounty hunter known for his unique methodologies and collaborative spirit. We talk about his approach to finding new endpoints in ap...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>35</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">8e69daa8-07ee-4429-ad7b-1a87ba925f5d</guid>
  <title><![CDATA[Episode 34: Program vs Hacker Debate]]></title>
  <description><![CDATA[<p>Episode 34: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel have both beaten COVID and now square off against each other in a mega-debate representing hackers and program managers respectively. Among the topics included are Disclosures, Dupes, Zero-Day Policy, payouts, budgets, Triage and Retesting. So, if you want blood-pumping, insult-hurling opinion-invalidating debate…then maybe look somewhere else. But if a thought-provoking discussion about bug bounty is more your style, then take a seat and get ready!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Prompt Injection Primer for Engineers</p><p><a href="https://twitter.com/rez0__/status/1695078576104833291">https://twitter.com/rez0__/status/1695078576104833291</a> </p><p>Portswigger on XSS</p><p><a href="https://twitter.com/PortSwiggerRes/status/1691812241375424983">https://twitter.com/PortSwiggerRes/status/1691812241375424983</a></p><p>Gunner Andrews talk</p><p><a href="https://www.youtube.com/watch?v=aaDe1ADh5KM">https://www.youtube.com/watch?v=aaDe1ADh5KM</a> </p><p>Jhaddix live training Givaway</p><p><a href="https://tbhmlive.com/">https://tbhmlive.com/</a></p><p><a href="http://ctbb.show/giveaway">ctbb.show/giveaway</a></p><p>New Website</p><p><a href="http://ctbb.show">ctbb.show</a></p><p>Fight music composed by Dayn Leonardson</p><p><a href="https://www.daynleo.com/">https://www.daynleo.com/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:00) Joel’s DEFCON Recap</p><p>(00:04:45) Prompt Injection Primer for Engineers by Rez0</p><p>(00:07:00) Portswigger Research and XSS</p><p>(00:08:36) Gunnar Andrews' talk on serverless architecture</p><p>(00:10:10) ‘Bug Hunter Methodology’ Course Giveaway</p><p>The Debate</p><p>(00:13:34) Zero-Day Policy and Payment for Vulnerabilities</p><p>(00:25:40) Disclosure</p><p>(00:33:52) Dupes (00:51:23) CVSS</p><p>(01:02:25) Budgets and Payouts</p><p>(01:15:00) Triage and Retesting</p><p>(01:34:55) Withholding Reports</p><p>(01:41:50) Root Cause Analysis</p><p>(01:52:25) Interacting with hacker reports from a security standpoint.</p><p>(01:58:50) Internal Activity on a Report</p><p>(02:01:15) Cost of running Bug Bounty Programs and LHE’s</p>]]></description>
  <embed_id>25d23722-340e-430b-a3ad-2c3bed62b48e</embed_id>
  <pubDate>Thu, 31 Aug 2023 10:00:28 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="125602295" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/a33a5fe0-0563-43ed-833a-59a5b0310762/episode.mp3" />
  <itunes:title><![CDATA[Episode 34: Program vs Hacker Debate]]></itunes:title>
  <itunes:duration>2:10:50</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 34: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel have both beaten COVID and now square off against each other in a mega-debate representing hackers and program managers respectively. Among the topics included are Disclosures, Dupes, Zero-Day Policy, payouts, budgets, Triage and Retesting. So, if you want blood-pumping, insult-hurling opinion-invalidating debate…then maybe look somewhere else. But if a thought-provoking discussion about bug bounty is more your style, then take a seat and get ready!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Prompt Injection Primer for Engineers</p><p><a href="https://twitter.com/rez0__/status/1695078576104833291">https://twitter.com/rez0__/status/1695078576104833291</a> </p><p>Portswigger on XSS</p><p><a href="https://twitter.com/PortSwiggerRes/status/1691812241375424983">https://twitter.com/PortSwiggerRes/status/1691812241375424983</a></p><p>Gunner Andrews talk</p><p><a href="https://www.youtube.com/watch?v=aaDe1ADh5KM">https://www.youtube.com/watch?v=aaDe1ADh5KM</a> </p><p>Jhaddix live training Givaway</p><p><a href="https://tbhmlive.com/">https://tbhmlive.com/</a></p><p><a href="http://ctbb.show/giveaway">ctbb.show/giveaway</a></p><p>New Website</p><p><a href="http://ctbb.show">ctbb.show</a></p><p>Fight music composed by Dayn Leonardson</p><p><a href="https://www.daynleo.com/">https://www.daynleo.com/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:00) Joel’s DEFCON Recap</p><p>(00:04:45) Prompt Injection Primer for Engineers by Rez0</p><p>(00:07:00) Portswigger Research and XSS</p><p>(00:08:36) Gunnar Andrews' talk on serverless architecture</p><p>(00:10:10) ‘Bug Hunter Methodology’ Course Giveaway</p><p>The Debate</p><p>(00:13:34) Zero-Day Policy and Payment for Vulnerabilities</p><p>(00:25:40) Disclosure</p><p>(00:33:52) Dupes (00:51:23) CVSS</p><p>(01:02:25) Budgets and Payouts</p><p>(01:15:00) Triage and Retesting</p><p>(01:34:55) Withholding Reports</p><p>(01:41:50) Root Cause Analysis</p><p>(01:52:25) Interacting with hacker reports from a security standpoint.</p><p>(01:58:50) Internal Activity on a Report</p><p>(02:01:15) Cost of running Bug Bounty Programs and LHE’s</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 34: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel have both beaten COVID and now square off against each other in a mega-debate representing hackers and program managers respectively. Among the topics included are Disclosures, Dupes, Zero-Day Policy, payouts, budgets, Triage and Retesting. So, if you want blood-pumping, insult-hurling opinion-invalidating debate…then maybe look somewhere else. But if a thought-provoking discussion about bug bounty is more your style, then take a seat and get ready!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Prompt Injection Primer for Engineers</p><p><a href="https://twitter.com/rez0__/status/1695078576104833291">https://twitter.com/rez0__/status/1695078576104833291</a> </p><p>Portswigger on XSS</p><p><a href="https://twitter.com/PortSwiggerRes/status/1691812241375424983">https://twitter.com/PortSwiggerRes/status/1691812241375424983</a></p><p>Gunner Andrews talk</p><p><a href="https://www.youtube.com/watch?v=aaDe1ADh5KM">https://www.youtube.com/watch?v=aaDe1ADh5KM</a> </p><p>Jhaddix live training Givaway</p><p><a href="https://tbhmlive.com/">https://tbhmlive.com/</a></p><p><a href="http://ctbb.show/giveaway">ctbb.show/giveaway</a></p><p>New Website</p><p><a href="http://ctbb.show">ctbb.show</a></p><p>Fight music composed by Dayn Leonardson</p><p><a href="https://www.daynleo.com/">https://www.daynleo.com/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:00) Joel’s DEFCON Recap</p><p>(00:04:45) Prompt Injection Primer for Engineers by Rez0</p><p>(00:07:00) Portswigger Research and XSS</p><p>(00:08:36) Gunnar Andrews' talk on serverless architecture</p><p>(00:10:10) ‘Bug Hunter Methodology’ Course Giveaway</p><p>The Debate</p><p>(00:13:34) Zero-Day Policy and Payment for Vulnerabilities</p><p>(00:25:40) Disclosure</p><p>(00:33:52) Dupes (00:51:23) CVSS</p><p>(01:02:25) Budgets and Payouts</p><p>(01:15:00) Triage and Retesting</p><p>(01:34:55) Withholding Reports</p><p>(01:41:50) Root Cause Analysis</p><p>(01:52:25) Interacting with hacker reports from a security standpoint.</p><p>(01:58:50) Internal Activity on a Report</p><p>(02:01:15) Cost of running Bug Bounty Programs and LHE’s</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 34: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel have both beaten COVID and now square off against each other in a mega-debate representing hackers and program managers respectively. Among the topics included a...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>34</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">fad3a3ea-2d04-461c-acd2-00fa6c142771</guid>
  <title><![CDATA[Episode 33: The Master of Hacker Show&Tell: Inti De Ceukelaire]]></title>
  <description><![CDATA[<p>Episode 33: In this episode of Critical Thinking - Bug Bounty Podcast, we welcome Inti De Ceukelaire, a seasoned bug hunter known for his creative storytelling and impactful show-and-tell bugs…and let us tell you, his stories do not disappoint! From his bug bounty journey to some pretty wild hacks, Inti captivates us as only Inti can. We discuss the potential life-saving impact of bug bounty reports, especially in areas such as transportation and medical devices. We also cover hacker mentality, the benefits of objective-based challenges, and the need for collaboration and alignment within the bug bounty community. It’s a mesmerizing episode, so sit back and be swept away by Inti’s tales.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/securinti">https://twitter.com/securinti</a></p><p>Inti's Shopify Show-and-Tell</p><p><a href="https://hackerone.com/reports/1086108">https://hackerone.com/reports/1086108</a></p><p>Hakluke's article on Bug Bounty Standards</p><p><a href="https://github.com/hakluke/bug-bounty-standards">https://github.com/hakluke/bug-bounty-standards</a></p><p>Researching MissingNo Glitch in Pokemon</p><p><a href="https://youtu.be/p8OBktd42GI">https://youtu.be/p8OBktd42GI</a></p><p>Intigriti</p><p><a href="https://www.intigriti.com/">https://www.intigriti.com/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:01) Show-and-Tells and Storytelling in Live Hacking Events</p><p>(00:08:30) Impact Assessment and the potential real-life significance of reporting vulnerabilities.</p><p>(00:13:50) Ethical dilemmas, gaming the systems, and safe harbor.</p><p>(00:23:30) Inti’s Hacking Journey</p><p>(00:27:26) Hacker mentality, brainstorming, and goal-setting.</p><p>(00:46:28) The benefit of mental resets, fresh perspectives, and ‘surprise collaboration’</p><p>(00:52:55) Inti’s Story 1: CSS Injection bugs</p><p>(01:06:20) Inti’s Story 2: The Ticket Trick</p><p>(01:14:00) Inti’s Story 3: The Gotcha PasswordBug</p><p>(01:18:30) Upcoming Intigriti Live Hacking Event</p>]]></description>
  <embed_id>27f30fe2-38dd-49a7-8ab7-bd0bde2d3a1a</embed_id>
  <pubDate>Thu, 24 Aug 2023 10:01:13 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="78738209" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/a78a5abe-05ca-4ce8-9bf9-5d3357dfa470/episode.mp3" />
  <itunes:title><![CDATA[Episode 33: The Master of Hacker Show&Tell: Inti De Ceukelaire]]></itunes:title>
  <itunes:duration>1:22:01</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 33: In this episode of Critical Thinking - Bug Bounty Podcast, we welcome Inti De Ceukelaire, a seasoned bug hunter known for his creative storytelling and impactful show-and-tell bugs…and let us tell you, his stories do not disappoint! From his bug bounty journey to some pretty wild hacks, Inti captivates us as only Inti can. We discuss the potential life-saving impact of bug bounty reports, especially in areas such as transportation and medical devices. We also cover hacker mentality, the benefits of objective-based challenges, and the need for collaboration and alignment within the bug bounty community. It’s a mesmerizing episode, so sit back and be swept away by Inti’s tales.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/securinti">https://twitter.com/securinti</a></p><p>Inti's Shopify Show-and-Tell</p><p><a href="https://hackerone.com/reports/1086108">https://hackerone.com/reports/1086108</a></p><p>Hakluke's article on Bug Bounty Standards</p><p><a href="https://github.com/hakluke/bug-bounty-standards">https://github.com/hakluke/bug-bounty-standards</a></p><p>Researching MissingNo Glitch in Pokemon</p><p><a href="https://youtu.be/p8OBktd42GI">https://youtu.be/p8OBktd42GI</a></p><p>Intigriti</p><p><a href="https://www.intigriti.com/">https://www.intigriti.com/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:01) Show-and-Tells and Storytelling in Live Hacking Events</p><p>(00:08:30) Impact Assessment and the potential real-life significance of reporting vulnerabilities.</p><p>(00:13:50) Ethical dilemmas, gaming the systems, and safe harbor.</p><p>(00:23:30) Inti’s Hacking Journey</p><p>(00:27:26) Hacker mentality, brainstorming, and goal-setting.</p><p>(00:46:28) The benefit of mental resets, fresh perspectives, and ‘surprise collaboration’</p><p>(00:52:55) Inti’s Story 1: CSS Injection bugs</p><p>(01:06:20) Inti’s Story 2: The Ticket Trick</p><p>(01:14:00) Inti’s Story 3: The Gotcha PasswordBug</p><p>(01:18:30) Upcoming Intigriti Live Hacking Event</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 33: In this episode of Critical Thinking - Bug Bounty Podcast, we welcome Inti De Ceukelaire, a seasoned bug hunter known for his creative storytelling and impactful show-and-tell bugs…and let us tell you, his stories do not disappoint! From his bug bounty journey to some pretty wild hacks, Inti captivates us as only Inti can. We discuss the potential life-saving impact of bug bounty reports, especially in areas such as transportation and medical devices. We also cover hacker mentality, the benefits of objective-based challenges, and the need for collaboration and alignment within the bug bounty community. It’s a mesmerizing episode, so sit back and be swept away by Inti’s tales.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/securinti">https://twitter.com/securinti</a></p><p>Inti's Shopify Show-and-Tell</p><p><a href="https://hackerone.com/reports/1086108">https://hackerone.com/reports/1086108</a></p><p>Hakluke's article on Bug Bounty Standards</p><p><a href="https://github.com/hakluke/bug-bounty-standards">https://github.com/hakluke/bug-bounty-standards</a></p><p>Researching MissingNo Glitch in Pokemon</p><p><a href="https://youtu.be/p8OBktd42GI">https://youtu.be/p8OBktd42GI</a></p><p>Intigriti</p><p><a href="https://www.intigriti.com/">https://www.intigriti.com/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:03:01) Show-and-Tells and Storytelling in Live Hacking Events</p><p>(00:08:30) Impact Assessment and the potential real-life significance of reporting vulnerabilities.</p><p>(00:13:50) Ethical dilemmas, gaming the systems, and safe harbor.</p><p>(00:23:30) Inti’s Hacking Journey</p><p>(00:27:26) Hacker mentality, brainstorming, and goal-setting.</p><p>(00:46:28) The benefit of mental resets, fresh perspectives, and ‘surprise collaboration’</p><p>(00:52:55) Inti’s Story 1: CSS Injection bugs</p><p>(01:06:20) Inti’s Story 2: The Ticket Trick</p><p>(01:14:00) Inti’s Story 3: The Gotcha PasswordBug</p><p>(01:18:30) Upcoming Intigriti Live Hacking Event</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 33: In this episode of Critical Thinking - Bug Bounty Podcast, we welcome Inti De Ceukelaire, a seasoned bug hunter known for his creative storytelling and impactful show-and-tell bugs…and let us tell you, his stories do not disappoint! Fro...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>33</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">7dc277cd-9256-4496-b639-54bae53fd4f1</guid>
  <title><![CDATA[Episode 32: The Great Write-up Low-down  ]]></title>
  <description><![CDATA[<p>Episode 32: In this episode of Critical Thinking - Bug Bounty Podcast, Joel caught a nasty bug (no, not that kind) so Justin is flying solo, and catches us up to speed on what's been happening in hacking news.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Smashing the State article</p><p><a href="https://portswigger.net/research/smashing-the-state-machine?ps_source=portswiggerres&amp;ps_medium=social&amp;ps_campaign=race-conditions">https://portswigger.net/research/smashing-the-state-machine?ps_source=portswiggerres&amp;ps_medium=social&amp;ps_campaign=race-conditions</a></p><p>Nagles Algorithm</p><p><a href="https://en.wikipedia.org/wiki/Nagle%27s_algorithm">https://en.wikipedia.org/wiki/Nagle%27s_algorithm</a> </p><p>HTTP/2 RFC </p><p><a href="https://httpwg.org/specs/rfc7540.html">https://httpwg.org/specs/rfc7540.html</a> </p><p>Tweet by Alex Chapman</p><p><a href="https://twitter.com/ajxchapman/status/1691103677920968704?s=20">https://twitter.com/ajxchapman/status/1691103677920968704?s=20</a></p><p>Cookieless Duodrop IIS Auth Bypass</p><p><a href="https://soroush.me/blog/2023/08/cookieless-duodrop-iis-auth-bypass-app-pool-privesc-in-asp-net-framework-cve-2023-36899/">https://soroush.me/blog/2023/08/cookieless-duodrop-iis-auth-bypass-app-pool-privesc-in-asp-net-framework-cve-2023-36899/</a> </p><p>Xss and .Net</p><p><a href="https://blog.isec.pl/all-is-xss-that-comes-to-the-net/">https://blog.isec.pl/all-is-xss-that-comes-to-the-net/</a></p><p>Shopify Account Takeover</p><p><a href="https://ophionsecurity.com/blog/shopify-acount-takeover">https://ophionsecurity.com/blog/shopify-acount-takeover</a></p><p>Short Name Guesser</p><p><a href="https://github.com/projectmonke/shortnameguesser">https://github.com/projectmonke/shortnameguesser</a></p><p>Hacking <a href="http://Points.com">Points.com</a></p><p><a href="https://samcurry.net/Points-com/">https://samcurry.net/Points-com/</a></p><p>Hacking Starbucks </p><p><a href="https://samcurry.net/hacking-starbucks/">https://samcurry.net/hacking-starbucks/</a></p><p>Bug Bounty Tag Request</p><p><a href="https://twitter.com/ajxchapman/status/1688892093597470720">https://twitter.com/ajxchapman/status/1688892093597470720</a></p><p>Sandwich Attack</p><p><a href="https://www.landh.tech/blog/20230811-sandwich-attack">https://www.landh.tech/blog/20230811-sandwich-attack</a> </p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:25) Smashing the State</p><p>(00:11:30) HTTP/2 RFC</p><p>(00:17:30) Cookieless Duodrop IIS Auth Bypass</p><p>(00:24:45) Takeovers and Tools</p><p>(00:32:30) Sam Curry writeup</p><p>(00:53:10) Community requests</p><p>(00:55:10) Sandwich Attacks</p>]]></description>
  <embed_id>3dabaa5b-b7ca-466f-9a33-4dcbe3c969e0</embed_id>
  <pubDate>Thu, 17 Aug 2023 10:00:15 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="58641890" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/251afd56-b906-468d-aafb-9e0fc3d384e1/episode.mp3" />
  <itunes:title><![CDATA[Episode 32: The Great Write-up Low-down  ]]></itunes:title>
  <itunes:duration>1:01:05</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 32: In this episode of Critical Thinking - Bug Bounty Podcast, Joel caught a nasty bug (no, not that kind) so Justin is flying solo, and catches us up to speed on what's been happening in hacking news.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Smashing the State article</p><p><a href="https://portswigger.net/research/smashing-the-state-machine?ps_source=portswiggerres&amp;ps_medium=social&amp;ps_campaign=race-conditions">https://portswigger.net/research/smashing-the-state-machine?ps_source=portswiggerres&amp;ps_medium=social&amp;ps_campaign=race-conditions</a></p><p>Nagles Algorithm</p><p><a href="https://en.wikipedia.org/wiki/Nagle%27s_algorithm">https://en.wikipedia.org/wiki/Nagle%27s_algorithm</a> </p><p>HTTP/2 RFC </p><p><a href="https://httpwg.org/specs/rfc7540.html">https://httpwg.org/specs/rfc7540.html</a> </p><p>Tweet by Alex Chapman</p><p><a href="https://twitter.com/ajxchapman/status/1691103677920968704?s=20">https://twitter.com/ajxchapman/status/1691103677920968704?s=20</a></p><p>Cookieless Duodrop IIS Auth Bypass</p><p><a href="https://soroush.me/blog/2023/08/cookieless-duodrop-iis-auth-bypass-app-pool-privesc-in-asp-net-framework-cve-2023-36899/">https://soroush.me/blog/2023/08/cookieless-duodrop-iis-auth-bypass-app-pool-privesc-in-asp-net-framework-cve-2023-36899/</a> </p><p>Xss and .Net</p><p><a href="https://blog.isec.pl/all-is-xss-that-comes-to-the-net/">https://blog.isec.pl/all-is-xss-that-comes-to-the-net/</a></p><p>Shopify Account Takeover</p><p><a href="https://ophionsecurity.com/blog/shopify-acount-takeover">https://ophionsecurity.com/blog/shopify-acount-takeover</a></p><p>Short Name Guesser</p><p><a href="https://github.com/projectmonke/shortnameguesser">https://github.com/projectmonke/shortnameguesser</a></p><p>Hacking <a href="http://Points.com">Points.com</a></p><p><a href="https://samcurry.net/Points-com/">https://samcurry.net/Points-com/</a></p><p>Hacking Starbucks </p><p><a href="https://samcurry.net/hacking-starbucks/">https://samcurry.net/hacking-starbucks/</a></p><p>Bug Bounty Tag Request</p><p><a href="https://twitter.com/ajxchapman/status/1688892093597470720">https://twitter.com/ajxchapman/status/1688892093597470720</a></p><p>Sandwich Attack</p><p><a href="https://www.landh.tech/blog/20230811-sandwich-attack">https://www.landh.tech/blog/20230811-sandwich-attack</a> </p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:25) Smashing the State</p><p>(00:11:30) HTTP/2 RFC</p><p>(00:17:30) Cookieless Duodrop IIS Auth Bypass</p><p>(00:24:45) Takeovers and Tools</p><p>(00:32:30) Sam Curry writeup</p><p>(00:53:10) Community requests</p><p>(00:55:10) Sandwich Attacks</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 32: In this episode of Critical Thinking - Bug Bounty Podcast, Joel caught a nasty bug (no, not that kind) so Justin is flying solo, and catches us up to speed on what's been happening in hacking news.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Smashing the State article</p><p><a href="https://portswigger.net/research/smashing-the-state-machine?ps_source=portswiggerres&amp;ps_medium=social&amp;ps_campaign=race-conditions">https://portswigger.net/research/smashing-the-state-machine?ps_source=portswiggerres&amp;ps_medium=social&amp;ps_campaign=race-conditions</a></p><p>Nagles Algorithm</p><p><a href="https://en.wikipedia.org/wiki/Nagle%27s_algorithm">https://en.wikipedia.org/wiki/Nagle%27s_algorithm</a> </p><p>HTTP/2 RFC </p><p><a href="https://httpwg.org/specs/rfc7540.html">https://httpwg.org/specs/rfc7540.html</a> </p><p>Tweet by Alex Chapman</p><p><a href="https://twitter.com/ajxchapman/status/1691103677920968704?s=20">https://twitter.com/ajxchapman/status/1691103677920968704?s=20</a></p><p>Cookieless Duodrop IIS Auth Bypass</p><p><a href="https://soroush.me/blog/2023/08/cookieless-duodrop-iis-auth-bypass-app-pool-privesc-in-asp-net-framework-cve-2023-36899/">https://soroush.me/blog/2023/08/cookieless-duodrop-iis-auth-bypass-app-pool-privesc-in-asp-net-framework-cve-2023-36899/</a> </p><p>Xss and .Net</p><p><a href="https://blog.isec.pl/all-is-xss-that-comes-to-the-net/">https://blog.isec.pl/all-is-xss-that-comes-to-the-net/</a></p><p>Shopify Account Takeover</p><p><a href="https://ophionsecurity.com/blog/shopify-acount-takeover">https://ophionsecurity.com/blog/shopify-acount-takeover</a></p><p>Short Name Guesser</p><p><a href="https://github.com/projectmonke/shortnameguesser">https://github.com/projectmonke/shortnameguesser</a></p><p>Hacking <a href="http://Points.com">Points.com</a></p><p><a href="https://samcurry.net/Points-com/">https://samcurry.net/Points-com/</a></p><p>Hacking Starbucks </p><p><a href="https://samcurry.net/hacking-starbucks/">https://samcurry.net/hacking-starbucks/</a></p><p>Bug Bounty Tag Request</p><p><a href="https://twitter.com/ajxchapman/status/1688892093597470720">https://twitter.com/ajxchapman/status/1688892093597470720</a></p><p>Sandwich Attack</p><p><a href="https://www.landh.tech/blog/20230811-sandwich-attack">https://www.landh.tech/blog/20230811-sandwich-attack</a> </p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:25) Smashing the State</p><p>(00:11:30) HTTP/2 RFC</p><p>(00:17:30) Cookieless Duodrop IIS Auth Bypass</p><p>(00:24:45) Takeovers and Tools</p><p>(00:32:30) Sam Curry writeup</p><p>(00:53:10) Community requests</p><p>(00:55:10) Sandwich Attacks</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 32: In this episode of Critical Thinking - Bug Bounty Podcast, Joel caught a nasty bug (no, not that kind) so Justin is flying solo, and catches us up to speed on what's been happening in hacking news.Follow us on twitter at: @ctbbpodcastWe...]]></itunes:subtitle>
 <itunes:keywords><![CDATA[]]></itunes:keywords>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>32</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">17daf672-997d-4f21-8664-b3081b95bcdb</guid>
  <title><![CDATA[Episode 31: Alex Chapman - The Man of Many Crits]]></title>
  <description><![CDATA[<p>Episode 31: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to be joined by Alex Chapman, a seasoned InfoSec hacker and bug bounty hunter. We kick off with Alex sharing his hacking journey, from a guest lecturer that inspired him, to working on internal Red Teams, to his transition to working with HackerOne, and finally as a bug bounty hunter focusing on searching out those few, high impact bugs. We also discuss the power of collaboration, the challenges of balancing hacking with other responsibilities, and the necessity of flexibility and taking breaks in bug bounty work. Don't miss this episode where we explore the depths of bug bounty with Alex Chapman!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/ajxchapman">https://twitter.com/ajxchapman</a></p><p>@<a href="mailto:ajxchapman@infosec.exchange">ajxchapman@infosec.exchange</a></p><p><a href="https://ajxchapman.github.io/">https://ajxchapman.github.io/</a></p><p><a href="https://hackerone.com/ajxchapman?type=user">https://hackerone.com/ajxchapman?type=user</a></p><p>Perforce RCE</p><p><a href="https://hackerone.com/reports/1830220">https://hackerone.com/reports/1830220</a> </p><p><a href="https://ajxchapman.github.io/bugreports/2019/04/04/perforce-local-file-disclosure.html">https://ajxchapman.github.io/bugreports/2019/04/04/perforce-local-file-disclosure.html</a> </p><p>(00:00:00) Introduction</p><p>(00:01:50) Alex Chapman's InfoSec journey and evolution</p><p>(00:05:55) Real-world experience vs. chasing degrees, and the pivot into Bug Bounty</p><p>(00:13:12) The benefit of programming knowledge</p><p>(00:16:50) Experience in Internal Red Team and hacker mentalities.</p><p>(00:23:35) Transitioning to HackerOne and full time Bug Bounty</p><p>(00:33:37) Bug Bounty tips, time management, and best practices</p><p>(00:41:00) The importance of note-taking and organizational tools</p><p>(00:46:27) Hunting Methodologies and focusing on Critical Exploitations</p><p>(01:02:37) Collaboration in the hacking community</p><p>(01:06:00) Binary Exploitation and Source Code Review</p><p>(01:10:59) Configuration file injections</p><p>(01:17:38) Justin vs. Alex at a LHE</p>]]></description>
  <embed_id>29b5d44e-5e37-411c-8454-c57db59f18bd</embed_id>
  <pubDate>Thu, 10 Aug 2023 10:00:53 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="81362151" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/a56d4712-5cf2-4ac2-b8df-3e75917ad3d7/episode.mp3" />
  <itunes:title><![CDATA[Episode 31: Alex Chapman - The Man of Many Crits]]></itunes:title>
  <itunes:duration>1:24:45</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 31: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to be joined by Alex Chapman, a seasoned InfoSec hacker and bug bounty hunter. We kick off with Alex sharing his hacking journey, from a guest lecturer that inspired him, to working on internal Red Teams, to his transition to working with HackerOne, and finally as a bug bounty hunter focusing on searching out those few, high impact bugs. We also discuss the power of collaboration, the challenges of balancing hacking with other responsibilities, and the necessity of flexibility and taking breaks in bug bounty work. Don't miss this episode where we explore the depths of bug bounty with Alex Chapman!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/ajxchapman">https://twitter.com/ajxchapman</a></p><p>@<a href="mailto:ajxchapman@infosec.exchange">ajxchapman@infosec.exchange</a></p><p><a href="https://ajxchapman.github.io/">https://ajxchapman.github.io/</a></p><p><a href="https://hackerone.com/ajxchapman?type=user">https://hackerone.com/ajxchapman?type=user</a></p><p>Perforce RCE</p><p><a href="https://hackerone.com/reports/1830220">https://hackerone.com/reports/1830220</a> </p><p><a href="https://ajxchapman.github.io/bugreports/2019/04/04/perforce-local-file-disclosure.html">https://ajxchapman.github.io/bugreports/2019/04/04/perforce-local-file-disclosure.html</a> </p><p>(00:00:00) Introduction</p><p>(00:01:50) Alex Chapman's InfoSec journey and evolution</p><p>(00:05:55) Real-world experience vs. chasing degrees, and the pivot into Bug Bounty</p><p>(00:13:12) The benefit of programming knowledge</p><p>(00:16:50) Experience in Internal Red Team and hacker mentalities.</p><p>(00:23:35) Transitioning to HackerOne and full time Bug Bounty</p><p>(00:33:37) Bug Bounty tips, time management, and best practices</p><p>(00:41:00) The importance of note-taking and organizational tools</p><p>(00:46:27) Hunting Methodologies and focusing on Critical Exploitations</p><p>(01:02:37) Collaboration in the hacking community</p><p>(01:06:00) Binary Exploitation and Source Code Review</p><p>(01:10:59) Configuration file injections</p><p>(01:17:38) Justin vs. Alex at a LHE</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 31: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to be joined by Alex Chapman, a seasoned InfoSec hacker and bug bounty hunter. We kick off with Alex sharing his hacking journey, from a guest lecturer that inspired him, to working on internal Red Teams, to his transition to working with HackerOne, and finally as a bug bounty hunter focusing on searching out those few, high impact bugs. We also discuss the power of collaboration, the challenges of balancing hacking with other responsibilities, and the necessity of flexibility and taking breaks in bug bounty work. Don't miss this episode where we explore the depths of bug bounty with Alex Chapman!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/ajxchapman">https://twitter.com/ajxchapman</a></p><p>@<a href="mailto:ajxchapman@infosec.exchange">ajxchapman@infosec.exchange</a></p><p><a href="https://ajxchapman.github.io/">https://ajxchapman.github.io/</a></p><p><a href="https://hackerone.com/ajxchapman?type=user">https://hackerone.com/ajxchapman?type=user</a></p><p>Perforce RCE</p><p><a href="https://hackerone.com/reports/1830220">https://hackerone.com/reports/1830220</a> </p><p><a href="https://ajxchapman.github.io/bugreports/2019/04/04/perforce-local-file-disclosure.html">https://ajxchapman.github.io/bugreports/2019/04/04/perforce-local-file-disclosure.html</a> </p><p>(00:00:00) Introduction</p><p>(00:01:50) Alex Chapman's InfoSec journey and evolution</p><p>(00:05:55) Real-world experience vs. chasing degrees, and the pivot into Bug Bounty</p><p>(00:13:12) The benefit of programming knowledge</p><p>(00:16:50) Experience in Internal Red Team and hacker mentalities.</p><p>(00:23:35) Transitioning to HackerOne and full time Bug Bounty</p><p>(00:33:37) Bug Bounty tips, time management, and best practices</p><p>(00:41:00) The importance of note-taking and organizational tools</p><p>(00:46:27) Hunting Methodologies and focusing on Critical Exploitations</p><p>(01:02:37) Collaboration in the hacking community</p><p>(01:06:00) Binary Exploitation and Source Code Review</p><p>(01:10:59) Configuration file injections</p><p>(01:17:38) Justin vs. Alex at a LHE</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 31: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to be joined by Alex Chapman, a seasoned InfoSec hacker and bug bounty hunter. We kick off with Alex sharing his hacking journey, from a guest lecturer that inspi...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>31</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">e0e8ef49-3dc2-4f4c-9eca-0763c8c48e71</guid>
  <title><![CDATA[Episode 30: Recon Legend Shubs - From Burgers to Bounties]]></title>
  <description><![CDATA[<p>Episode 30: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to be joined by renowned bug bounty hunter Shubs. We kick off with him sharing his journey from burgers to bugs, and how his friendly rivalry with a fellow hacker fueled his passion for reconnaissance, as well as his love of collaboration. We then shift gears to talk about the art of debugging, ethics and economics of bug bounty hunting, the transition to Entrepreneur, and the evolution of Assetnote from a reconnaissance tool to enterprise security software suite. This one’s a banger, and we don’t want you to miss it!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p>@infosec_au</p><p>Intro Shoutouts</p><p><a href="https://twitter.com/bebiksior">https://twitter.com/bebiksior</a></p><p><a href="https://cvssadvisor.com/">https://cvssadvisor.com/</a></p><p>Assetnote</p><p><a href="https://www.assetnote.io/">https://www.assetnote.io/</a></p><p><a href="https://twitter.com/assetnote">https://twitter.com/assetnote</a></p><p>Bishop Fox</p><p><a href="https://bishopfox.com/">https://bishopfox.com/</a></p><p>Shortscan</p><p><a href="https://github.com/bitquark/shortscan">https://github.com/bitquark/shortscan</a></p><p>XXE Payload</p><p><a href="https://gist.github.com/Rhynorater/d0d19f757221a916a22476c3a5c6aba2">https://gist.github.com/Rhynorater/d0d19f757221a916a22476c3a5c6aba2</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:05:48) History as a Hacker: Recon, rivalries, and Riot Games</p><p>(00:12:13) Collaboration and Community in Bug Bounty</p><p>(00:18:19) The Art of Debugging</p><p>(00:21:48) Assetnote News and overview</p><p>(00:30:43) CVE reversing</p><p>(00:32:58) Zero-day vulns</p><p>(00:42:48) Bug Bounty Ethics and Economics</p><p>(00:52:53) Bug Bounty and Entrepreneurship</p><p>(01:03:58) Business lessons learned</p><p>(01:07:48) Advice for Hunters looking to grow</p><p>(01:12:38) IIS Server Techniques</p>]]></description>
  <embed_id>8583dfd1-b963-453c-a5d0-68ccfc08978f</embed_id>
  <pubDate>Thu, 03 Aug 2023 10:00:23 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="76242135" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/ea86bbb3-49b5-40f4-abf1-136370291889/episode.mp3" />
  <itunes:title><![CDATA[Episode 30: Recon Legend Shubs - From Burgers to Bounties]]></itunes:title>
  <itunes:duration>1:19:25</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 30: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to be joined by renowned bug bounty hunter Shubs. We kick off with him sharing his journey from burgers to bugs, and how his friendly rivalry with a fellow hacker fueled his passion for reconnaissance, as well as his love of collaboration. We then shift gears to talk about the art of debugging, ethics and economics of bug bounty hunting, the transition to Entrepreneur, and the evolution of Assetnote from a reconnaissance tool to enterprise security software suite. This one’s a banger, and we don’t want you to miss it!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p>@infosec_au</p><p>Intro Shoutouts</p><p><a href="https://twitter.com/bebiksior">https://twitter.com/bebiksior</a></p><p><a href="https://cvssadvisor.com/">https://cvssadvisor.com/</a></p><p>Assetnote</p><p><a href="https://www.assetnote.io/">https://www.assetnote.io/</a></p><p><a href="https://twitter.com/assetnote">https://twitter.com/assetnote</a></p><p>Bishop Fox</p><p><a href="https://bishopfox.com/">https://bishopfox.com/</a></p><p>Shortscan</p><p><a href="https://github.com/bitquark/shortscan">https://github.com/bitquark/shortscan</a></p><p>XXE Payload</p><p><a href="https://gist.github.com/Rhynorater/d0d19f757221a916a22476c3a5c6aba2">https://gist.github.com/Rhynorater/d0d19f757221a916a22476c3a5c6aba2</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:05:48) History as a Hacker: Recon, rivalries, and Riot Games</p><p>(00:12:13) Collaboration and Community in Bug Bounty</p><p>(00:18:19) The Art of Debugging</p><p>(00:21:48) Assetnote News and overview</p><p>(00:30:43) CVE reversing</p><p>(00:32:58) Zero-day vulns</p><p>(00:42:48) Bug Bounty Ethics and Economics</p><p>(00:52:53) Bug Bounty and Entrepreneurship</p><p>(01:03:58) Business lessons learned</p><p>(01:07:48) Advice for Hunters looking to grow</p><p>(01:12:38) IIS Server Techniques</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 30: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to be joined by renowned bug bounty hunter Shubs. We kick off with him sharing his journey from burgers to bugs, and how his friendly rivalry with a fellow hacker fueled his passion for reconnaissance, as well as his love of collaboration. We then shift gears to talk about the art of debugging, ethics and economics of bug bounty hunting, the transition to Entrepreneur, and the evolution of Assetnote from a reconnaissance tool to enterprise security software suite. This one’s a banger, and we don’t want you to miss it!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p>@infosec_au</p><p>Intro Shoutouts</p><p><a href="https://twitter.com/bebiksior">https://twitter.com/bebiksior</a></p><p><a href="https://cvssadvisor.com/">https://cvssadvisor.com/</a></p><p>Assetnote</p><p><a href="https://www.assetnote.io/">https://www.assetnote.io/</a></p><p><a href="https://twitter.com/assetnote">https://twitter.com/assetnote</a></p><p>Bishop Fox</p><p><a href="https://bishopfox.com/">https://bishopfox.com/</a></p><p>Shortscan</p><p><a href="https://github.com/bitquark/shortscan">https://github.com/bitquark/shortscan</a></p><p>XXE Payload</p><p><a href="https://gist.github.com/Rhynorater/d0d19f757221a916a22476c3a5c6aba2">https://gist.github.com/Rhynorater/d0d19f757221a916a22476c3a5c6aba2</a></p><p>Timestamps</p><p>(00:00:00) Introduction</p><p>(00:05:48) History as a Hacker: Recon, rivalries, and Riot Games</p><p>(00:12:13) Collaboration and Community in Bug Bounty</p><p>(00:18:19) The Art of Debugging</p><p>(00:21:48) Assetnote News and overview</p><p>(00:30:43) CVE reversing</p><p>(00:32:58) Zero-day vulns</p><p>(00:42:48) Bug Bounty Ethics and Economics</p><p>(00:52:53) Bug Bounty and Entrepreneurship</p><p>(01:03:58) Business lessons learned</p><p>(01:07:48) Advice for Hunters looking to grow</p><p>(01:12:38) IIS Server Techniques</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 30: In this episode of Critical Thinking - Bug Bounty Podcast, we're thrilled to be joined by renowned bug bounty hunter Shubs. We kick off with him sharing his journey from burgers to bugs, and how his friendly rivalry with a fellow hacker...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>30</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">a147f75d-561c-499b-b9a7-4ae37daa54a3</guid>
  <title><![CDATA[Episode 29: Live Episode with Sean Yeoh - Assetnote Engineer]]></title>
  <description><![CDATA[<p>Episode 29: In this episode of Critical Thinking - Bug Bounty Podcast sit down with Assetnote Engineer Sean Yeoh, and pick his brain about what he's learned on his development journey. We talk about the place and importance of message brokers, and which ones we like best, as well as his engineering philosophy regarding bottleneck prevention and the importance of pursuing optimization. Don't miss this episode of terrific technical tips!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/seanyeoh">https://twitter.com/seanyeoh</a></p><p>Assetnote</p><p><a href="https://www.assetnote.io/">https://www.assetnote.io/</a></p><p><a href="https://twitter.com/assetnote">https://twitter.com/assetnote</a></p><p>XKCD automation graph</p><p><a href="https://xkcd.com/1319/">https://xkcd.com/1319/</a></p><p>Github repository</p><p><a href="https://github.com/alex/what-happens-when">https://github.com/alex/what-happens-when</a></p><p>Article about Queues</p><p><a href="https://archive.is/Nan4e">https://archive.is/Nan4e</a></p><p>NATS</p><p><a href="https://nats.io/">https://nats.io/</a></p><p>MongoDB</p><p><a href="https://www.mongodb.com/">https://www.mongodb.com/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:18) Story of Assetnote</p><p>(00:05:20) Message Brokers and event-driven architectures</p><p>(00:11:15) Preventing bottlenecks and pursuing optimization</p><p>(00:21:35) Using a profiler</p><p>(00:28:30) Choosing a Message Broker</p><p>(00:33:00) Kubernetes and Conntrack Limits</p><p>(00:37:13) Databases</p><p>(00:46:30) Bug bounty tips: Sub-domain vs. IP Address</p><p>(00:51:15) Engineering quandaries</p><p>(00:53:38) DNS Wildcards</p>]]></description>
  <embed_id>2c600c9d-419b-4b93-945e-605b2f928c94</embed_id>
  <pubDate>Thu, 27 Jul 2023 10:00:23 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="57281851" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/6e081d28-d43d-4369-82f4-c5881998520e/episode.mp3" />
  <itunes:title><![CDATA[Episode 29: Live Episode with Sean Yeoh - Assetnote Engineer]]></itunes:title>
  <itunes:duration>59:40</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 29: In this episode of Critical Thinking - Bug Bounty Podcast sit down with Assetnote Engineer Sean Yeoh, and pick his brain about what he's learned on his development journey. We talk about the place and importance of message brokers, and which ones we like best, as well as his engineering philosophy regarding bottleneck prevention and the importance of pursuing optimization. Don't miss this episode of terrific technical tips!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/seanyeoh">https://twitter.com/seanyeoh</a></p><p>Assetnote</p><p><a href="https://www.assetnote.io/">https://www.assetnote.io/</a></p><p><a href="https://twitter.com/assetnote">https://twitter.com/assetnote</a></p><p>XKCD automation graph</p><p><a href="https://xkcd.com/1319/">https://xkcd.com/1319/</a></p><p>Github repository</p><p><a href="https://github.com/alex/what-happens-when">https://github.com/alex/what-happens-when</a></p><p>Article about Queues</p><p><a href="https://archive.is/Nan4e">https://archive.is/Nan4e</a></p><p>NATS</p><p><a href="https://nats.io/">https://nats.io/</a></p><p>MongoDB</p><p><a href="https://www.mongodb.com/">https://www.mongodb.com/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:18) Story of Assetnote</p><p>(00:05:20) Message Brokers and event-driven architectures</p><p>(00:11:15) Preventing bottlenecks and pursuing optimization</p><p>(00:21:35) Using a profiler</p><p>(00:28:30) Choosing a Message Broker</p><p>(00:33:00) Kubernetes and Conntrack Limits</p><p>(00:37:13) Databases</p><p>(00:46:30) Bug bounty tips: Sub-domain vs. IP Address</p><p>(00:51:15) Engineering quandaries</p><p>(00:53:38) DNS Wildcards</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 29: In this episode of Critical Thinking - Bug Bounty Podcast sit down with Assetnote Engineer Sean Yeoh, and pick his brain about what he's learned on his development journey. We talk about the place and importance of message brokers, and which ones we like best, as well as his engineering philosophy regarding bottleneck prevention and the importance of pursuing optimization. Don't miss this episode of terrific technical tips!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/seanyeoh">https://twitter.com/seanyeoh</a></p><p>Assetnote</p><p><a href="https://www.assetnote.io/">https://www.assetnote.io/</a></p><p><a href="https://twitter.com/assetnote">https://twitter.com/assetnote</a></p><p>XKCD automation graph</p><p><a href="https://xkcd.com/1319/">https://xkcd.com/1319/</a></p><p>Github repository</p><p><a href="https://github.com/alex/what-happens-when">https://github.com/alex/what-happens-when</a></p><p>Article about Queues</p><p><a href="https://archive.is/Nan4e">https://archive.is/Nan4e</a></p><p>NATS</p><p><a href="https://nats.io/">https://nats.io/</a></p><p>MongoDB</p><p><a href="https://www.mongodb.com/">https://www.mongodb.com/</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:01:18) Story of Assetnote</p><p>(00:05:20) Message Brokers and event-driven architectures</p><p>(00:11:15) Preventing bottlenecks and pursuing optimization</p><p>(00:21:35) Using a profiler</p><p>(00:28:30) Choosing a Message Broker</p><p>(00:33:00) Kubernetes and Conntrack Limits</p><p>(00:37:13) Databases</p><p>(00:46:30) Bug bounty tips: Sub-domain vs. IP Address</p><p>(00:51:15) Engineering quandaries</p><p>(00:53:38) DNS Wildcards</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 29: In this episode of Critical Thinking - Bug Bounty Podcast sit down with Assetnote Engineer Sean Yeoh, and pick his brain about what he's learned on his development journey. We talk about the place and importance of message brokers, and ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>29</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">85b7ef4e-4231-40b8-af46-edc8be2d0031</guid>
  <title><![CDATA[Episode 28: Surfin' with CSRFs]]></title>
  <description><![CDATA[<p>Episode 28: In this episode of Critical Thinking - Bug Bounty Podcast, the CSRF’s up, dude! We kick off with a debate about whether or not deep link vulns in mobile apps can be considered CSRF. We also talk browser extensions and tools like Hackbar, PwnFox, and JS Weasel, and Justin tries to invent a whole new vuln term. There’s plenty of good stuff here, so what are you waiting for? Jump on in!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>rez0's latest tip</p><p><a href="https://twitter.com/rez0__/status/168134822190014466019">https://twitter.com/rez0__/status/168134822190014466019</a></p><p>Hackbar</p><p><a href="https://addons.mozilla.org/en-US/firefox/addon/hackbartool/">https://addons.mozilla.org/en-US/firefox/addon/hackbartool/</a></p><p>PwnFox</p><p><a href="https://twitter.com/adrien_jeanneau/status/1681364665354289152">https://twitter.com/adrien_jeanneau/status/1681364665354289152</a></p><p>JS Weasel</p><p><a href="https://www.jswzl.io/">https://www.jswzl.io/</a></p><p>Charlie Eriksen</p><p><a href="https://twitter.com/CharlieEriksen">https://twitter.com/CharlieEriksen</a></p><p>Link to talk by Rojan</p><p><a href="https://twitter.com/uraniumhacker/status/1681381857383030785">https://twitter.com/uraniumhacker/status/1681381857383030785</a></p><p>Bypassing GitHub's OAuth flow</p><p><a href="https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html">https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html</a></p><p>Great SameSite Confusion</p><p><a href="https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/">https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/</a></p><p>Check out Nahamsec's Channel</p><p><a href="https://www.youtube.com/c/nahamsec">https://www.youtube.com/c/nahamsec</a></p><p>Timestamps:</p><p>(0:01:45) The deep link debate</p><p>(00:08:00) LHE and in-person interviews</p><p>(00:09:25) SQLMAP and raw requests</p><p>(00:11:11) Hackbar, PwnFox, and browser extensions</p><p>(00:16:45) JS Weasel tool and its features</p><p>(00:25:28) Rojan's Research and Public Talks</p><p>(Start of main content)</p><p>(00:28:36) Cross-Site Request Forgery (CSRF)</p><p>(00:35:00) Bypassing GitHub's OAuth flow</p><p>(00:45:00) A Small SameSite Story</p><p>(00:48:50) CSRF Exploitation Techniques</p><p>(01:07:15) CSRF Bug Stories</p><p>(01:15:30) NahamSec and DEFCON</p>]]></description>
  <embed_id>af94d7f0-1f6b-4ac2-9acc-f91575b3e5ed</embed_id>
  <pubDate>Thu, 20 Jul 2023 11:00:23 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="74962360" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/5878c793-2fc4-4489-8bcb-657b58c63218/episode.mp3" />
  <itunes:title><![CDATA[Episode 28: Surfin' with CSRFs]]></itunes:title>
  <itunes:duration>1:18:05</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 28: In this episode of Critical Thinking - Bug Bounty Podcast, the CSRF’s up, dude! We kick off with a debate about whether or not deep link vulns in mobile apps can be considered CSRF. We also talk browser extensions and tools like Hackbar, PwnFox, and JS Weasel, and Justin tries to invent a whole new vuln term. There’s plenty of good stuff here, so what are you waiting for? Jump on in!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>rez0's latest tip</p><p><a href="https://twitter.com/rez0__/status/168134822190014466019">https://twitter.com/rez0__/status/168134822190014466019</a></p><p>Hackbar</p><p><a href="https://addons.mozilla.org/en-US/firefox/addon/hackbartool/">https://addons.mozilla.org/en-US/firefox/addon/hackbartool/</a></p><p>PwnFox</p><p><a href="https://twitter.com/adrien_jeanneau/status/1681364665354289152">https://twitter.com/adrien_jeanneau/status/1681364665354289152</a></p><p>JS Weasel</p><p><a href="https://www.jswzl.io/">https://www.jswzl.io/</a></p><p>Charlie Eriksen</p><p><a href="https://twitter.com/CharlieEriksen">https://twitter.com/CharlieEriksen</a></p><p>Link to talk by Rojan</p><p><a href="https://twitter.com/uraniumhacker/status/1681381857383030785">https://twitter.com/uraniumhacker/status/1681381857383030785</a></p><p>Bypassing GitHub's OAuth flow</p><p><a href="https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html">https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html</a></p><p>Great SameSite Confusion</p><p><a href="https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/">https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/</a></p><p>Check out Nahamsec's Channel</p><p><a href="https://www.youtube.com/c/nahamsec">https://www.youtube.com/c/nahamsec</a></p><p>Timestamps:</p><p>(0:01:45) The deep link debate</p><p>(00:08:00) LHE and in-person interviews</p><p>(00:09:25) SQLMAP and raw requests</p><p>(00:11:11) Hackbar, PwnFox, and browser extensions</p><p>(00:16:45) JS Weasel tool and its features</p><p>(00:25:28) Rojan's Research and Public Talks</p><p>(Start of main content)</p><p>(00:28:36) Cross-Site Request Forgery (CSRF)</p><p>(00:35:00) Bypassing GitHub's OAuth flow</p><p>(00:45:00) A Small SameSite Story</p><p>(00:48:50) CSRF Exploitation Techniques</p><p>(01:07:15) CSRF Bug Stories</p><p>(01:15:30) NahamSec and DEFCON</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 28: In this episode of Critical Thinking - Bug Bounty Podcast, the CSRF’s up, dude! We kick off with a debate about whether or not deep link vulns in mobile apps can be considered CSRF. We also talk browser extensions and tools like Hackbar, PwnFox, and JS Weasel, and Justin tries to invent a whole new vuln term. There’s plenty of good stuff here, so what are you waiting for? Jump on in!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>rez0's latest tip</p><p><a href="https://twitter.com/rez0__/status/168134822190014466019">https://twitter.com/rez0__/status/168134822190014466019</a></p><p>Hackbar</p><p><a href="https://addons.mozilla.org/en-US/firefox/addon/hackbartool/">https://addons.mozilla.org/en-US/firefox/addon/hackbartool/</a></p><p>PwnFox</p><p><a href="https://twitter.com/adrien_jeanneau/status/1681364665354289152">https://twitter.com/adrien_jeanneau/status/1681364665354289152</a></p><p>JS Weasel</p><p><a href="https://www.jswzl.io/">https://www.jswzl.io/</a></p><p>Charlie Eriksen</p><p><a href="https://twitter.com/CharlieEriksen">https://twitter.com/CharlieEriksen</a></p><p>Link to talk by Rojan</p><p><a href="https://twitter.com/uraniumhacker/status/1681381857383030785">https://twitter.com/uraniumhacker/status/1681381857383030785</a></p><p>Bypassing GitHub's OAuth flow</p><p><a href="https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html">https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html</a></p><p>Great SameSite Confusion</p><p><a href="https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/">https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/</a></p><p>Check out Nahamsec's Channel</p><p><a href="https://www.youtube.com/c/nahamsec">https://www.youtube.com/c/nahamsec</a></p><p>Timestamps:</p><p>(0:01:45) The deep link debate</p><p>(00:08:00) LHE and in-person interviews</p><p>(00:09:25) SQLMAP and raw requests</p><p>(00:11:11) Hackbar, PwnFox, and browser extensions</p><p>(00:16:45) JS Weasel tool and its features</p><p>(00:25:28) Rojan's Research and Public Talks</p><p>(Start of main content)</p><p>(00:28:36) Cross-Site Request Forgery (CSRF)</p><p>(00:35:00) Bypassing GitHub's OAuth flow</p><p>(00:45:00) A Small SameSite Story</p><p>(00:48:50) CSRF Exploitation Techniques</p><p>(01:07:15) CSRF Bug Stories</p><p>(01:15:30) NahamSec and DEFCON</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 28: In this episode of Critical Thinking - Bug Bounty Podcast, the CSRF’s up, dude! We kick off with a debate about whether or not deep link vulns in mobile apps can be considered CSRF. We also talk browser extensions and tools like Hackbar...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>28</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">c2b0271c-d072-44de-a301-f000384b6e02</guid>
  <title><![CDATA[Episode 27: Top 7 Esoteric Web Vulnerabilities]]></title>
  <description><![CDATA[<p>Episode 27: In this episode of Critical Thinking - Bug Bounty Podcast, we've switched places and now Joel is home while Justin is on the move. We break down seven esoteric web vulnerabilities, and talk Cookies, Config File Injections, Client-side path traversals and more. We also briefly discuss appliance hacking, new tools, and shout out some new talent in the hacking space. Don't miss this episode full of cool vulns, and experience Justin's vocal decline in real time.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Encrypted Doesn't Mean Authenticated:</p><p><a href="https://blog.assetnote.io/2023/07/04/citrix-sharefile-rce/">https://blog.assetnote.io/2023/07/04/citrix-sharefile-rce/</a></p><p>Tweet about headless chrome browser</p><p><a href="https://twitter.com/bhavukjain1/status/1678719047209484288?t=NWnZvwHTRMyH_lVC-uXe0g&amp;s=19">https://twitter.com/bhavukjain1/status/1678719047209484288?t=NWnZvwHTRMyH_lVC-uXe0g&amp;s=19</a></p><p>Shout out to new talent within the hacking space</p><p><a href="https://twitter.com/haxrob">https://twitter.com/haxrob</a></p><p><a href="https://twitter.com/atc1441">https://twitter.com/atc1441</a></p><p>Tweet about hacking Google Search Appliance</p><p><a href="https://twitter.com/orange_8361/status/1677378401957724160">https://twitter.com/orange_8361/status/1677378401957724160</a></p><p>Bitquark releases shortscan</p><p><a href="https://twitter.com/bitquark/status/1677647450989838338">https://twitter.com/bitquark/status/1677647450989838338</a></p><p>Hacking Starbucks</p><p><a href="https://samcurry.net/hacking-starbucks/">https://samcurry.net/hacking-starbucks/</a></p><p>Justin's CookieJar Tool</p><p><a href="https://apps.rhynorater.dev/checkCookieJarOverflow.html">https://apps.rhynorater.dev/checkCookieJarOverflow.html</a></p><p>HackTricks</p><p><a href="https://book.hacktricks.xyz/pentesting-web/hacking-with-cookies/cookie-jar-overflow">https://book.hacktricks.xyz/pentesting-web/hacking-with-cookies/cookie-jar-overflow</a></p><p>XSLeak</p><p><a href="https://xsleaks.dev">https://xsleaks.dev</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:00) Assetnote on ShareFile RCE</p><p>(00:13:05) Headless Browsers</p><p>(00:17:00) Hacker Content Creators</p><p>(00:22:51) Appliance Hacking</p><p>(00:30:31) Shortscan Release</p><p>(Start of main content)</p><p>(00:35:39) Config File Injection</p><p>(00:44:00) Client-side Path Traversal</p><p>(00:51:33) Cookie Bombing</p><p>(00:58:00) Cookie Jar Overflow</p><p>(01:03:50) XSLeak</p><p>(01:10:49) UNC Path Injection</p><p>(01:15:50) Impactful Link Hijack</p>]]></description>
  <embed_id>d508bdab-a7ff-4017-8756-65a7911f5b5b</embed_id>
  <pubDate>Thu, 13 Jul 2023 11:00:42 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="77058425" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/fbf6a861-12c4-4fe6-a8c3-a283b684f678/episode.mp3" />
  <itunes:title><![CDATA[Episode 27: Top 7 Esoteric Web Vulnerabilities]]></itunes:title>
  <itunes:duration>1:20:16</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 27: In this episode of Critical Thinking - Bug Bounty Podcast, we've switched places and now Joel is home while Justin is on the move. We break down seven esoteric web vulnerabilities, and talk Cookies, Config File Injections, Client-side path traversals and more. We also briefly discuss appliance hacking, new tools, and shout out some new talent in the hacking space. Don't miss this episode full of cool vulns, and experience Justin's vocal decline in real time.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Encrypted Doesn't Mean Authenticated:</p><p><a href="https://blog.assetnote.io/2023/07/04/citrix-sharefile-rce/">https://blog.assetnote.io/2023/07/04/citrix-sharefile-rce/</a></p><p>Tweet about headless chrome browser</p><p><a href="https://twitter.com/bhavukjain1/status/1678719047209484288?t=NWnZvwHTRMyH_lVC-uXe0g&amp;s=19">https://twitter.com/bhavukjain1/status/1678719047209484288?t=NWnZvwHTRMyH_lVC-uXe0g&amp;s=19</a></p><p>Shout out to new talent within the hacking space</p><p><a href="https://twitter.com/haxrob">https://twitter.com/haxrob</a></p><p><a href="https://twitter.com/atc1441">https://twitter.com/atc1441</a></p><p>Tweet about hacking Google Search Appliance</p><p><a href="https://twitter.com/orange_8361/status/1677378401957724160">https://twitter.com/orange_8361/status/1677378401957724160</a></p><p>Bitquark releases shortscan</p><p><a href="https://twitter.com/bitquark/status/1677647450989838338">https://twitter.com/bitquark/status/1677647450989838338</a></p><p>Hacking Starbucks</p><p><a href="https://samcurry.net/hacking-starbucks/">https://samcurry.net/hacking-starbucks/</a></p><p>Justin's CookieJar Tool</p><p><a href="https://apps.rhynorater.dev/checkCookieJarOverflow.html">https://apps.rhynorater.dev/checkCookieJarOverflow.html</a></p><p>HackTricks</p><p><a href="https://book.hacktricks.xyz/pentesting-web/hacking-with-cookies/cookie-jar-overflow">https://book.hacktricks.xyz/pentesting-web/hacking-with-cookies/cookie-jar-overflow</a></p><p>XSLeak</p><p><a href="https://xsleaks.dev">https://xsleaks.dev</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:00) Assetnote on ShareFile RCE</p><p>(00:13:05) Headless Browsers</p><p>(00:17:00) Hacker Content Creators</p><p>(00:22:51) Appliance Hacking</p><p>(00:30:31) Shortscan Release</p><p>(Start of main content)</p><p>(00:35:39) Config File Injection</p><p>(00:44:00) Client-side Path Traversal</p><p>(00:51:33) Cookie Bombing</p><p>(00:58:00) Cookie Jar Overflow</p><p>(01:03:50) XSLeak</p><p>(01:10:49) UNC Path Injection</p><p>(01:15:50) Impactful Link Hijack</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 27: In this episode of Critical Thinking - Bug Bounty Podcast, we've switched places and now Joel is home while Justin is on the move. We break down seven esoteric web vulnerabilities, and talk Cookies, Config File Injections, Client-side path traversals and more. We also briefly discuss appliance hacking, new tools, and shout out some new talent in the hacking space. Don't miss this episode full of cool vulns, and experience Justin's vocal decline in real time.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Encrypted Doesn't Mean Authenticated:</p><p><a href="https://blog.assetnote.io/2023/07/04/citrix-sharefile-rce/">https://blog.assetnote.io/2023/07/04/citrix-sharefile-rce/</a></p><p>Tweet about headless chrome browser</p><p><a href="https://twitter.com/bhavukjain1/status/1678719047209484288?t=NWnZvwHTRMyH_lVC-uXe0g&amp;s=19">https://twitter.com/bhavukjain1/status/1678719047209484288?t=NWnZvwHTRMyH_lVC-uXe0g&amp;s=19</a></p><p>Shout out to new talent within the hacking space</p><p><a href="https://twitter.com/haxrob">https://twitter.com/haxrob</a></p><p><a href="https://twitter.com/atc1441">https://twitter.com/atc1441</a></p><p>Tweet about hacking Google Search Appliance</p><p><a href="https://twitter.com/orange_8361/status/1677378401957724160">https://twitter.com/orange_8361/status/1677378401957724160</a></p><p>Bitquark releases shortscan</p><p><a href="https://twitter.com/bitquark/status/1677647450989838338">https://twitter.com/bitquark/status/1677647450989838338</a></p><p>Hacking Starbucks</p><p><a href="https://samcurry.net/hacking-starbucks/">https://samcurry.net/hacking-starbucks/</a></p><p>Justin's CookieJar Tool</p><p><a href="https://apps.rhynorater.dev/checkCookieJarOverflow.html">https://apps.rhynorater.dev/checkCookieJarOverflow.html</a></p><p>HackTricks</p><p><a href="https://book.hacktricks.xyz/pentesting-web/hacking-with-cookies/cookie-jar-overflow">https://book.hacktricks.xyz/pentesting-web/hacking-with-cookies/cookie-jar-overflow</a></p><p>XSLeak</p><p><a href="https://xsleaks.dev">https://xsleaks.dev</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:00) Assetnote on ShareFile RCE</p><p>(00:13:05) Headless Browsers</p><p>(00:17:00) Hacker Content Creators</p><p>(00:22:51) Appliance Hacking</p><p>(00:30:31) Shortscan Release</p><p>(Start of main content)</p><p>(00:35:39) Config File Injection</p><p>(00:44:00) Client-side Path Traversal</p><p>(00:51:33) Cookie Bombing</p><p>(00:58:00) Cookie Jar Overflow</p><p>(01:03:50) XSLeak</p><p>(01:10:49) UNC Path Injection</p><p>(01:15:50) Impactful Link Hijack</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 27: In this episode of Critical Thinking - Bug Bounty Podcast, we've switched places and now Joel is home while Justin is on the move. We break down seven esoteric web vulnerabilities, and talk Cookies, Config File Injections, Client-side p...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>27</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">a388279b-7c4f-4c21-b096-295b57eba7cd</guid>
  <title><![CDATA[Episode 26: Client-side Quirks & Browser Hacks]]></title>
  <description><![CDATA[<p>In this episode of Critical Thinking - Bug Bounty Podcast, we're back with Joel, fresh (haha) off of back-to-back live hack events in London and Seoul. We compare the different vibes of each LHE, then we dive into the technical thick of it, and talk web browsers, XSS vectors, new tools, CVSS 4.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>______</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.hakaioffsec.com/nginx-alias-traversal/">Hunting for NGINX alias traversals in the wild</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/PortSwiggerRes/status/1675851892684103680">PortSwigger Tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/irsdl/status/1675871336734904320">Soroush's Follow-up</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/therceman/status/1675893900274171904">Tweet about magic math element</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=HUtkW2gjC8Q">&lt;22 weird XSS behavior</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xLupin/status/1675894230542086144">Lupin’s follow-up</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.rcesecurity.com/2023/07/patch-diffing-cve-2023-28121-to-compromise-a-woocommerce/">Patch diffing</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/reefbr/status/1676020175949144064">Changes to CVSS 4.0</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/reefbr/status/1676020175949144064">Ask FIRSTdotORG what's going on</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/BishopFox/jsluice">Jsluise</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Operators/import">JS import() behavior</a></p><p>'<a target="_blank" rel="noopener noreferrer nofollow" href="https://leanpub.com/javascriptforhackers/">JavaScript for Hackers'</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://csp-evaluator.withgoogle.com/">CSP Evaluator:</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/web-security/dom-based/dom-clobbering">Dom Clobbering</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://0xn3va.gitbook.io/cheat-sheets/web-application/html-injection/base">HTML Injection Cheat Sheet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.garethheyes.co.uk/">Gareth Heyes website/game</a></p><p>______</p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:10) LHE Vibes</p><p>(00:07:45) "Hunting for NGINX alias traversals in the wild"</p><p>(00:12:30) Payouts in BB programs</p><p>(00:16:05) New XSS vectors and popovers</p><p>(00:24:15) The "magical math element" in Firefox</p><p>(00:27:15) LiveOverflow on HTML parsing quirks</p><p>(00:32:10) Mr. Tux Racer, Woocommerce, and WordPress</p><p>(00:40:00) Changes in the CVSS 4 draft spec</p><p>(00:45:00) TomNomNom's new tool Jsluise</p><p>(00:51:15) JavaScript's import function &amp; "JavaScript for Hackers"</p><p>(01:09:15) Prototype pollution &amp; DOM clobbering</p><p>(01:18:10) Base tags and CSS Games</p>]]></description>
  <embed_id>edd8594b-2a45-42ad-b760-474e237d16d2</embed_id>
  <pubDate>Thu, 06 Jul 2023 11:00:40 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="89604724" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/effd48c3-9010-46a6-9a62-d23d4d55ef95/episode.mp3" />
  <itunes:title><![CDATA[Episode 26: Client-side Quirks & Browser Hacks]]></itunes:title>
  <itunes:duration>1:33:20</itunes:duration>
  <itunes:summary><![CDATA[<p>In this episode of Critical Thinking - Bug Bounty Podcast, we're back with Joel, fresh (haha) off of back-to-back live hack events in London and Seoul. We compare the different vibes of each LHE, then we dive into the technical thick of it, and talk web browsers, XSS vectors, new tools, CVSS 4.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>______</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.hakaioffsec.com/nginx-alias-traversal/">Hunting for NGINX alias traversals in the wild</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/PortSwiggerRes/status/1675851892684103680">PortSwigger Tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/irsdl/status/1675871336734904320">Soroush's Follow-up</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/therceman/status/1675893900274171904">Tweet about magic math element</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=HUtkW2gjC8Q">&lt;22 weird XSS behavior</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xLupin/status/1675894230542086144">Lupin’s follow-up</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.rcesecurity.com/2023/07/patch-diffing-cve-2023-28121-to-compromise-a-woocommerce/">Patch diffing</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/reefbr/status/1676020175949144064">Changes to CVSS 4.0</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/reefbr/status/1676020175949144064">Ask FIRSTdotORG what's going on</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/BishopFox/jsluice">Jsluise</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Operators/import">JS import() behavior</a></p><p>'<a target="_blank" rel="noopener noreferrer nofollow" href="https://leanpub.com/javascriptforhackers/">JavaScript for Hackers'</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://csp-evaluator.withgoogle.com/">CSP Evaluator:</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/web-security/dom-based/dom-clobbering">Dom Clobbering</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://0xn3va.gitbook.io/cheat-sheets/web-application/html-injection/base">HTML Injection Cheat Sheet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.garethheyes.co.uk/">Gareth Heyes website/game</a></p><p>______</p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:10) LHE Vibes</p><p>(00:07:45) "Hunting for NGINX alias traversals in the wild"</p><p>(00:12:30) Payouts in BB programs</p><p>(00:16:05) New XSS vectors and popovers</p><p>(00:24:15) The "magical math element" in Firefox</p><p>(00:27:15) LiveOverflow on HTML parsing quirks</p><p>(00:32:10) Mr. Tux Racer, Woocommerce, and WordPress</p><p>(00:40:00) Changes in the CVSS 4 draft spec</p><p>(00:45:00) TomNomNom's new tool Jsluise</p><p>(00:51:15) JavaScript's import function &amp; "JavaScript for Hackers"</p><p>(01:09:15) Prototype pollution &amp; DOM clobbering</p><p>(01:18:10) Base tags and CSS Games</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>In this episode of Critical Thinking - Bug Bounty Podcast, we're back with Joel, fresh (haha) off of back-to-back live hack events in London and Seoul. We compare the different vibes of each LHE, then we dive into the technical thick of it, and talk web browsers, XSS vectors, new tools, CVSS 4.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/rhynorater">Rhynorater</a> &amp; <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xteknogeek">Teknogeek</a> on twitter:</p><p>______</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://labs.hakaioffsec.com/nginx-alias-traversal/">Hunting for NGINX alias traversals in the wild</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/PortSwiggerRes/status/1675851892684103680">PortSwigger Tweet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/irsdl/status/1675871336734904320">Soroush's Follow-up</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/therceman/status/1675893900274171904">Tweet about magic math element</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=HUtkW2gjC8Q">&lt;22 weird XSS behavior</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/0xLupin/status/1675894230542086144">Lupin’s follow-up</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.rcesecurity.com/2023/07/patch-diffing-cve-2023-28121-to-compromise-a-woocommerce/">Patch diffing</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/reefbr/status/1676020175949144064">Changes to CVSS 4.0</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/reefbr/status/1676020175949144064">Ask FIRSTdotORG what's going on</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/BishopFox/jsluice">Jsluise</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Operators/import">JS import() behavior</a></p><p>'<a target="_blank" rel="noopener noreferrer nofollow" href="https://leanpub.com/javascriptforhackers/">JavaScript for Hackers'</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://csp-evaluator.withgoogle.com/">CSP Evaluator:</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://portswigger.net/web-security/dom-based/dom-clobbering">Dom Clobbering</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://0xn3va.gitbook.io/cheat-sheets/web-application/html-injection/base">HTML Injection Cheat Sheet</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.garethheyes.co.uk/">Gareth Heyes website/game</a></p><p>______</p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:04:10) LHE Vibes</p><p>(00:07:45) "Hunting for NGINX alias traversals in the wild"</p><p>(00:12:30) Payouts in BB programs</p><p>(00:16:05) New XSS vectors and popovers</p><p>(00:24:15) The "magical math element" in Firefox</p><p>(00:27:15) LiveOverflow on HTML parsing quirks</p><p>(00:32:10) Mr. Tux Racer, Woocommerce, and WordPress</p><p>(00:40:00) Changes in the CVSS 4 draft spec</p><p>(00:45:00) TomNomNom's new tool Jsluise</p><p>(00:51:15) JavaScript's import function &amp; "JavaScript for Hackers"</p><p>(01:09:15) Prototype pollution &amp; DOM clobbering</p><p>(01:18:10) Base tags and CSS Games</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[In this episode of Critical Thinking - Bug Bounty Podcast, we're back with Joel, fresh (haha) off of back-to-back live hack events in London and Seoul. We compare the different vibes of each LHE, then we dive into the technical thick of it, and tal...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>26</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">7403bd9e-9d9f-40b7-a842-ea4dcc61bddb</guid>
  <title><![CDATA[Episode 25: 2xMVH & Multi-million dollar hacker Inhibitor181]]></title>
  <description><![CDATA[<p>Episode 25: In this episode of Critical Thinking - Bug Bounty Podcast we talk to Cosmin (@Inhibitor181), fresh off of winning his 2nd MVH! We chat about the time management and strategy of hacking Multi-Target LHEs, determining when to pivot, and how to find normalcy in bug bounty hunting and Live Hacking Events. We also touch on setting up Vuln Pipelines, creating mental models, and Cosmin's terrifying naming schemes. Don't miss this episode packed with both laughs and valuable insights for beginners and seasoned bug bounty hunters alike.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/inhibitor181">https://twitter.com/inhibitor181</a></p><p>Justin's weird episode with all the Dr. Suess Shit</p><p><a href="https://rss.com/podcasts/ctbbpodcast/966055/?listen-on=true">https://rss.com/podcasts/ctbbpodcast/966055/?listen-on=true</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:52) MVH club and Multi-Target stragety </p><p>(00:12:00) Deciding when to pivot</p><p>(00:17:00) File Organization and 'unique' naming approaches</p><p>(00:23:56) Staying up to date on features and updates</p><p>(00:25:46) Hacking Sleep Habits</p><p>(00:28:15) Finding 'Normal Life' in bug bounty and LHE</p><p>(00:33:30) Vuln Pipelines, Wordlists, and full time bug bounty tips</p><p>(00:44:15) Benefits of the Bug Bounty Community</p><p>(00:47:45) Relationships with target companies and programs</p><p>(00:53:15) Creating mental models</p><p>(01:00:30) The Importance of writing good reports</p><p>(01:04:30) How to choose what to hack</p>]]></description>
  <embed_id>7b69d10f-c0e5-44be-9295-708fd626db2a</embed_id>
  <pubDate>Thu, 29 Jun 2023 11:00:34 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="68721394" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/e6ca1974-55aa-4469-94c3-4c2d9962508e/episode.mp3" />
  <itunes:title><![CDATA[Episode 25: 2xMVH & Multi-million dollar hacker Inhibitor181]]></itunes:title>
  <itunes:duration>1:11:35</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 25: In this episode of Critical Thinking - Bug Bounty Podcast we talk to Cosmin (@Inhibitor181), fresh off of winning his 2nd MVH! We chat about the time management and strategy of hacking Multi-Target LHEs, determining when to pivot, and how to find normalcy in bug bounty hunting and Live Hacking Events. We also touch on setting up Vuln Pipelines, creating mental models, and Cosmin's terrifying naming schemes. Don't miss this episode packed with both laughs and valuable insights for beginners and seasoned bug bounty hunters alike.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/inhibitor181">https://twitter.com/inhibitor181</a></p><p>Justin's weird episode with all the Dr. Suess Shit</p><p><a href="https://rss.com/podcasts/ctbbpodcast/966055/?listen-on=true">https://rss.com/podcasts/ctbbpodcast/966055/?listen-on=true</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:52) MVH club and Multi-Target stragety </p><p>(00:12:00) Deciding when to pivot</p><p>(00:17:00) File Organization and 'unique' naming approaches</p><p>(00:23:56) Staying up to date on features and updates</p><p>(00:25:46) Hacking Sleep Habits</p><p>(00:28:15) Finding 'Normal Life' in bug bounty and LHE</p><p>(00:33:30) Vuln Pipelines, Wordlists, and full time bug bounty tips</p><p>(00:44:15) Benefits of the Bug Bounty Community</p><p>(00:47:45) Relationships with target companies and programs</p><p>(00:53:15) Creating mental models</p><p>(01:00:30) The Importance of writing good reports</p><p>(01:04:30) How to choose what to hack</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 25: In this episode of Critical Thinking - Bug Bounty Podcast we talk to Cosmin (@Inhibitor181), fresh off of winning his 2nd MVH! We chat about the time management and strategy of hacking Multi-Target LHEs, determining when to pivot, and how to find normalcy in bug bounty hunting and Live Hacking Events. We also touch on setting up Vuln Pipelines, creating mental models, and Cosmin's terrifying naming schemes. Don't miss this episode packed with both laughs and valuable insights for beginners and seasoned bug bounty hunters alike.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/inhibitor181">https://twitter.com/inhibitor181</a></p><p>Justin's weird episode with all the Dr. Suess Shit</p><p><a href="https://rss.com/podcasts/ctbbpodcast/966055/?listen-on=true">https://rss.com/podcasts/ctbbpodcast/966055/?listen-on=true</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:52) MVH club and Multi-Target stragety </p><p>(00:12:00) Deciding when to pivot</p><p>(00:17:00) File Organization and 'unique' naming approaches</p><p>(00:23:56) Staying up to date on features and updates</p><p>(00:25:46) Hacking Sleep Habits</p><p>(00:28:15) Finding 'Normal Life' in bug bounty and LHE</p><p>(00:33:30) Vuln Pipelines, Wordlists, and full time bug bounty tips</p><p>(00:44:15) Benefits of the Bug Bounty Community</p><p>(00:47:45) Relationships with target companies and programs</p><p>(00:53:15) Creating mental models</p><p>(01:00:30) The Importance of writing good reports</p><p>(01:04:30) How to choose what to hack</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 25: In this episode of Critical Thinking - Bug Bounty Podcast we talk to Cosmin (@Inhibitor181), fresh off of winning his 2nd MVH! We chat about the time management and strategy of hacking Multi-Target LHEs, determining when to pivot, and h...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>25</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">9754be95-ac1d-483a-8a83-258cddb5bf16</guid>
  <title><![CDATA[Episode 24: AI + Hacking with Daniel Miessler and Rez0]]></title>
  <description><![CDATA[<p>Episode 24: In this episode of Critical Thinking - Bug Bounty Podcast, we chat with Daniel Miessler and Rez0 about the emergence and potential of AI in hacking. We cover AI shortcuts and command line tools, AI in code analysis and the use of AI agents, and even brainstorm about the possible opportunities that integrating AI into hacking tools like Caido and Burp might present. Don't miss this episode packed with valuable insights and cutting-edge strategies for both beginners and seasoned bug bounty hunters alike.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guests:</p><p><a href="https://twitter.com/rez0__">https://twitter.com/rez0__</a></p><p><a href="https://twitter.com/DanielMiessler">https://twitter.com/DanielMiessler</a></p><p>Daniel Miessler’s Unsupervised Learning</p><p><a href="https://danielmiessler.com/">https://danielmiessler.com/</a></p><p>Simon Willison's Python Function Search Tool</p><p><a href="https://simonwillison.net/2023/Jun/18/symbex/">https://simonwillison.net/2023/Jun/18/symbex/</a></p><p>oobabooga - web interface for models</p><p><a href="https://github.com/oobabooga/text-generation-webui">https://github.com/oobabooga/text-generation-webui</a></p><p>State of GPT</p><p><a href="https://karpathy.ai/stateofgpt.pdf">https://karpathy.ai/stateofgpt.pdf</a> </p><p>AI Canaries</p><p><a href="https://danielmiessler.com/p/ai-agents-canaries">https://danielmiessler.com/p/ai-agents-canaries</a>  </p><p>GPT3.5</p><p><a href="https://community.openai.com/t/gpt-3-5-turbo-0613-function-calling-16k-context-window-and-lower-prices/263263">https://community.openai.com/t/gpt-3-5-turbo-0613-function-calling-16k-context-window-and-lower-prices/263263</a> </p><p>GPT Engineer</p><p><a href="https://github.com/AntonOsika/gpt-engineer">https://github.com/AntonOsika/gpt-engineer</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:40) Using AI for hacking: Developing hacking tools and workflow shortcuts</p><p>(00:11:40) GPT Engineer and Small Developer for Security Vulnerability Mapping</p><p>(00:22:40) The potential dangers of centralized vs. decentralized finance</p><p>(00:24:10) Ethical hacking and circumventing ChatGPT restrictions</p><p>(00:26:09) AI Agents, Reverse API, and Encoding/Decoding Tools</p><p>(00:31:45) Limitations of AI in context window and processing large JavaScript files</p><p>(00:36:50) Meta-prompter: Enhancing prompts for accurate responses from GPT</p><p>(00:41:00) GPT-35 and the new 616K context model</p><p>(45:08) Creating a loader for Burp Suite files or Caido instances</p><p>(00:54:02) Hacking AI Features: Best Practices</p><p>(01:00:00) AI plugin takeover and the need for verification of third-party plugins and tools</p>]]></description>
  <embed_id>f1a0fc26-b401-460a-bef2-fdd5bfd985e3</embed_id>
  <pubDate>Thu, 22 Jun 2023 11:00:29 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="61276287" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/16400d71-a64f-4fdb-875b-96c941bff3e5/episode.mp3" />
  <itunes:title><![CDATA[Episode 24: AI + Hacking with Daniel Miessler and Rez0]]></itunes:title>
  <itunes:duration>1:03:49</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 24: In this episode of Critical Thinking - Bug Bounty Podcast, we chat with Daniel Miessler and Rez0 about the emergence and potential of AI in hacking. We cover AI shortcuts and command line tools, AI in code analysis and the use of AI agents, and even brainstorm about the possible opportunities that integrating AI into hacking tools like Caido and Burp might present. Don't miss this episode packed with valuable insights and cutting-edge strategies for both beginners and seasoned bug bounty hunters alike.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guests:</p><p><a href="https://twitter.com/rez0__">https://twitter.com/rez0__</a></p><p><a href="https://twitter.com/DanielMiessler">https://twitter.com/DanielMiessler</a></p><p>Daniel Miessler’s Unsupervised Learning</p><p><a href="https://danielmiessler.com/">https://danielmiessler.com/</a></p><p>Simon Willison's Python Function Search Tool</p><p><a href="https://simonwillison.net/2023/Jun/18/symbex/">https://simonwillison.net/2023/Jun/18/symbex/</a></p><p>oobabooga - web interface for models</p><p><a href="https://github.com/oobabooga/text-generation-webui">https://github.com/oobabooga/text-generation-webui</a></p><p>State of GPT</p><p><a href="https://karpathy.ai/stateofgpt.pdf">https://karpathy.ai/stateofgpt.pdf</a> </p><p>AI Canaries</p><p><a href="https://danielmiessler.com/p/ai-agents-canaries">https://danielmiessler.com/p/ai-agents-canaries</a>  </p><p>GPT3.5</p><p><a href="https://community.openai.com/t/gpt-3-5-turbo-0613-function-calling-16k-context-window-and-lower-prices/263263">https://community.openai.com/t/gpt-3-5-turbo-0613-function-calling-16k-context-window-and-lower-prices/263263</a> </p><p>GPT Engineer</p><p><a href="https://github.com/AntonOsika/gpt-engineer">https://github.com/AntonOsika/gpt-engineer</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:40) Using AI for hacking: Developing hacking tools and workflow shortcuts</p><p>(00:11:40) GPT Engineer and Small Developer for Security Vulnerability Mapping</p><p>(00:22:40) The potential dangers of centralized vs. decentralized finance</p><p>(00:24:10) Ethical hacking and circumventing ChatGPT restrictions</p><p>(00:26:09) AI Agents, Reverse API, and Encoding/Decoding Tools</p><p>(00:31:45) Limitations of AI in context window and processing large JavaScript files</p><p>(00:36:50) Meta-prompter: Enhancing prompts for accurate responses from GPT</p><p>(00:41:00) GPT-35 and the new 616K context model</p><p>(45:08) Creating a loader for Burp Suite files or Caido instances</p><p>(00:54:02) Hacking AI Features: Best Practices</p><p>(01:00:00) AI plugin takeover and the need for verification of third-party plugins and tools</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 24: In this episode of Critical Thinking - Bug Bounty Podcast, we chat with Daniel Miessler and Rez0 about the emergence and potential of AI in hacking. We cover AI shortcuts and command line tools, AI in code analysis and the use of AI agents, and even brainstorm about the possible opportunities that integrating AI into hacking tools like Caido and Burp might present. Don't miss this episode packed with valuable insights and cutting-edge strategies for both beginners and seasoned bug bounty hunters alike.</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guests:</p><p><a href="https://twitter.com/rez0__">https://twitter.com/rez0__</a></p><p><a href="https://twitter.com/DanielMiessler">https://twitter.com/DanielMiessler</a></p><p>Daniel Miessler’s Unsupervised Learning</p><p><a href="https://danielmiessler.com/">https://danielmiessler.com/</a></p><p>Simon Willison's Python Function Search Tool</p><p><a href="https://simonwillison.net/2023/Jun/18/symbex/">https://simonwillison.net/2023/Jun/18/symbex/</a></p><p>oobabooga - web interface for models</p><p><a href="https://github.com/oobabooga/text-generation-webui">https://github.com/oobabooga/text-generation-webui</a></p><p>State of GPT</p><p><a href="https://karpathy.ai/stateofgpt.pdf">https://karpathy.ai/stateofgpt.pdf</a> </p><p>AI Canaries</p><p><a href="https://danielmiessler.com/p/ai-agents-canaries">https://danielmiessler.com/p/ai-agents-canaries</a>  </p><p>GPT3.5</p><p><a href="https://community.openai.com/t/gpt-3-5-turbo-0613-function-calling-16k-context-window-and-lower-prices/263263">https://community.openai.com/t/gpt-3-5-turbo-0613-function-calling-16k-context-window-and-lower-prices/263263</a> </p><p>GPT Engineer</p><p><a href="https://github.com/AntonOsika/gpt-engineer">https://github.com/AntonOsika/gpt-engineer</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:05:40) Using AI for hacking: Developing hacking tools and workflow shortcuts</p><p>(00:11:40) GPT Engineer and Small Developer for Security Vulnerability Mapping</p><p>(00:22:40) The potential dangers of centralized vs. decentralized finance</p><p>(00:24:10) Ethical hacking and circumventing ChatGPT restrictions</p><p>(00:26:09) AI Agents, Reverse API, and Encoding/Decoding Tools</p><p>(00:31:45) Limitations of AI in context window and processing large JavaScript files</p><p>(00:36:50) Meta-prompter: Enhancing prompts for accurate responses from GPT</p><p>(00:41:00) GPT-35 and the new 616K context model</p><p>(45:08) Creating a loader for Burp Suite files or Caido instances</p><p>(00:54:02) Hacking AI Features: Best Practices</p><p>(01:00:00) AI plugin takeover and the need for verification of third-party plugins and tools</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 24: In this episode of Critical Thinking - Bug Bounty Podcast, we chat with Daniel Miessler and Rez0 about the emergence and potential of AI in hacking. We cover AI shortcuts and command line tools, AI in code analysis and the use of AI age...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>24</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">d513c9d9-0e5b-4f5c-bfce-7d98eace33d6</guid>
  <title><![CDATA[Episode 23: Hacker Loadouts]]></title>
  <description><![CDATA[<p>Episode 23: In this episode of Critical Thinking - Bug Bounty Podcast, we delve into a different aspect of hardware - Our personal loadouts. We go through the equipment and gear we use to get our jobs done, and share stories about why we picked what we have. We also touch on live hacking events, the growing acceptance of white hat hacking, and some pretty cool news going on in the hacker world. Don't miss this episode packed with tips and strategies for both beginners and seasoned hackers alike!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Blog post on hacking root EPP servers</p><p><a href="https://hackcompute.com/hacking-epp-servers/">https://hackcompute.com/hacking-epp-servers/</a></p><p>Behind this Website:</p><p><a href="https://github.com/jonkeegan/behind-this-website">https://github.com/jonkeegan/behind-this-website</a></p><p>Tweet about vRealize Network Insight: <a href="https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/">https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/</a></p><p>Zoom's new vulnerability impact scoring system:</p><p><a href="https://viss.zoom.com/specifications">https://viss.zoom.com/specifications</a></p><p>Uplift Desks</p><p><a href="https://www.upliftdesk.com/">https://www.upliftdesk.com/</a></p><p>Synergy</p><p><a href="https://symless.com/synergy">https://symless.com/synergy</a></p><p>Ahnestly chair reviews:</p><p><a href="https://www.youtube.com/c/Ahnestly">https://www.youtube.com/c/Ahnestly</a></p><p>Our producer’s new audio drama ‘Homicide at Heavensgate’</p><p><a href="https://link.sentinelstudios.net/homicide">https://link.sentinelstudios.net/homicide</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:28) Navigating hacking events and imposter syndrome</p><p>(00:06:30) Blog post on hacking root EPP servers</p><p>(00:10:01) The growing acceptance of white-hat hacking</p><p>(00:12:25) Finding Website Owners and Contact Information</p><p>(00:16:45) VMware vRealize Network Insight CVEs and nginx reverse proxy bypass</p><p>(00:21:30) Zoom's new vulnerability impact scoring system</p><p>(00:27:24) The Importance of Analyzing Systemic Problems in Black Box Testing</p><p>(00:30:40) Documentation, Vulnerable by Design, and acceptable risk</p><p>(Start of main content)</p><p>(00:34:37) Leveling up your Hacker Setup</p><p>(00:37:13) The Importance of your body</p><p>(00:41:30) Investing in ergonomic equipment for computer work</p><p>(00:42:27) Standing Desks: Uplift Desk and DIY standing desk options</p><p>(00:46:00) Portable Tables: Flexible Workspace Solutions</p><p>(00:47:30) Monitor Setup</p><p>(00:54:40) Synergy: One keyboard and mouse across multiple devices</p><p>(00:57:20) Capture Card: Using it as a software display</p><p>(00:58:58) Keyboards and mice</p><p>(01:03:27) Using a Chromebook for lightweight hacking</p><p>(01:08:57) Chair Reviews: The Niche World of High-End Chairs</p>]]></description>
  <embed_id>97966634-7db5-4869-a374-f2975b6dedf1</embed_id>
  <pubDate>Thu, 15 Jun 2023 10:01:06 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="71591101" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/21db8440-47b5-4ca7-8fa3-c7fe1b21d260/episode.mp3" />
  <itunes:title><![CDATA[Episode 23: Hacker Loadouts]]></itunes:title>
  <itunes:duration>1:14:34</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 23: In this episode of Critical Thinking - Bug Bounty Podcast, we delve into a different aspect of hardware - Our personal loadouts. We go through the equipment and gear we use to get our jobs done, and share stories about why we picked what we have. We also touch on live hacking events, the growing acceptance of white hat hacking, and some pretty cool news going on in the hacker world. Don't miss this episode packed with tips and strategies for both beginners and seasoned hackers alike!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Blog post on hacking root EPP servers</p><p><a href="https://hackcompute.com/hacking-epp-servers/">https://hackcompute.com/hacking-epp-servers/</a></p><p>Behind this Website:</p><p><a href="https://github.com/jonkeegan/behind-this-website">https://github.com/jonkeegan/behind-this-website</a></p><p>Tweet about vRealize Network Insight: <a href="https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/">https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/</a></p><p>Zoom's new vulnerability impact scoring system:</p><p><a href="https://viss.zoom.com/specifications">https://viss.zoom.com/specifications</a></p><p>Uplift Desks</p><p><a href="https://www.upliftdesk.com/">https://www.upliftdesk.com/</a></p><p>Synergy</p><p><a href="https://symless.com/synergy">https://symless.com/synergy</a></p><p>Ahnestly chair reviews:</p><p><a href="https://www.youtube.com/c/Ahnestly">https://www.youtube.com/c/Ahnestly</a></p><p>Our producer’s new audio drama ‘Homicide at Heavensgate’</p><p><a href="https://link.sentinelstudios.net/homicide">https://link.sentinelstudios.net/homicide</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:28) Navigating hacking events and imposter syndrome</p><p>(00:06:30) Blog post on hacking root EPP servers</p><p>(00:10:01) The growing acceptance of white-hat hacking</p><p>(00:12:25) Finding Website Owners and Contact Information</p><p>(00:16:45) VMware vRealize Network Insight CVEs and nginx reverse proxy bypass</p><p>(00:21:30) Zoom's new vulnerability impact scoring system</p><p>(00:27:24) The Importance of Analyzing Systemic Problems in Black Box Testing</p><p>(00:30:40) Documentation, Vulnerable by Design, and acceptable risk</p><p>(Start of main content)</p><p>(00:34:37) Leveling up your Hacker Setup</p><p>(00:37:13) The Importance of your body</p><p>(00:41:30) Investing in ergonomic equipment for computer work</p><p>(00:42:27) Standing Desks: Uplift Desk and DIY standing desk options</p><p>(00:46:00) Portable Tables: Flexible Workspace Solutions</p><p>(00:47:30) Monitor Setup</p><p>(00:54:40) Synergy: One keyboard and mouse across multiple devices</p><p>(00:57:20) Capture Card: Using it as a software display</p><p>(00:58:58) Keyboards and mice</p><p>(01:03:27) Using a Chromebook for lightweight hacking</p><p>(01:08:57) Chair Reviews: The Niche World of High-End Chairs</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 23: In this episode of Critical Thinking - Bug Bounty Podcast, we delve into a different aspect of hardware - Our personal loadouts. We go through the equipment and gear we use to get our jobs done, and share stories about why we picked what we have. We also touch on live hacking events, the growing acceptance of white hat hacking, and some pretty cool news going on in the hacker world. Don't miss this episode packed with tips and strategies for both beginners and seasoned hackers alike!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Blog post on hacking root EPP servers</p><p><a href="https://hackcompute.com/hacking-epp-servers/">https://hackcompute.com/hacking-epp-servers/</a></p><p>Behind this Website:</p><p><a href="https://github.com/jonkeegan/behind-this-website">https://github.com/jonkeegan/behind-this-website</a></p><p>Tweet about vRealize Network Insight: <a href="https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/">https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/</a></p><p>Zoom's new vulnerability impact scoring system:</p><p><a href="https://viss.zoom.com/specifications">https://viss.zoom.com/specifications</a></p><p>Uplift Desks</p><p><a href="https://www.upliftdesk.com/">https://www.upliftdesk.com/</a></p><p>Synergy</p><p><a href="https://symless.com/synergy">https://symless.com/synergy</a></p><p>Ahnestly chair reviews:</p><p><a href="https://www.youtube.com/c/Ahnestly">https://www.youtube.com/c/Ahnestly</a></p><p>Our producer’s new audio drama ‘Homicide at Heavensgate’</p><p><a href="https://link.sentinelstudios.net/homicide">https://link.sentinelstudios.net/homicide</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:28) Navigating hacking events and imposter syndrome</p><p>(00:06:30) Blog post on hacking root EPP servers</p><p>(00:10:01) The growing acceptance of white-hat hacking</p><p>(00:12:25) Finding Website Owners and Contact Information</p><p>(00:16:45) VMware vRealize Network Insight CVEs and nginx reverse proxy bypass</p><p>(00:21:30) Zoom's new vulnerability impact scoring system</p><p>(00:27:24) The Importance of Analyzing Systemic Problems in Black Box Testing</p><p>(00:30:40) Documentation, Vulnerable by Design, and acceptable risk</p><p>(Start of main content)</p><p>(00:34:37) Leveling up your Hacker Setup</p><p>(00:37:13) The Importance of your body</p><p>(00:41:30) Investing in ergonomic equipment for computer work</p><p>(00:42:27) Standing Desks: Uplift Desk and DIY standing desk options</p><p>(00:46:00) Portable Tables: Flexible Workspace Solutions</p><p>(00:47:30) Monitor Setup</p><p>(00:54:40) Synergy: One keyboard and mouse across multiple devices</p><p>(00:57:20) Capture Card: Using it as a software display</p><p>(00:58:58) Keyboards and mice</p><p>(01:03:27) Using a Chromebook for lightweight hacking</p><p>(01:08:57) Chair Reviews: The Niche World of High-End Chairs</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 23: In this episode of Critical Thinking - Bug Bounty Podcast, we delve into a different aspect of hardware - Our personal loadouts. We go through the equipment and gear we use to get our jobs done, and share stories about why we picked wha...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>23</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">ad6d2ca0-3221-4d60-8cd0-a920bc80e34d</guid>
  <title><![CDATA[Episode 22: Chipping Away at Hardware Hacking]]></title>
  <description><![CDATA[<p>Episode 22: In this episode of Critical Thinking - Bug Bounty Podcast we talk about some basic/intermediate concepts related to Hardware Hacking. Specifically, we dive into extracting data from eMMC chips in order to get our hands on source code for IoT devices. Don't miss this episode packed with valuable insights, tips, and strategies for beginners and seasoned bug bounty hunters alike!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Checkout NahamCon:</p><p><a href="https://bit.ly/42vnpMS">https://bit.ly/42vnpMS</a></p><p>RiverLoop Security Write-up: <a href="https://bit.ly/3oSKL1o">https://bit.ly/3oSKL1o</a></p><p>Good Chip-Off Write-up:</p><p><a href="https://bit.ly/3IWym3q">https://bit.ly/3IWym3q</a></p><p>Scratching chips to expose pins:</p><p><a href="https://bit.ly/45Tj21i">https://bit.ly/45Tj21i</a></p><p><a href="https://bit.ly/3oJJt8Z">https://bit.ly/3oJJt8Z</a></p><p>Chat with Corben on Degrees: <a href="https://youtu.be/N9P5PUx-PNQ?t=2311">https://youtu.be/N9P5PUx-PNQ?t=2311</a></p><p>Gareth Hayes Tweet:</p><p><a href="https://bit.ly/3qvFNYW">https://bit.ly/3qvFNYW</a></p><p>Huntress - John Hammond - MoveIt Response:</p><p><a href="https://bit.ly/42vTTXv">https://bit.ly/42vTTXv</a></p><p>Critical Thinking Hardware Hacking Setup - See the gear we're talking about (Affiliate links): <a href="https://linke.to/hardwarehackingset">https://linke.to/hardwarehackingset</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(01:03) NahamCon's Live Hacking Event and Justin's Presentation on PCI DSS</p><p>(02:40) Depreciation of Data URLs in SVG Use Element</p><p>(04:55) Gareth Hayes and knowledge sharing in the hacking community</p><p>(07:50) Move It vulnerability and and John Hammond’s epic 4 am rants</p><p>(12:18) Identifying promising leads in bug bounty hunting, and knowing when to move on</p><p>(Start of main content)</p><p>(21:40) Hardware Recon, and using Test Pins to Access EMMC Chip</p><p>(26:16) Identifying Chip Pinouts and Continuity Testing</p><p>(29:01) Using Logic Analyzers for Hardware Hacking</p><p>(33:01) Importance of Fundamental Knowledge in Hacking, and the benefits of understanding Electrical Engineering</p><p>(35:46) Replay Protected Memory Block Protocol</p><p>(40:00) Bug Bounty Programs and Hardware Testing Support</p><p>(41:05) Chip Pulling techniques and Essential Equipment for Hardware Hacking</p><p>(59:50) Tips for Buying Hardware Hacking Tools: Research and Specific Use Cases</p><p>(01:06:35) Hardware Hacking: Just scratching the surface.</p><p>(01:08:45) Vulnerability Disclaimer: Pulling OS from a chip does not constitute a Vulnerability.</p>]]></description>
  <embed_id>63c5dbe1-f081-4756-9f3f-b5dce994acfa</embed_id>
  <pubDate>Thu, 08 Jun 2023 11:01:13 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="68930791" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/6a5d1bf5-74d1-4714-8da4-32cadb628017/episode.mp3" />
  <itunes:title><![CDATA[Episode 22: Chipping Away at Hardware Hacking]]></itunes:title>
  <itunes:duration>1:11:48</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 22: In this episode of Critical Thinking - Bug Bounty Podcast we talk about some basic/intermediate concepts related to Hardware Hacking. Specifically, we dive into extracting data from eMMC chips in order to get our hands on source code for IoT devices. Don't miss this episode packed with valuable insights, tips, and strategies for beginners and seasoned bug bounty hunters alike!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Checkout NahamCon:</p><p><a href="https://bit.ly/42vnpMS">https://bit.ly/42vnpMS</a></p><p>RiverLoop Security Write-up: <a href="https://bit.ly/3oSKL1o">https://bit.ly/3oSKL1o</a></p><p>Good Chip-Off Write-up:</p><p><a href="https://bit.ly/3IWym3q">https://bit.ly/3IWym3q</a></p><p>Scratching chips to expose pins:</p><p><a href="https://bit.ly/45Tj21i">https://bit.ly/45Tj21i</a></p><p><a href="https://bit.ly/3oJJt8Z">https://bit.ly/3oJJt8Z</a></p><p>Chat with Corben on Degrees: <a href="https://youtu.be/N9P5PUx-PNQ?t=2311">https://youtu.be/N9P5PUx-PNQ?t=2311</a></p><p>Gareth Hayes Tweet:</p><p><a href="https://bit.ly/3qvFNYW">https://bit.ly/3qvFNYW</a></p><p>Huntress - John Hammond - MoveIt Response:</p><p><a href="https://bit.ly/42vTTXv">https://bit.ly/42vTTXv</a></p><p>Critical Thinking Hardware Hacking Setup - See the gear we're talking about (Affiliate links): <a href="https://linke.to/hardwarehackingset">https://linke.to/hardwarehackingset</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(01:03) NahamCon's Live Hacking Event and Justin's Presentation on PCI DSS</p><p>(02:40) Depreciation of Data URLs in SVG Use Element</p><p>(04:55) Gareth Hayes and knowledge sharing in the hacking community</p><p>(07:50) Move It vulnerability and and John Hammond’s epic 4 am rants</p><p>(12:18) Identifying promising leads in bug bounty hunting, and knowing when to move on</p><p>(Start of main content)</p><p>(21:40) Hardware Recon, and using Test Pins to Access EMMC Chip</p><p>(26:16) Identifying Chip Pinouts and Continuity Testing</p><p>(29:01) Using Logic Analyzers for Hardware Hacking</p><p>(33:01) Importance of Fundamental Knowledge in Hacking, and the benefits of understanding Electrical Engineering</p><p>(35:46) Replay Protected Memory Block Protocol</p><p>(40:00) Bug Bounty Programs and Hardware Testing Support</p><p>(41:05) Chip Pulling techniques and Essential Equipment for Hardware Hacking</p><p>(59:50) Tips for Buying Hardware Hacking Tools: Research and Specific Use Cases</p><p>(01:06:35) Hardware Hacking: Just scratching the surface.</p><p>(01:08:45) Vulnerability Disclaimer: Pulling OS from a chip does not constitute a Vulnerability.</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 22: In this episode of Critical Thinking - Bug Bounty Podcast we talk about some basic/intermediate concepts related to Hardware Hacking. Specifically, we dive into extracting data from eMMC chips in order to get our hands on source code for IoT devices. Don't miss this episode packed with valuable insights, tips, and strategies for beginners and seasoned bug bounty hunters alike!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Checkout NahamCon:</p><p><a href="https://bit.ly/42vnpMS">https://bit.ly/42vnpMS</a></p><p>RiverLoop Security Write-up: <a href="https://bit.ly/3oSKL1o">https://bit.ly/3oSKL1o</a></p><p>Good Chip-Off Write-up:</p><p><a href="https://bit.ly/3IWym3q">https://bit.ly/3IWym3q</a></p><p>Scratching chips to expose pins:</p><p><a href="https://bit.ly/45Tj21i">https://bit.ly/45Tj21i</a></p><p><a href="https://bit.ly/3oJJt8Z">https://bit.ly/3oJJt8Z</a></p><p>Chat with Corben on Degrees: <a href="https://youtu.be/N9P5PUx-PNQ?t=2311">https://youtu.be/N9P5PUx-PNQ?t=2311</a></p><p>Gareth Hayes Tweet:</p><p><a href="https://bit.ly/3qvFNYW">https://bit.ly/3qvFNYW</a></p><p>Huntress - John Hammond - MoveIt Response:</p><p><a href="https://bit.ly/42vTTXv">https://bit.ly/42vTTXv</a></p><p>Critical Thinking Hardware Hacking Setup - See the gear we're talking about (Affiliate links): <a href="https://linke.to/hardwarehackingset">https://linke.to/hardwarehackingset</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(01:03) NahamCon's Live Hacking Event and Justin's Presentation on PCI DSS</p><p>(02:40) Depreciation of Data URLs in SVG Use Element</p><p>(04:55) Gareth Hayes and knowledge sharing in the hacking community</p><p>(07:50) Move It vulnerability and and John Hammond’s epic 4 am rants</p><p>(12:18) Identifying promising leads in bug bounty hunting, and knowing when to move on</p><p>(Start of main content)</p><p>(21:40) Hardware Recon, and using Test Pins to Access EMMC Chip</p><p>(26:16) Identifying Chip Pinouts and Continuity Testing</p><p>(29:01) Using Logic Analyzers for Hardware Hacking</p><p>(33:01) Importance of Fundamental Knowledge in Hacking, and the benefits of understanding Electrical Engineering</p><p>(35:46) Replay Protected Memory Block Protocol</p><p>(40:00) Bug Bounty Programs and Hardware Testing Support</p><p>(41:05) Chip Pulling techniques and Essential Equipment for Hardware Hacking</p><p>(59:50) Tips for Buying Hardware Hacking Tools: Research and Specific Use Cases</p><p>(01:06:35) Hardware Hacking: Just scratching the surface.</p><p>(01:08:45) Vulnerability Disclaimer: Pulling OS from a chip does not constitute a Vulnerability.</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 22: In this episode of Critical Thinking - Bug Bounty Podcast we talk about some basic/intermediate concepts related to Hardware Hacking. Specifically, we dive into extracting data from eMMC chips in order to get our hands on source code fo...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>22</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">85d1028c-1e70-45fe-83a2-d36a497a14cd</guid>
  <title><![CDATA[Episode 21: Chill Chat with Legendary DoD Hacker Corben Leo]]></title>
  <description><![CDATA[<p>In this episode of Critical Thinking - Bug Bounty Podcast, we chat with Corben Leo about his journey in bug bounty hunting and ethical hacking. We discuss the state of DNS rebinding in 2023, a Twitter thread by Douglas Day (@ArchAngelDDay) on one-hundred bug bounty rules, and our own unique approaches to bug hunting. We also discuss Corben's recon-focused bug hunting methodology and how he developed it. Don't miss this episode filled with valuable tips, insights, and Corben's Boring Mattress Company.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Get on our newsletter for some exclusive content: <a href="https://www.criticalthinkingpodcast.io/subscribe">https://www.criticalthinkingpodcast.io/subscribe</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p></p><p>------ Links ------</p><p></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/hacker_">https://twitter.com/hacker_</a></p><p>Article on the State of DNS Rebinding in 2023:</p><p><a href="https://research.nccgroup.com/2023/04/27/state-of-dns-rebinding-in-2023/">https://research.nccgroup.com/2023/04/27/state-of-dns-rebinding-in-2023/</a></p><p>See @ArchAngelDDay's twitter thread about 100 bug bounty rules:</p><p><a href="https://twitter.com/ArchAngelDDay/status/1661924038875435008">https://twitter.com/ArchAngelDDay/status/1661924038875435008</a></p><p>Talkback - Cybersecurity news aggregator:</p><p><a href="https://talkback.sh/">https://talkback.sh/</a></p><p>PyPI announces mandatory 2FA:</p><p><a href="https://www.bleepingcomputer.com/news/security/pypi-announces-mandatory-use-of-2fa-for-all-software-publishers/">https://www.bleepingcomputer.com/news/security/pypi-announces-mandatory-use-of-2fa-for-all-software-publishers/</a></p><p></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(01:05) State of DNS rebinding in 2023</p><p>(04:40) 100 Bug Bounty Rules by @ArchAngelDDay</p><p>(05:30) Give yourself a ‘no bug’ limit</p><p>(07:00) The value of reporting Low and Medium Bugs for Bug Bounty Programs</p><p>(11:15) Reporting Out of Scope Bugs</p><p>(14:30) Reporting IDORs as Access Control Bugs</p><p>(17:28) Talkback</p><p>(18:12) PyPI's mandatory 2FA implementation for software publishers</p><p>(Start of main content)</p><p>(20:07) Starting out in bug bounty/ethical hacking</p><p>(25:00) Hacking methodology and mentorship</p><p>(28:15) Identifying Load Balancers</p><p>(33:20) Triage and live events:</p><p>(38:30) College and Computer Science vs. Cybersecurity</p><p>(45:45) Importance of writing for the Hacker Community</p><p>(51:21) Storytelling and report writing.</p><p>(55:00) When to stop doing recon and start hacking</p><p>(01:00:58) Lessons Learned from BreachlessAI and the pivot to Boring Mattress Co.</p>]]></description>
  <embed_id>a88c031f-c5e2-40ba-8c05-41adf38e5425</embed_id>
  <pubDate>Thu, 01 Jun 2023 10:01:24 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="70880579" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/bb34cda3-da86-4cfc-b657-136137590501/episode.mp3" />
  <itunes:title><![CDATA[Episode 21: Chill Chat with Legendary DoD Hacker Corben Leo]]></itunes:title>
  <itunes:duration>1:13:50</itunes:duration>
  <itunes:summary><![CDATA[<p>In this episode of Critical Thinking - Bug Bounty Podcast, we chat with Corben Leo about his journey in bug bounty hunting and ethical hacking. We discuss the state of DNS rebinding in 2023, a Twitter thread by Douglas Day (@ArchAngelDDay) on one-hundred bug bounty rules, and our own unique approaches to bug hunting. We also discuss Corben's recon-focused bug hunting methodology and how he developed it. Don't miss this episode filled with valuable tips, insights, and Corben's Boring Mattress Company.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Get on our newsletter for some exclusive content: <a href="https://www.criticalthinkingpodcast.io/subscribe">https://www.criticalthinkingpodcast.io/subscribe</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p></p><p>------ Links ------</p><p></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/hacker_">https://twitter.com/hacker_</a></p><p>Article on the State of DNS Rebinding in 2023:</p><p><a href="https://research.nccgroup.com/2023/04/27/state-of-dns-rebinding-in-2023/">https://research.nccgroup.com/2023/04/27/state-of-dns-rebinding-in-2023/</a></p><p>See @ArchAngelDDay's twitter thread about 100 bug bounty rules:</p><p><a href="https://twitter.com/ArchAngelDDay/status/1661924038875435008">https://twitter.com/ArchAngelDDay/status/1661924038875435008</a></p><p>Talkback - Cybersecurity news aggregator:</p><p><a href="https://talkback.sh/">https://talkback.sh/</a></p><p>PyPI announces mandatory 2FA:</p><p><a href="https://www.bleepingcomputer.com/news/security/pypi-announces-mandatory-use-of-2fa-for-all-software-publishers/">https://www.bleepingcomputer.com/news/security/pypi-announces-mandatory-use-of-2fa-for-all-software-publishers/</a></p><p></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(01:05) State of DNS rebinding in 2023</p><p>(04:40) 100 Bug Bounty Rules by @ArchAngelDDay</p><p>(05:30) Give yourself a ‘no bug’ limit</p><p>(07:00) The value of reporting Low and Medium Bugs for Bug Bounty Programs</p><p>(11:15) Reporting Out of Scope Bugs</p><p>(14:30) Reporting IDORs as Access Control Bugs</p><p>(17:28) Talkback</p><p>(18:12) PyPI's mandatory 2FA implementation for software publishers</p><p>(Start of main content)</p><p>(20:07) Starting out in bug bounty/ethical hacking</p><p>(25:00) Hacking methodology and mentorship</p><p>(28:15) Identifying Load Balancers</p><p>(33:20) Triage and live events:</p><p>(38:30) College and Computer Science vs. Cybersecurity</p><p>(45:45) Importance of writing for the Hacker Community</p><p>(51:21) Storytelling and report writing.</p><p>(55:00) When to stop doing recon and start hacking</p><p>(01:00:58) Lessons Learned from BreachlessAI and the pivot to Boring Mattress Co.</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>In this episode of Critical Thinking - Bug Bounty Podcast, we chat with Corben Leo about his journey in bug bounty hunting and ethical hacking. We discuss the state of DNS rebinding in 2023, a Twitter thread by Douglas Day (@ArchAngelDDay) on one-hundred bug bounty rules, and our own unique approaches to bug hunting. We also discuss Corben's recon-focused bug hunting methodology and how he developed it. Don't miss this episode filled with valuable tips, insights, and Corben's Boring Mattress Company.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>Get on our newsletter for some exclusive content: <a href="https://www.criticalthinkingpodcast.io/subscribe">https://www.criticalthinkingpodcast.io/subscribe</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p></p><p>------ Links ------</p><p></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Today’s Guest:</p><p><a href="https://twitter.com/hacker_">https://twitter.com/hacker_</a></p><p>Article on the State of DNS Rebinding in 2023:</p><p><a href="https://research.nccgroup.com/2023/04/27/state-of-dns-rebinding-in-2023/">https://research.nccgroup.com/2023/04/27/state-of-dns-rebinding-in-2023/</a></p><p>See @ArchAngelDDay's twitter thread about 100 bug bounty rules:</p><p><a href="https://twitter.com/ArchAngelDDay/status/1661924038875435008">https://twitter.com/ArchAngelDDay/status/1661924038875435008</a></p><p>Talkback - Cybersecurity news aggregator:</p><p><a href="https://talkback.sh/">https://talkback.sh/</a></p><p>PyPI announces mandatory 2FA:</p><p><a href="https://www.bleepingcomputer.com/news/security/pypi-announces-mandatory-use-of-2fa-for-all-software-publishers/">https://www.bleepingcomputer.com/news/security/pypi-announces-mandatory-use-of-2fa-for-all-software-publishers/</a></p><p></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(01:05) State of DNS rebinding in 2023</p><p>(04:40) 100 Bug Bounty Rules by @ArchAngelDDay</p><p>(05:30) Give yourself a ‘no bug’ limit</p><p>(07:00) The value of reporting Low and Medium Bugs for Bug Bounty Programs</p><p>(11:15) Reporting Out of Scope Bugs</p><p>(14:30) Reporting IDORs as Access Control Bugs</p><p>(17:28) Talkback</p><p>(18:12) PyPI's mandatory 2FA implementation for software publishers</p><p>(Start of main content)</p><p>(20:07) Starting out in bug bounty/ethical hacking</p><p>(25:00) Hacking methodology and mentorship</p><p>(28:15) Identifying Load Balancers</p><p>(33:20) Triage and live events:</p><p>(38:30) College and Computer Science vs. Cybersecurity</p><p>(45:45) Importance of writing for the Hacker Community</p><p>(51:21) Storytelling and report writing.</p><p>(55:00) When to stop doing recon and start hacking</p><p>(01:00:58) Lessons Learned from BreachlessAI and the pivot to Boring Mattress Co.</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[In this episode of Critical Thinking - Bug Bounty Podcast, we chat with Corben Leo about his journey in bug bounty hunting and ethical hacking. We discuss the state of DNS rebinding in 2023, a Twitter thread by Douglas Day (@ArchAngelDDay) on one-h...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>21</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">7949fd17-b097-4588-bf8b-8b368ea12549</guid>
  <title><![CDATA[Episode 20: Hacker Brain Hacks - Overcoming Bug Bounty's Mental Tolls]]></title>
  <description><![CDATA[<p>Episode 20: In this episode of Critical Thinking - Bug Bounty Podcast, we dive into the world of "hacker brain hacks'' and overcoming challenges in bug bounty hunting. We discuss custom word lists, the rising popularity of Caido as a potential Burp Suite replacement, and Cloudflared tunnels for hosting POCs. We also tackle the mental aspects of bug bounty hunting, from procrastination to imposter syndrome, and share tips for staying motivated and avoiding burnout. Don't miss this episode packed with valuable insights and advice for both beginners and seasoned bug bounty hunters!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Caido:</p><p><a href="https://caido.io">https://caido.io</a></p><p>Tweet from D3mondev on Sequence Diagram:</p><p><a href="https://twitter.com/d3mondev/status/1660803152755453952">https://twitter.com/d3mondev/status/1660803152755453952</a></p><p>Sequence diagram software:</p><p><a href="https://sequencediagram.org">https://sequencediagram.org</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:36) "Sequence Diagram": Sequence mapping for PoCs</p><p>(00:04:10) "SubReconGPT": AI and GPT in Bug Bounty Hacking</p><p>(00:08:30) "Caido": A Potential Replacement for Burp Suite</p><p>(00:11:34) HackerOne's New Features</p><p>(00:13:00) Cloudflared Tunnels for Red Team Assessments and Payload Hosting</p><p>(00:16:07) Mental challenges in Bug Bounty Hunting</p><p>(00:17:50) Procrastination Education: Letting fear of failure drive you into always learning, never doing.</p><p>(00:22:46) Analysis Paralysis: Starting with Bug Bounty Programs vs VDPs</p><p>(00:27:07) Automation Obsession: "When you're hacking, hack. When you're automating, automate."</p><p>(00:14:34) Imposter Syndrome: You may not be the best, but you're not the worst either.</p><p>(00:31:55) Motivation Deprivation: Stay curious, and set tiered goals</p><p>(00:36:07) Automation Obsession pt2: Do we need to say it again?</p><p>(00:37:25) Reconnaissance Cognizance: Spending too much time on recon and not enough time on hacking</p><p>(00:40:00) Bad Rabbit Holes, RIP Your Goals: Identifying good and bad rabbit holes</p><p>(00:46:01) Set Your Goal Poles: Setting specific goals for yourself.</p><p>(00:48:29) Impact Lacked: Fixating on something that's funky, but simply doesn’t really have impact</p><p>(00:51:00) The Burn-out turn-out: Mending, maintenance, and finding identity and self-worth outside hacking</p><p>(00:58:19) Responsibility Volatility: Balancing Responsibilities and Freedom as a Bug Bounty Hunter</p><p>(01:00:30) Payout Phase-out: Don't stop once you've found one bug.</p><p>(01:02:04) Report on URN Injection</p>]]></description>
  <embed_id>5f192373-d51a-4e12-8d98-d230193a29ec</embed_id>
  <pubDate>Thu, 25 May 2023 09:00:55 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="63840897" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/5591ab25-acd9-48c7-8287-9dea1eda275d/episode.mp3" />
  <itunes:title><![CDATA[Episode 20: Hacker Brain Hacks - Overcoming Bug Bounty's Mental Tolls]]></itunes:title>
  <itunes:duration>1:06:30</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 20: In this episode of Critical Thinking - Bug Bounty Podcast, we dive into the world of "hacker brain hacks'' and overcoming challenges in bug bounty hunting. We discuss custom word lists, the rising popularity of Caido as a potential Burp Suite replacement, and Cloudflared tunnels for hosting POCs. We also tackle the mental aspects of bug bounty hunting, from procrastination to imposter syndrome, and share tips for staying motivated and avoiding burnout. Don't miss this episode packed with valuable insights and advice for both beginners and seasoned bug bounty hunters!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Caido:</p><p><a href="https://caido.io">https://caido.io</a></p><p>Tweet from D3mondev on Sequence Diagram:</p><p><a href="https://twitter.com/d3mondev/status/1660803152755453952">https://twitter.com/d3mondev/status/1660803152755453952</a></p><p>Sequence diagram software:</p><p><a href="https://sequencediagram.org">https://sequencediagram.org</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:36) "Sequence Diagram": Sequence mapping for PoCs</p><p>(00:04:10) "SubReconGPT": AI and GPT in Bug Bounty Hacking</p><p>(00:08:30) "Caido": A Potential Replacement for Burp Suite</p><p>(00:11:34) HackerOne's New Features</p><p>(00:13:00) Cloudflared Tunnels for Red Team Assessments and Payload Hosting</p><p>(00:16:07) Mental challenges in Bug Bounty Hunting</p><p>(00:17:50) Procrastination Education: Letting fear of failure drive you into always learning, never doing.</p><p>(00:22:46) Analysis Paralysis: Starting with Bug Bounty Programs vs VDPs</p><p>(00:27:07) Automation Obsession: "When you're hacking, hack. When you're automating, automate."</p><p>(00:14:34) Imposter Syndrome: You may not be the best, but you're not the worst either.</p><p>(00:31:55) Motivation Deprivation: Stay curious, and set tiered goals</p><p>(00:36:07) Automation Obsession pt2: Do we need to say it again?</p><p>(00:37:25) Reconnaissance Cognizance: Spending too much time on recon and not enough time on hacking</p><p>(00:40:00) Bad Rabbit Holes, RIP Your Goals: Identifying good and bad rabbit holes</p><p>(00:46:01) Set Your Goal Poles: Setting specific goals for yourself.</p><p>(00:48:29) Impact Lacked: Fixating on something that's funky, but simply doesn’t really have impact</p><p>(00:51:00) The Burn-out turn-out: Mending, maintenance, and finding identity and self-worth outside hacking</p><p>(00:58:19) Responsibility Volatility: Balancing Responsibilities and Freedom as a Bug Bounty Hunter</p><p>(01:00:30) Payout Phase-out: Don't stop once you've found one bug.</p><p>(01:02:04) Report on URN Injection</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 20: In this episode of Critical Thinking - Bug Bounty Podcast, we dive into the world of "hacker brain hacks'' and overcoming challenges in bug bounty hunting. We discuss custom word lists, the rising popularity of Caido as a potential Burp Suite replacement, and Cloudflared tunnels for hosting POCs. We also tackle the mental aspects of bug bounty hunting, from procrastination to imposter syndrome, and share tips for staying motivated and avoiding burnout. Don't miss this episode packed with valuable insights and advice for both beginners and seasoned bug bounty hunters!</p><p>Follow us on twitter at: @ctbbpodcast</p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Caido:</p><p><a href="https://caido.io">https://caido.io</a></p><p>Tweet from D3mondev on Sequence Diagram:</p><p><a href="https://twitter.com/d3mondev/status/1660803152755453952">https://twitter.com/d3mondev/status/1660803152755453952</a></p><p>Sequence diagram software:</p><p><a href="https://sequencediagram.org">https://sequencediagram.org</a></p><p>Timestamps:</p><p>(00:00:00) Introduction</p><p>(00:02:36) "Sequence Diagram": Sequence mapping for PoCs</p><p>(00:04:10) "SubReconGPT": AI and GPT in Bug Bounty Hacking</p><p>(00:08:30) "Caido": A Potential Replacement for Burp Suite</p><p>(00:11:34) HackerOne's New Features</p><p>(00:13:00) Cloudflared Tunnels for Red Team Assessments and Payload Hosting</p><p>(00:16:07) Mental challenges in Bug Bounty Hunting</p><p>(00:17:50) Procrastination Education: Letting fear of failure drive you into always learning, never doing.</p><p>(00:22:46) Analysis Paralysis: Starting with Bug Bounty Programs vs VDPs</p><p>(00:27:07) Automation Obsession: "When you're hacking, hack. When you're automating, automate."</p><p>(00:14:34) Imposter Syndrome: You may not be the best, but you're not the worst either.</p><p>(00:31:55) Motivation Deprivation: Stay curious, and set tiered goals</p><p>(00:36:07) Automation Obsession pt2: Do we need to say it again?</p><p>(00:37:25) Reconnaissance Cognizance: Spending too much time on recon and not enough time on hacking</p><p>(00:40:00) Bad Rabbit Holes, RIP Your Goals: Identifying good and bad rabbit holes</p><p>(00:46:01) Set Your Goal Poles: Setting specific goals for yourself.</p><p>(00:48:29) Impact Lacked: Fixating on something that's funky, but simply doesn’t really have impact</p><p>(00:51:00) The Burn-out turn-out: Mending, maintenance, and finding identity and self-worth outside hacking</p><p>(00:58:19) Responsibility Volatility: Balancing Responsibilities and Freedom as a Bug Bounty Hunter</p><p>(01:00:30) Payout Phase-out: Don't stop once you've found one bug.</p><p>(01:02:04) Report on URN Injection</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 20: In this episode of Critical Thinking - Bug Bounty Podcast, we dive into the world of "hacker brain hacks'' and overcoming challenges in bug bounty hunting. We discuss custom word lists, the rising popularity of Caido as a potential Burp...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>20</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">a212872d-332c-4b99-8c4e-0f75f6ea1419</guid>
  <title><![CDATA[Episode 19: Audit Code, Earn Bounties (Part 2) + Zip-Snip, Sitecore, and more!]]></title>
  <description><![CDATA[<p>Episode 19: In this episode of Critical Thinking - Bug Bounty Podcast we further discuss some tips and tricks for finding vulns once you’ve got source code and some banger tweets/tools that popped up in our feed this week. </p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Part 1:</p><p><a href="https://open.spotify.com/episode/2pdTaWHSzl9CY7PgRQtvTi">https://open.spotify.com/episode/2pdTaWHSzl9CY7PgRQtvTi</a></p><p>Noperator’s Zip-Snip: <a href="https://twitter.com/noperator/status/1658313637189111808">https://twitter.com/noperator/status/1658313637189111808</a></p><p><a href="https://github.com/noperator/zip-snip">https://github.com/noperator/zip-snip</a></p><p><a href="https://noperator.dev/posts/zip-snip/">https://noperator.dev/posts/zip-snip/</a></p><p>Insecure’s SIP Bugs: <a href="https://twitter.com/ifsecure/status/1656591469518495745">https://twitter.com/ifsecure/status/1656591469518495745</a> </p><p>AssetNote’s Sitecore Bugs: <a href="https://blog.assetnote.io/2023/05/10/sitecore-round-two/">https://blog.assetnote.io/2023/05/10/sitecore-round-two/</a> </p><p>Fyooer’s Shadow Clone: <a href="https://github.com/fyoorer/ShadowClone">https://github.com/fyoorer/ShadowClone</a></p>]]></description>
  <embed_id>945809f5-b83e-4998-b45d-97f793c1985c</embed_id>
  <pubDate>Thu, 18 May 2023 10:00:54 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="51271261" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/2dc95e33-c332-48ac-96df-20b1ffeadc4d/episode.mp3" />
  <itunes:title><![CDATA[Episode 19: Audit Code, Earn Bounties (Part 2) + Zip-Snip, Sitecore, and more!]]></itunes:title>
  <itunes:duration>53:24</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 19: In this episode of Critical Thinking - Bug Bounty Podcast we further discuss some tips and tricks for finding vulns once you’ve got source code and some banger tweets/tools that popped up in our feed this week. </p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Part 1:</p><p><a href="https://open.spotify.com/episode/2pdTaWHSzl9CY7PgRQtvTi">https://open.spotify.com/episode/2pdTaWHSzl9CY7PgRQtvTi</a></p><p>Noperator’s Zip-Snip: <a href="https://twitter.com/noperator/status/1658313637189111808">https://twitter.com/noperator/status/1658313637189111808</a></p><p><a href="https://github.com/noperator/zip-snip">https://github.com/noperator/zip-snip</a></p><p><a href="https://noperator.dev/posts/zip-snip/">https://noperator.dev/posts/zip-snip/</a></p><p>Insecure’s SIP Bugs: <a href="https://twitter.com/ifsecure/status/1656591469518495745">https://twitter.com/ifsecure/status/1656591469518495745</a> </p><p>AssetNote’s Sitecore Bugs: <a href="https://blog.assetnote.io/2023/05/10/sitecore-round-two/">https://blog.assetnote.io/2023/05/10/sitecore-round-two/</a> </p><p>Fyooer’s Shadow Clone: <a href="https://github.com/fyoorer/ShadowClone">https://github.com/fyoorer/ShadowClone</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 19: In this episode of Critical Thinking - Bug Bounty Podcast we further discuss some tips and tricks for finding vulns once you’ve got source code and some banger tweets/tools that popped up in our feed this week. </p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Part 1:</p><p><a href="https://open.spotify.com/episode/2pdTaWHSzl9CY7PgRQtvTi">https://open.spotify.com/episode/2pdTaWHSzl9CY7PgRQtvTi</a></p><p>Noperator’s Zip-Snip: <a href="https://twitter.com/noperator/status/1658313637189111808">https://twitter.com/noperator/status/1658313637189111808</a></p><p><a href="https://github.com/noperator/zip-snip">https://github.com/noperator/zip-snip</a></p><p><a href="https://noperator.dev/posts/zip-snip/">https://noperator.dev/posts/zip-snip/</a></p><p>Insecure’s SIP Bugs: <a href="https://twitter.com/ifsecure/status/1656591469518495745">https://twitter.com/ifsecure/status/1656591469518495745</a> </p><p>AssetNote’s Sitecore Bugs: <a href="https://blog.assetnote.io/2023/05/10/sitecore-round-two/">https://blog.assetnote.io/2023/05/10/sitecore-round-two/</a> </p><p>Fyooer’s Shadow Clone: <a href="https://github.com/fyoorer/ShadowClone">https://github.com/fyoorer/ShadowClone</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 19: In this episode of Critical Thinking - Bug Bounty Podcast we further discuss some tips and tricks for finding vulns once you’ve got source code and some banger tweets/tools that popped up in our feed this week. Follow us on twitter at: ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>19</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">e16c80e9-dbdc-4a40-8f9e-906f64ac202c</guid>
  <title><![CDATA[Episode 18: Audit Code, Earn Bounties]]></title>
  <description><![CDATA[<p>Episode 18: In this episode of Critical Thinking - Bug Bounty Podcast, we dive into everything source-code related: how to get source-code and what to do with it once you have. This episode is packed with great examples of successful source code review, tips on how to review code yourself, and the tools you'll need along the way.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Crossing the KASM:</p><p><a href="https://www.youtube.com/watch?v=NwMY1umhpgg">https://www.youtube.com/watch?v=NwMY1umhpgg</a></p><p>PWNAssistant by Elttam:</p><p><a href="https://www.elttam.com/blog/pwnassistant/#content">https://www.elttam.com/blog/pwnassistant/#content</a></p><p>Andre's Git Arbitrary Configuration Injection:</p><p><a href="https://blog.ethiack.com/en/blog/git-arbitrary-configuration-injection-cve-2023-29007">https://blog.ethiack.com/en/blog/git-arbitrary-configuration-injection-cve-2023-29007</a></p><p>Jub0b's a Smorgasbord of a Bug Chain:</p><p><a href="https://jub0bs.com/posts/2023-05-05-smorgasbord-of-a-bug-chain/">https://jub0bs.com/posts/2023-05-05-smorgasbord-of-a-bug-chain/</a></p><p>Ankur Sundara's Cookie Bugs - Smuggling &amp; Injection:</p><p><a href="https://twitter.com/ankursundara/status/1654556463703134208?t=7nTUSszPB6fS3MkATzxpaQ&amp;s=19">https://twitter.com/ankursundara/status/1654556463703134208?t=7nTUSszPB6fS3MkATzxpaQ&amp;s=19</a></p><p>James Kettle's Notes on Novel Pathways to Poisoning (cool quirks in here):</p><p><a href="https://twitter.com/albinowax/status/1654767919690031106?t=vbVEOML5_QnWByi0m8Nv4A&amp;s=19">https://twitter.com/albinowax/status/1654767919690031106?t=vbVEOML5_QnWByi0m8Nv4A&amp;s=19</a></p><p>Ignore Irrelevant Scripts During Debugging by Johan Carlsson:</p><p><a href="https://twitter.com/joaxcar/status/1653787336105156616">https://twitter.com/joaxcar/status/1653787336105156616</a></p><p>Every known way to get references to windows:</p><p><a href="https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d">https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d</a></p><p>VS Code Todo Highlight:</p><p><a href="https://marketplace.visualstudio.com/items?itemName=wayou.vscode-todo-highlight">https://marketplace.visualstudio.com/items?itemName=wayou.vscode-todo-highlight</a></p><p>VS Code:</p><p><a href="https://code.visualstudio.com/">https://code.visualstudio.com/</a></p>]]></description>
  <embed_id>448e0708-22d5-4e13-b419-2559d93fac38</embed_id>
  <pubDate>Thu, 11 May 2023 10:00:31 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="64300279" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/73c09bc4-91f0-4bbb-9588-e233d3277349/episode.mp3" />
  <itunes:title><![CDATA[Episode 18: Audit Code, Earn Bounties]]></itunes:title>
  <itunes:duration>1:06:58</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 18: In this episode of Critical Thinking - Bug Bounty Podcast, we dive into everything source-code related: how to get source-code and what to do with it once you have. This episode is packed with great examples of successful source code review, tips on how to review code yourself, and the tools you'll need along the way.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Crossing the KASM:</p><p><a href="https://www.youtube.com/watch?v=NwMY1umhpgg">https://www.youtube.com/watch?v=NwMY1umhpgg</a></p><p>PWNAssistant by Elttam:</p><p><a href="https://www.elttam.com/blog/pwnassistant/#content">https://www.elttam.com/blog/pwnassistant/#content</a></p><p>Andre's Git Arbitrary Configuration Injection:</p><p><a href="https://blog.ethiack.com/en/blog/git-arbitrary-configuration-injection-cve-2023-29007">https://blog.ethiack.com/en/blog/git-arbitrary-configuration-injection-cve-2023-29007</a></p><p>Jub0b's a Smorgasbord of a Bug Chain:</p><p><a href="https://jub0bs.com/posts/2023-05-05-smorgasbord-of-a-bug-chain/">https://jub0bs.com/posts/2023-05-05-smorgasbord-of-a-bug-chain/</a></p><p>Ankur Sundara's Cookie Bugs - Smuggling &amp; Injection:</p><p><a href="https://twitter.com/ankursundara/status/1654556463703134208?t=7nTUSszPB6fS3MkATzxpaQ&amp;s=19">https://twitter.com/ankursundara/status/1654556463703134208?t=7nTUSszPB6fS3MkATzxpaQ&amp;s=19</a></p><p>James Kettle's Notes on Novel Pathways to Poisoning (cool quirks in here):</p><p><a href="https://twitter.com/albinowax/status/1654767919690031106?t=vbVEOML5_QnWByi0m8Nv4A&amp;s=19">https://twitter.com/albinowax/status/1654767919690031106?t=vbVEOML5_QnWByi0m8Nv4A&amp;s=19</a></p><p>Ignore Irrelevant Scripts During Debugging by Johan Carlsson:</p><p><a href="https://twitter.com/joaxcar/status/1653787336105156616">https://twitter.com/joaxcar/status/1653787336105156616</a></p><p>Every known way to get references to windows:</p><p><a href="https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d">https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d</a></p><p>VS Code Todo Highlight:</p><p><a href="https://marketplace.visualstudio.com/items?itemName=wayou.vscode-todo-highlight">https://marketplace.visualstudio.com/items?itemName=wayou.vscode-todo-highlight</a></p><p>VS Code:</p><p><a href="https://code.visualstudio.com/">https://code.visualstudio.com/</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 18: In this episode of Critical Thinking - Bug Bounty Podcast, we dive into everything source-code related: how to get source-code and what to do with it once you have. This episode is packed with great examples of successful source code review, tips on how to review code yourself, and the tools you'll need along the way.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Crossing the KASM:</p><p><a href="https://www.youtube.com/watch?v=NwMY1umhpgg">https://www.youtube.com/watch?v=NwMY1umhpgg</a></p><p>PWNAssistant by Elttam:</p><p><a href="https://www.elttam.com/blog/pwnassistant/#content">https://www.elttam.com/blog/pwnassistant/#content</a></p><p>Andre's Git Arbitrary Configuration Injection:</p><p><a href="https://blog.ethiack.com/en/blog/git-arbitrary-configuration-injection-cve-2023-29007">https://blog.ethiack.com/en/blog/git-arbitrary-configuration-injection-cve-2023-29007</a></p><p>Jub0b's a Smorgasbord of a Bug Chain:</p><p><a href="https://jub0bs.com/posts/2023-05-05-smorgasbord-of-a-bug-chain/">https://jub0bs.com/posts/2023-05-05-smorgasbord-of-a-bug-chain/</a></p><p>Ankur Sundara's Cookie Bugs - Smuggling &amp; Injection:</p><p><a href="https://twitter.com/ankursundara/status/1654556463703134208?t=7nTUSszPB6fS3MkATzxpaQ&amp;s=19">https://twitter.com/ankursundara/status/1654556463703134208?t=7nTUSszPB6fS3MkATzxpaQ&amp;s=19</a></p><p>James Kettle's Notes on Novel Pathways to Poisoning (cool quirks in here):</p><p><a href="https://twitter.com/albinowax/status/1654767919690031106?t=vbVEOML5_QnWByi0m8Nv4A&amp;s=19">https://twitter.com/albinowax/status/1654767919690031106?t=vbVEOML5_QnWByi0m8Nv4A&amp;s=19</a></p><p>Ignore Irrelevant Scripts During Debugging by Johan Carlsson:</p><p><a href="https://twitter.com/joaxcar/status/1653787336105156616">https://twitter.com/joaxcar/status/1653787336105156616</a></p><p>Every known way to get references to windows:</p><p><a href="https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d">https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d</a></p><p>VS Code Todo Highlight:</p><p><a href="https://marketplace.visualstudio.com/items?itemName=wayou.vscode-todo-highlight">https://marketplace.visualstudio.com/items?itemName=wayou.vscode-todo-highlight</a></p><p>VS Code:</p><p><a href="https://code.visualstudio.com/">https://code.visualstudio.com/</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 18: In this episode of Critical Thinking - Bug Bounty Podcast, we dive into everything source-code related: how to get source-code and what to do with it once you have. This episode is packed with great examples of successful source code re...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>18</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">d8b45ec3-09c1-4b71-a975-373e81f8886c</guid>
  <title><![CDATA[Episode 17: LA Live Chat with Five Legendary Hackers]]></title>
  <description><![CDATA[<p>Episode 17: In this episode of Critical Thinking - Bug Bounty Podcast we talk with five legendary hackers about some of their favorite bugs. Live. From LA.</p><p>Corben Leo “Lorben CEO” <a href="https://twitter.com/hacker_">@hacker_</a></p><p>Sam “ZLZ” “ZOZL” “The King” Curry <a href="https://twitter.com/samwcyo">@samwcyo</a></p><p>Frans “The Legend” Rosen <a href="https://twitter.com/fransrosen">@fransrosen</a></p><p>Jonathan “Doc” Bouman <a href="https://twitter.com/JonathanBouman">@JonathanBouman</a></p><p>Nagli…NagliNagli <a href="https://twitter.com/naglinagli">@naglinagli</a></p><p>Shoutout to Jonathan Bouman’s Mom!</p><p></p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p></p><p>------ Links ------</p><p></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p><strong>FOLLOW OUR LINKEDIN ACCOUNT FOR NAGLI:</strong></p><p><a href="https://www.linkedin.com/company/ctbbpodcast">https://www.linkedin.com/company/ctbbpodcast</a></p><p>Sam Curry’s shoutout - Ian Carrol’s <a href="http://Seats.Aero">Seats.Aero</a>: <a href="https://seats.aero/lifemiles">https://seats.aero/</a></p>]]></description>
  <embed_id>ee317354-e9fe-4ae0-bd6b-ae514fc64e59</embed_id>
  <pubDate>Thu, 04 May 2023 10:01:07 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="45274806" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/2f4cff0e-7dae-4793-aa22-386d2d2dbc41/episode.mp3" />
  <itunes:title><![CDATA[Episode 17: LA Live Chat with Five Legendary Hackers]]></itunes:title>
  <itunes:duration>47:09</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 17: In this episode of Critical Thinking - Bug Bounty Podcast we talk with five legendary hackers about some of their favorite bugs. Live. From LA.</p><p>Corben Leo “Lorben CEO” <a href="https://twitter.com/hacker_">@hacker_</a></p><p>Sam “ZLZ” “ZOZL” “The King” Curry <a href="https://twitter.com/samwcyo">@samwcyo</a></p><p>Frans “The Legend” Rosen <a href="https://twitter.com/fransrosen">@fransrosen</a></p><p>Jonathan “Doc” Bouman <a href="https://twitter.com/JonathanBouman">@JonathanBouman</a></p><p>Nagli…NagliNagli <a href="https://twitter.com/naglinagli">@naglinagli</a></p><p>Shoutout to Jonathan Bouman’s Mom!</p><p></p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p></p><p>------ Links ------</p><p></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p><strong>FOLLOW OUR LINKEDIN ACCOUNT FOR NAGLI:</strong></p><p><a href="https://www.linkedin.com/company/ctbbpodcast">https://www.linkedin.com/company/ctbbpodcast</a></p><p>Sam Curry’s shoutout - Ian Carrol’s <a href="http://Seats.Aero">Seats.Aero</a>: <a href="https://seats.aero/lifemiles">https://seats.aero/</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 17: In this episode of Critical Thinking - Bug Bounty Podcast we talk with five legendary hackers about some of their favorite bugs. Live. From LA.</p><p>Corben Leo “Lorben CEO” <a href="https://twitter.com/hacker_">@hacker_</a></p><p>Sam “ZLZ” “ZOZL” “The King” Curry <a href="https://twitter.com/samwcyo">@samwcyo</a></p><p>Frans “The Legend” Rosen <a href="https://twitter.com/fransrosen">@fransrosen</a></p><p>Jonathan “Doc” Bouman <a href="https://twitter.com/JonathanBouman">@JonathanBouman</a></p><p>Nagli…NagliNagli <a href="https://twitter.com/naglinagli">@naglinagli</a></p><p>Shoutout to Jonathan Bouman’s Mom!</p><p></p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p></p><p>------ Links ------</p><p></p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p><strong>FOLLOW OUR LINKEDIN ACCOUNT FOR NAGLI:</strong></p><p><a href="https://www.linkedin.com/company/ctbbpodcast">https://www.linkedin.com/company/ctbbpodcast</a></p><p>Sam Curry’s shoutout - Ian Carrol’s <a href="http://Seats.Aero">Seats.Aero</a>: <a href="https://seats.aero/lifemiles">https://seats.aero/</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 17: In this episode of Critical Thinking - Bug Bounty Podcast we talk with five legendary hackers about some of their favorite bugs. Live. From LA.Corben Leo “Lorben CEO” @hacker_Sam “ZLZ” “ZOZL” “The King” Curry @samwcyoFrans “The Legend” ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>17</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">a076655e-2dae-4334-aa9d-57092825d9d6</guid>
  <title><![CDATA[Episode 16: The Hacker's Toolkit]]></title>
  <description><![CDATA[<p>Episode 16: In this episode of Critical Thinking - Bug Bounty Podcast we talk about the hacker’s toolkit. Joel and Justin talk about their VPS setup, go-to hacking tools, most often used Linux commands, and the ways they duct tape all of these together for the big hacks.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p></p><p>------ Links ------</p><p></p><p>Follow your hosts Rhynorater &amp; Teknogeek on Twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p>Our Boi @rez0__ Dropping Some AI Hackz:</p><p><a href="https://twitter.com/rez0__/status/1648685943539245056?s=20">https://twitter.com/rez0__/status/1648685943539245056?s=20</a></p><p></p><p>LiveOverflow Prompt Injection:</p><p><a href="https://www.youtube.com/watch?v=Sv5OLj2nVAQ">https://www.youtube.com/watch?v=Sv5OLj2nVAQ</a></p><p></p><p>Joel’s Private Network Solution:</p><p><a href="https://www.zerotier.com/">https://www.zerotier.com/</a></p><p></p><p>Stok &amp; Tomnomnom on Vim/Bash:</p><p><a href="https://www.youtube.com/watch?v=l8iXMgk2nnY">https://www.youtube.com/watch?v=l8iXMgk2nnY</a></p><p></p><p>Latest GhostScript RCE:</p><p><a href="https://offsec.almond.consulting/ghostscript-cve-2023-28879.html">https://offsec.almond.consulting/ghostscript-cve-2023-28879.html</a></p><p></p><p>Intigriti CSRF Basics &amp; Jub0b's Legendary SameSite Article:</p><p><a href="https://twitter.com/intigriti/status/1646104705561403398">https://twitter.com/intigriti/status/1646104705561403398</a></p><p><a href="https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/">https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/</a></p><p></p><p>Nahamcon:</p><p><a href="http://nahamcon.com/">http://nahamcon.com/</a></p><p></p><p>Pentah0wnage:</p><p><a href="https://research.aurainfosec.io/pentest/pentah0wnage/">https://research.aurainfosec.io/pentest/pentah0wnage/</a></p><p></p><p>DNSChef:</p><p><a href="https://github.com/iphelix/dnschef">https://github.com/iphelix/dnschef</a></p><p></p><p>Httpx:</p><p><a href="https://github.com/projectdiscovery/httpx">https://github.com/projectdiscovery/httpx</a></p><p></p><p>Espanso:</p><p><a href="https://espanso.org/">https://espanso.org/</a></p><p></p><p>GoWitness:</p><p><a href="https://github.com/sensepost/gowitness">https://github.com/sensepost/gowitness</a></p>]]></description>
  <embed_id>f97dcf40-9709-481b-9518-cb568757f499</embed_id>
  <pubDate>Thu, 20 Apr 2023 10:00:43 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="74145309" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/4885e327-931c-4092-b880-c3cde68e9048/episode.mp3" />
  <itunes:title><![CDATA[Episode 16: The Hacker's Toolkit]]></itunes:title>
  <itunes:duration>1:17:14</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 16: In this episode of Critical Thinking - Bug Bounty Podcast we talk about the hacker’s toolkit. Joel and Justin talk about their VPS setup, go-to hacking tools, most often used Linux commands, and the ways they duct tape all of these together for the big hacks.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p></p><p>------ Links ------</p><p></p><p>Follow your hosts Rhynorater &amp; Teknogeek on Twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p>Our Boi @rez0__ Dropping Some AI Hackz:</p><p><a href="https://twitter.com/rez0__/status/1648685943539245056?s=20">https://twitter.com/rez0__/status/1648685943539245056?s=20</a></p><p></p><p>LiveOverflow Prompt Injection:</p><p><a href="https://www.youtube.com/watch?v=Sv5OLj2nVAQ">https://www.youtube.com/watch?v=Sv5OLj2nVAQ</a></p><p></p><p>Joel’s Private Network Solution:</p><p><a href="https://www.zerotier.com/">https://www.zerotier.com/</a></p><p></p><p>Stok &amp; Tomnomnom on Vim/Bash:</p><p><a href="https://www.youtube.com/watch?v=l8iXMgk2nnY">https://www.youtube.com/watch?v=l8iXMgk2nnY</a></p><p></p><p>Latest GhostScript RCE:</p><p><a href="https://offsec.almond.consulting/ghostscript-cve-2023-28879.html">https://offsec.almond.consulting/ghostscript-cve-2023-28879.html</a></p><p></p><p>Intigriti CSRF Basics &amp; Jub0b's Legendary SameSite Article:</p><p><a href="https://twitter.com/intigriti/status/1646104705561403398">https://twitter.com/intigriti/status/1646104705561403398</a></p><p><a href="https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/">https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/</a></p><p></p><p>Nahamcon:</p><p><a href="http://nahamcon.com/">http://nahamcon.com/</a></p><p></p><p>Pentah0wnage:</p><p><a href="https://research.aurainfosec.io/pentest/pentah0wnage/">https://research.aurainfosec.io/pentest/pentah0wnage/</a></p><p></p><p>DNSChef:</p><p><a href="https://github.com/iphelix/dnschef">https://github.com/iphelix/dnschef</a></p><p></p><p>Httpx:</p><p><a href="https://github.com/projectdiscovery/httpx">https://github.com/projectdiscovery/httpx</a></p><p></p><p>Espanso:</p><p><a href="https://espanso.org/">https://espanso.org/</a></p><p></p><p>GoWitness:</p><p><a href="https://github.com/sensepost/gowitness">https://github.com/sensepost/gowitness</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 16: In this episode of Critical Thinking - Bug Bounty Podcast we talk about the hacker’s toolkit. Joel and Justin talk about their VPS setup, go-to hacking tools, most often used Linux commands, and the ways they duct tape all of these together for the big hacks.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to YTCracker for the awesome intro music!</p><p></p><p>------ Links ------</p><p></p><p>Follow your hosts Rhynorater &amp; Teknogeek on Twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p>Our Boi @rez0__ Dropping Some AI Hackz:</p><p><a href="https://twitter.com/rez0__/status/1648685943539245056?s=20">https://twitter.com/rez0__/status/1648685943539245056?s=20</a></p><p></p><p>LiveOverflow Prompt Injection:</p><p><a href="https://www.youtube.com/watch?v=Sv5OLj2nVAQ">https://www.youtube.com/watch?v=Sv5OLj2nVAQ</a></p><p></p><p>Joel’s Private Network Solution:</p><p><a href="https://www.zerotier.com/">https://www.zerotier.com/</a></p><p></p><p>Stok &amp; Tomnomnom on Vim/Bash:</p><p><a href="https://www.youtube.com/watch?v=l8iXMgk2nnY">https://www.youtube.com/watch?v=l8iXMgk2nnY</a></p><p></p><p>Latest GhostScript RCE:</p><p><a href="https://offsec.almond.consulting/ghostscript-cve-2023-28879.html">https://offsec.almond.consulting/ghostscript-cve-2023-28879.html</a></p><p></p><p>Intigriti CSRF Basics &amp; Jub0b's Legendary SameSite Article:</p><p><a href="https://twitter.com/intigriti/status/1646104705561403398">https://twitter.com/intigriti/status/1646104705561403398</a></p><p><a href="https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/">https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/</a></p><p></p><p>Nahamcon:</p><p><a href="http://nahamcon.com/">http://nahamcon.com/</a></p><p></p><p>Pentah0wnage:</p><p><a href="https://research.aurainfosec.io/pentest/pentah0wnage/">https://research.aurainfosec.io/pentest/pentah0wnage/</a></p><p></p><p>DNSChef:</p><p><a href="https://github.com/iphelix/dnschef">https://github.com/iphelix/dnschef</a></p><p></p><p>Httpx:</p><p><a href="https://github.com/projectdiscovery/httpx">https://github.com/projectdiscovery/httpx</a></p><p></p><p>Espanso:</p><p><a href="https://espanso.org/">https://espanso.org/</a></p><p></p><p>GoWitness:</p><p><a href="https://github.com/sensepost/gowitness">https://github.com/sensepost/gowitness</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 16: In this episode of Critical Thinking - Bug Bounty Podcast we talk about the hacker’s toolkit. Joel and Justin talk about their VPS setup, go-to hacking tools, most often used Linux commands, and the ways they duct tape all of these toge...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>16</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">460233b9-52be-442a-a6a7-af03cbb677c3</guid>
  <title><![CDATA[Episode 15: The Israeli Million-Dollar Hacker]]></title>
  <description><![CDATA[<p>Episode 15: In this episode of Critical Thinking - Bug Bounty Podcast we talk with the latest Million-Dollar bug bounty hunter: <a href="https://twitter.com/naglinagli">@naglinagli</a> . He talks about his climb from $1,000 in bounties to $1,000,000, recon tips and tricks, and some bug reports that made the news and landed him the "Best Bug" award at a H1 Live Hacking event.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Follow Nagli and his new startup Shockwave:</p><p><a href="https://twitter.com/naglinagli">https://twitter.com/naglinagli</a></p><p><a href="https://twitter.com/shockwave_sec">https://twitter.com/shockwave_sec</a></p><p>HackMD Collaborative Notes:</p><p><a href="https://hackmd.io/">https://hackmd.io/</a></p><p><a href="https://twitter.com/iangcarroll">Ian Carroll</a>'s Airline Miles Website:</p><p><a href="https://seats.aero">https://seats.aero</a></p><p>Nagli's Tweet in ChatGPT Web Cache Deception:</p><p><a href="https://twitter.com/naglinagli/status/1639343866313601024">https://twitter.com/naglinagli/status/1639343866313601024</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Intro</p><p>(00:04:40) Nagli’s Climb</p><p>(00:05:40) What kind of vulns do you look for?</p><p>(00:09:25) Working with other hackers</p><p>(00:10:20) Bug Bounty Hunter’s Guild</p><p>(00:12:35) Shockwave product</p><p>(00:14:12) Outsourcing tool development</p><p>(00:18:46) What got you started?</p><p>(00:21:13) Manual hacking vs recon suite + LHE focus</p><p>(00:25:00) How do you take notes</p><p>(00:29:42) Biggest things that you’ve learned over the past 2 years</p><p>(00:31:29) How do you ingest new techniques?</p><p>(00:31:50) Collaboration</p><p>(00:37:20) Justin Ranting about “Trained Eyes”</p><p>(00:40:18) Time spent coding vs hacking</p><p>(00:45:28) Travel and spending habits</p><p>(00:54:16) Grep is Nagli’s database</p><p>(00:56:20) Nagli’s ChatGPT Web Cache Deception</p><p>(00:58:44) What does your alerting look like?</p><p>(01:01:50) Nagli’s “Most Critical” SSRF</p><p>(01:04:30) Burp Active Scan</p>]]></description>
  <embed_id>ff64f75e-3efe-4bb8-a9d3-97a2c61ab1c7</embed_id>
  <pubDate>Thu, 13 Apr 2023 10:00:22 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="65731376" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/b9221a15-25b1-4df8-8925-2bb08d6d6f7a/episode.mp3" />
  <itunes:title><![CDATA[Episode 15: The Israeli Million-Dollar Hacker]]></itunes:title>
  <itunes:duration>1:08:28</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 15: In this episode of Critical Thinking - Bug Bounty Podcast we talk with the latest Million-Dollar bug bounty hunter: <a href="https://twitter.com/naglinagli">@naglinagli</a> . He talks about his climb from $1,000 in bounties to $1,000,000, recon tips and tricks, and some bug reports that made the news and landed him the "Best Bug" award at a H1 Live Hacking event.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Follow Nagli and his new startup Shockwave:</p><p><a href="https://twitter.com/naglinagli">https://twitter.com/naglinagli</a></p><p><a href="https://twitter.com/shockwave_sec">https://twitter.com/shockwave_sec</a></p><p>HackMD Collaborative Notes:</p><p><a href="https://hackmd.io/">https://hackmd.io/</a></p><p><a href="https://twitter.com/iangcarroll">Ian Carroll</a>'s Airline Miles Website:</p><p><a href="https://seats.aero">https://seats.aero</a></p><p>Nagli's Tweet in ChatGPT Web Cache Deception:</p><p><a href="https://twitter.com/naglinagli/status/1639343866313601024">https://twitter.com/naglinagli/status/1639343866313601024</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Intro</p><p>(00:04:40) Nagli’s Climb</p><p>(00:05:40) What kind of vulns do you look for?</p><p>(00:09:25) Working with other hackers</p><p>(00:10:20) Bug Bounty Hunter’s Guild</p><p>(00:12:35) Shockwave product</p><p>(00:14:12) Outsourcing tool development</p><p>(00:18:46) What got you started?</p><p>(00:21:13) Manual hacking vs recon suite + LHE focus</p><p>(00:25:00) How do you take notes</p><p>(00:29:42) Biggest things that you’ve learned over the past 2 years</p><p>(00:31:29) How do you ingest new techniques?</p><p>(00:31:50) Collaboration</p><p>(00:37:20) Justin Ranting about “Trained Eyes”</p><p>(00:40:18) Time spent coding vs hacking</p><p>(00:45:28) Travel and spending habits</p><p>(00:54:16) Grep is Nagli’s database</p><p>(00:56:20) Nagli’s ChatGPT Web Cache Deception</p><p>(00:58:44) What does your alerting look like?</p><p>(01:01:50) Nagli’s “Most Critical” SSRF</p><p>(01:04:30) Burp Active Scan</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 15: In this episode of Critical Thinking - Bug Bounty Podcast we talk with the latest Million-Dollar bug bounty hunter: <a href="https://twitter.com/naglinagli">@naglinagli</a> . He talks about his climb from $1,000 in bounties to $1,000,000, recon tips and tricks, and some bug reports that made the news and landed him the "Best Bug" award at a H1 Live Hacking event.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Follow Nagli and his new startup Shockwave:</p><p><a href="https://twitter.com/naglinagli">https://twitter.com/naglinagli</a></p><p><a href="https://twitter.com/shockwave_sec">https://twitter.com/shockwave_sec</a></p><p>HackMD Collaborative Notes:</p><p><a href="https://hackmd.io/">https://hackmd.io/</a></p><p><a href="https://twitter.com/iangcarroll">Ian Carroll</a>'s Airline Miles Website:</p><p><a href="https://seats.aero">https://seats.aero</a></p><p>Nagli's Tweet in ChatGPT Web Cache Deception:</p><p><a href="https://twitter.com/naglinagli/status/1639343866313601024">https://twitter.com/naglinagli/status/1639343866313601024</a></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Intro</p><p>(00:04:40) Nagli’s Climb</p><p>(00:05:40) What kind of vulns do you look for?</p><p>(00:09:25) Working with other hackers</p><p>(00:10:20) Bug Bounty Hunter’s Guild</p><p>(00:12:35) Shockwave product</p><p>(00:14:12) Outsourcing tool development</p><p>(00:18:46) What got you started?</p><p>(00:21:13) Manual hacking vs recon suite + LHE focus</p><p>(00:25:00) How do you take notes</p><p>(00:29:42) Biggest things that you’ve learned over the past 2 years</p><p>(00:31:29) How do you ingest new techniques?</p><p>(00:31:50) Collaboration</p><p>(00:37:20) Justin Ranting about “Trained Eyes”</p><p>(00:40:18) Time spent coding vs hacking</p><p>(00:45:28) Travel and spending habits</p><p>(00:54:16) Grep is Nagli’s database</p><p>(00:56:20) Nagli’s ChatGPT Web Cache Deception</p><p>(00:58:44) What does your alerting look like?</p><p>(01:01:50) Nagli’s “Most Critical” SSRF</p><p>(01:04:30) Burp Active Scan</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 15: In this episode of Critical Thinking - Bug Bounty Podcast we talk with the latest Million-Dollar bug bounty hunter: @naglinagli . He talks about his climb from $1,000 in bounties to $1,000,000, recon tips and tricks, and some bug report...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>15</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">75e0c616-1341-4ba1-9044-fb7b119ea879</guid>
  <title><![CDATA[Episode 14: Mobile Hacking Dynamic Analysis w/ Frida + Random Hacker Stuff]]></title>
  <description><![CDATA[<p>Episode 14: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Dynamic Analysis within Mobile Hacking and a bunch of random hacker stuff. It's a good time. Enjoy the pod.</p><p>Follow us on Twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on Twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Joel’s Alternative to UberTooth One:</p><p><a href="https://www.amazon.com/Bluetooth-UD100-G03-Exchangeable-Bluesoleil-Microsoft/dp/B0161B5ATM">https://www.amazon.com/Bluetooth-UD100-G03-Exchangeable-Bluesoleil-Microsoft/dp/B0161B5ATM</a></p><p>D3monDev’s Burp VPS Plug-in:</p><p><a href="https://github.com/d3mondev/burp-vps-proxy">https://github.com/d3mondev/burp-vps-proxy</a></p><p>FireProx:</p><p><a href="https://github.com/ustayready/fireprox">https://github.com/ustayready/fireprox</a></p><p></p><p>Joel’s Universal SSL De-pinning Frida Script:</p><p><a href="https://gist.github.com/teknogeek/4dc35fb3801bd7f13e5f0da5b784c725">https://gist.github.com/teknogeek/4dc35fb3801bd7f13e5f0da5b784c725</a></p><p></p><p>Command-line Fuzzy Finder:</p><p><a href="https://github.com/junegunn/fzf">https://github.com/junegunn/fzf</a></p><p></p><p>Justin’s two article recommendations for using Frida:</p><p><a href="https://tinyurl.com/5n94d6ry">https://tinyurl.com/5n94d6ry</a></p><p></p><p><a href="https://tinyurl.com/yfy3n5f5">https://tinyurl.com/yfy3n5f5</a></p><p></p><p>Copy screen of physical device:</p><p><a href="https://tinyurl.com/ymdrscm5">https://tinyurl.com/ymdrscm5</a></p><p></p><p>Flipper:</p><p><a href="https://flipperzero.one/">https://flipperzero.one/</a></p><p></p><p>BetterCap BLE Module:</p><p><a href="https://tinyurl.com/emfxbjyk">https://www.bettercap.org/modules/ble/</a></p><p></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Intro</p><p>(00:00:55) Hacker Chats</p><p>(00:03:27) Podcast Content Commentary</p><p>(00:04:09) SSRF Rebinding Error Confession</p><p>(00:06:02) Flipper Zero</p><p>(00:07:58) Bettercap BLE</p><p>(00:09:36) Sena USB Bluetooth Adapter</p><p>(00:12:41) Burp VPS Proxy Plugin</p><p>(00:13:55) Fireprox</p><p>(00:15:40) Dynamic Mobile Hacking</p><p>(00:17:40) Dynamic Analysis Overview</p><p>(00:18:18) Emulator Talk</p><p>(00:24:29) Joel’s APK Analysis Flow</p><p>(00:26:30) Cert Pinning</p><p>(00:32:17) Joel’s SSL Cert Pinning Script</p><p>(00:35:29) Hands-on look at Frida</p><p>(00:50:11) Frida on Non-rooted Devices</p><p>(00:58:22) Tracing Errors to Overwritable Functions</p><p>(01:00:39) Native Libraries</p><p>(01:09:18) GenyMobile Screen Mirroring Tool</p><p>(01:11:50) Justin’s Report of the Day and Custom SSL Pinning</p><p>(01:18:15) Joel’s First Ever Bug, Jailbreak Detection Bypass</p>]]></description>
  <embed_id>0f23492e-d00c-4673-8eea-6538f1d136c2</embed_id>
  <pubDate>Thu, 06 Apr 2023 10:01:32 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="78367992" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/1228f04d-dd61-47a2-ac7c-ef5416600c96/episode.mp3" />
  <itunes:title><![CDATA[Episode 14: Mobile Hacking Dynamic Analysis w/ Frida + Random Hacker Stuff]]></itunes:title>
  <itunes:duration>1:21:37</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 14: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Dynamic Analysis within Mobile Hacking and a bunch of random hacker stuff. It's a good time. Enjoy the pod.</p><p>Follow us on Twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on Twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Joel’s Alternative to UberTooth One:</p><p><a href="https://www.amazon.com/Bluetooth-UD100-G03-Exchangeable-Bluesoleil-Microsoft/dp/B0161B5ATM">https://www.amazon.com/Bluetooth-UD100-G03-Exchangeable-Bluesoleil-Microsoft/dp/B0161B5ATM</a></p><p>D3monDev’s Burp VPS Plug-in:</p><p><a href="https://github.com/d3mondev/burp-vps-proxy">https://github.com/d3mondev/burp-vps-proxy</a></p><p>FireProx:</p><p><a href="https://github.com/ustayready/fireprox">https://github.com/ustayready/fireprox</a></p><p></p><p>Joel’s Universal SSL De-pinning Frida Script:</p><p><a href="https://gist.github.com/teknogeek/4dc35fb3801bd7f13e5f0da5b784c725">https://gist.github.com/teknogeek/4dc35fb3801bd7f13e5f0da5b784c725</a></p><p></p><p>Command-line Fuzzy Finder:</p><p><a href="https://github.com/junegunn/fzf">https://github.com/junegunn/fzf</a></p><p></p><p>Justin’s two article recommendations for using Frida:</p><p><a href="https://tinyurl.com/5n94d6ry">https://tinyurl.com/5n94d6ry</a></p><p></p><p><a href="https://tinyurl.com/yfy3n5f5">https://tinyurl.com/yfy3n5f5</a></p><p></p><p>Copy screen of physical device:</p><p><a href="https://tinyurl.com/ymdrscm5">https://tinyurl.com/ymdrscm5</a></p><p></p><p>Flipper:</p><p><a href="https://flipperzero.one/">https://flipperzero.one/</a></p><p></p><p>BetterCap BLE Module:</p><p><a href="https://tinyurl.com/emfxbjyk">https://www.bettercap.org/modules/ble/</a></p><p></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Intro</p><p>(00:00:55) Hacker Chats</p><p>(00:03:27) Podcast Content Commentary</p><p>(00:04:09) SSRF Rebinding Error Confession</p><p>(00:06:02) Flipper Zero</p><p>(00:07:58) Bettercap BLE</p><p>(00:09:36) Sena USB Bluetooth Adapter</p><p>(00:12:41) Burp VPS Proxy Plugin</p><p>(00:13:55) Fireprox</p><p>(00:15:40) Dynamic Mobile Hacking</p><p>(00:17:40) Dynamic Analysis Overview</p><p>(00:18:18) Emulator Talk</p><p>(00:24:29) Joel’s APK Analysis Flow</p><p>(00:26:30) Cert Pinning</p><p>(00:32:17) Joel’s SSL Cert Pinning Script</p><p>(00:35:29) Hands-on look at Frida</p><p>(00:50:11) Frida on Non-rooted Devices</p><p>(00:58:22) Tracing Errors to Overwritable Functions</p><p>(01:00:39) Native Libraries</p><p>(01:09:18) GenyMobile Screen Mirroring Tool</p><p>(01:11:50) Justin’s Report of the Day and Custom SSL Pinning</p><p>(01:18:15) Joel’s First Ever Bug, Jailbreak Detection Bypass</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 14: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Dynamic Analysis within Mobile Hacking and a bunch of random hacker stuff. It's a good time. Enjoy the pod.</p><p>Follow us on Twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on Twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Joel’s Alternative to UberTooth One:</p><p><a href="https://www.amazon.com/Bluetooth-UD100-G03-Exchangeable-Bluesoleil-Microsoft/dp/B0161B5ATM">https://www.amazon.com/Bluetooth-UD100-G03-Exchangeable-Bluesoleil-Microsoft/dp/B0161B5ATM</a></p><p>D3monDev’s Burp VPS Plug-in:</p><p><a href="https://github.com/d3mondev/burp-vps-proxy">https://github.com/d3mondev/burp-vps-proxy</a></p><p>FireProx:</p><p><a href="https://github.com/ustayready/fireprox">https://github.com/ustayready/fireprox</a></p><p></p><p>Joel’s Universal SSL De-pinning Frida Script:</p><p><a href="https://gist.github.com/teknogeek/4dc35fb3801bd7f13e5f0da5b784c725">https://gist.github.com/teknogeek/4dc35fb3801bd7f13e5f0da5b784c725</a></p><p></p><p>Command-line Fuzzy Finder:</p><p><a href="https://github.com/junegunn/fzf">https://github.com/junegunn/fzf</a></p><p></p><p>Justin’s two article recommendations for using Frida:</p><p><a href="https://tinyurl.com/5n94d6ry">https://tinyurl.com/5n94d6ry</a></p><p></p><p><a href="https://tinyurl.com/yfy3n5f5">https://tinyurl.com/yfy3n5f5</a></p><p></p><p>Copy screen of physical device:</p><p><a href="https://tinyurl.com/ymdrscm5">https://tinyurl.com/ymdrscm5</a></p><p></p><p>Flipper:</p><p><a href="https://flipperzero.one/">https://flipperzero.one/</a></p><p></p><p>BetterCap BLE Module:</p><p><a href="https://tinyurl.com/emfxbjyk">https://www.bettercap.org/modules/ble/</a></p><p></p><p><strong>Timestamps:</strong></p><p>(00:00:00) Intro</p><p>(00:00:55) Hacker Chats</p><p>(00:03:27) Podcast Content Commentary</p><p>(00:04:09) SSRF Rebinding Error Confession</p><p>(00:06:02) Flipper Zero</p><p>(00:07:58) Bettercap BLE</p><p>(00:09:36) Sena USB Bluetooth Adapter</p><p>(00:12:41) Burp VPS Proxy Plugin</p><p>(00:13:55) Fireprox</p><p>(00:15:40) Dynamic Mobile Hacking</p><p>(00:17:40) Dynamic Analysis Overview</p><p>(00:18:18) Emulator Talk</p><p>(00:24:29) Joel’s APK Analysis Flow</p><p>(00:26:30) Cert Pinning</p><p>(00:32:17) Joel’s SSL Cert Pinning Script</p><p>(00:35:29) Hands-on look at Frida</p><p>(00:50:11) Frida on Non-rooted Devices</p><p>(00:58:22) Tracing Errors to Overwritable Functions</p><p>(01:00:39) Native Libraries</p><p>(01:09:18) GenyMobile Screen Mirroring Tool</p><p>(01:11:50) Justin’s Report of the Day and Custom SSL Pinning</p><p>(01:18:15) Joel’s First Ever Bug, Jailbreak Detection Bypass</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 14: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Dynamic Analysis within Mobile Hacking and a bunch of random hacker stuff. It's a good time. Enjoy the pod.Follow us on Twitter at: @ctbbpodcastWe're new to this po...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>14</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">f1fdd388-a9db-4759-aad5-1c1e657d0340</guid>
  <title><![CDATA[Episode 13: How to Find a Good BBP + Acropalypse + ZDI]]></title>
  <description><![CDATA[<p>Episode 13: In this episode of Critical Thinking - Bug Bounty Podcast we talk about how to determine if a bug bounty program is good or not from the policy page. We also cover some news including Acropalypse, ZDI's Pwn2Own Competition, Node's Request library's SSRF Bypass, and a new scanning tool by JHaddix. </p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p>JHaddix AWSScrape Tool:</p><p><a href="https://twitter.com/Jhaddix/status/1637140192728612865?s=20">https://twitter.com/Jhaddix/status/1637140192728612865?s=20</a></p><p>Acropalypse Links:</p><p><a href="https://twitter.com/ItsSimonTime/status/1636857478263750656">https://twitter.com/ItsSimonTime/status/1636857478263750656</a></p><p><a href="https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html">https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html</a></p><p><a href="https://twitter.com/David3141593/status/1638222624084951040">https://twitter.com/David3141593/status/1638222624084951040</a></p><p><a href="https://twitter.com/David3141593/status/1638293029059477505">https://twitter.com/David3141593/status/1638293029059477505</a></p><p></p><p>SSRF Bypass in NodeJS:</p><p><a href="https://blog.doyensec.com/2023/03/16/ssrf-remediation-bypass.html">https://blog.doyensec.com/2023/03/16/ssrf-remediation-bypass.html</a></p><p></p><p>ZDI's Pwn2Own:</p><p><a href="https://twitter.com/thezdi">https://twitter.com/thezdi</a></p><p></p><p>Kuzu7shiki's Awesome Pixiv Report:</p><p><a href="https://hackerone.com/reports/1861974">https://hackerone.com/reports/1861974</a></p><p><a href="https://twitter.com/kuzu7shiki">https://twitter.com/kuzu7shiki</a></p><p></p><p>Some of the Programs we talk about:</p><p><a href="https://hackerone.com/instacart">https://hackerone.com/instacart</a></p><p><a href="https://hackerone.com/semrush">https://hackerone.com/semrush</a></p><p><a href="https://hackerone.com/yahoo">https://hackerone.com/yahoo</a></p><p><a href="https://hackerone.com/paypal?type=team">https://hackerone.com/paypal</a></p>]]></description>
  <embed_id>9a5a71d5-791f-40f4-938c-487572f42551</embed_id>
  <pubDate>Thu, 30 Mar 2023 10:01:13 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="73326549" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/7044b042-a845-4948-85db-a7746309b536/episode.mp3" />
  <itunes:title><![CDATA[Episode 13: How to Find a Good BBP + Acropalypse + ZDI]]></itunes:title>
  <itunes:duration>1:16:22</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 13: In this episode of Critical Thinking - Bug Bounty Podcast we talk about how to determine if a bug bounty program is good or not from the policy page. We also cover some news including Acropalypse, ZDI's Pwn2Own Competition, Node's Request library's SSRF Bypass, and a new scanning tool by JHaddix. </p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p>JHaddix AWSScrape Tool:</p><p><a href="https://twitter.com/Jhaddix/status/1637140192728612865?s=20">https://twitter.com/Jhaddix/status/1637140192728612865?s=20</a></p><p>Acropalypse Links:</p><p><a href="https://twitter.com/ItsSimonTime/status/1636857478263750656">https://twitter.com/ItsSimonTime/status/1636857478263750656</a></p><p><a href="https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html">https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html</a></p><p><a href="https://twitter.com/David3141593/status/1638222624084951040">https://twitter.com/David3141593/status/1638222624084951040</a></p><p><a href="https://twitter.com/David3141593/status/1638293029059477505">https://twitter.com/David3141593/status/1638293029059477505</a></p><p></p><p>SSRF Bypass in NodeJS:</p><p><a href="https://blog.doyensec.com/2023/03/16/ssrf-remediation-bypass.html">https://blog.doyensec.com/2023/03/16/ssrf-remediation-bypass.html</a></p><p></p><p>ZDI's Pwn2Own:</p><p><a href="https://twitter.com/thezdi">https://twitter.com/thezdi</a></p><p></p><p>Kuzu7shiki's Awesome Pixiv Report:</p><p><a href="https://hackerone.com/reports/1861974">https://hackerone.com/reports/1861974</a></p><p><a href="https://twitter.com/kuzu7shiki">https://twitter.com/kuzu7shiki</a></p><p></p><p>Some of the Programs we talk about:</p><p><a href="https://hackerone.com/instacart">https://hackerone.com/instacart</a></p><p><a href="https://hackerone.com/semrush">https://hackerone.com/semrush</a></p><p><a href="https://hackerone.com/yahoo">https://hackerone.com/yahoo</a></p><p><a href="https://hackerone.com/paypal?type=team">https://hackerone.com/paypal</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 13: In this episode of Critical Thinking - Bug Bounty Podcast we talk about how to determine if a bug bounty program is good or not from the policy page. We also cover some news including Acropalypse, ZDI's Pwn2Own Competition, Node's Request library's SSRF Bypass, and a new scanning tool by JHaddix. </p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p>JHaddix AWSScrape Tool:</p><p><a href="https://twitter.com/Jhaddix/status/1637140192728612865?s=20">https://twitter.com/Jhaddix/status/1637140192728612865?s=20</a></p><p>Acropalypse Links:</p><p><a href="https://twitter.com/ItsSimonTime/status/1636857478263750656">https://twitter.com/ItsSimonTime/status/1636857478263750656</a></p><p><a href="https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html">https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html</a></p><p><a href="https://twitter.com/David3141593/status/1638222624084951040">https://twitter.com/David3141593/status/1638222624084951040</a></p><p><a href="https://twitter.com/David3141593/status/1638293029059477505">https://twitter.com/David3141593/status/1638293029059477505</a></p><p></p><p>SSRF Bypass in NodeJS:</p><p><a href="https://blog.doyensec.com/2023/03/16/ssrf-remediation-bypass.html">https://blog.doyensec.com/2023/03/16/ssrf-remediation-bypass.html</a></p><p></p><p>ZDI's Pwn2Own:</p><p><a href="https://twitter.com/thezdi">https://twitter.com/thezdi</a></p><p></p><p>Kuzu7shiki's Awesome Pixiv Report:</p><p><a href="https://hackerone.com/reports/1861974">https://hackerone.com/reports/1861974</a></p><p><a href="https://twitter.com/kuzu7shiki">https://twitter.com/kuzu7shiki</a></p><p></p><p>Some of the Programs we talk about:</p><p><a href="https://hackerone.com/instacart">https://hackerone.com/instacart</a></p><p><a href="https://hackerone.com/semrush">https://hackerone.com/semrush</a></p><p><a href="https://hackerone.com/yahoo">https://hackerone.com/yahoo</a></p><p><a href="https://hackerone.com/paypal?type=team">https://hackerone.com/paypal</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 13: In this episode of Critical Thinking - Bug Bounty Podcast we talk about how to determine if a bug bounty program is good or not from the policy page. We also cover some news including Acropalypse, ZDI's Pwn2Own Competition, Node's Reque...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>13</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">444eef76-c8fe-40ee-9131-e3ba45487ada</guid>
  <title><![CDATA[Episode 12: JHaddix on Hacker-&gt;Hacker CISO, OG Hacking Techniques, and Crazy Reports]]></title>
  <description><![CDATA[<p>Episode 12: In this episode of Critical Thinking - Bug Bounty Podcast we talk with Jason Haddix about his eclectic hacking techniques, Hacker -&gt; Hacker CISO life, and some crazy vulns he found. This episode is chock full of awesome tips so give it a good listen!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p></p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p>Follow JHaddix on Twitter:</p><p><a href="https://twitter.com/jhaddix">https://twitter.com/jhaddix</a></p><p></p><p>BuddoBot:</p><p><a href="https://buddobot.com/">https://buddobot.com/</a></p><p></p><p>BC Hunt:</p><p><a href="https://github.com/bugcrowd/HUNT/blob/master/README.md">https://github.com/bugcrowd/HUNT/blob/master/README.md</a></p><p></p><p>One List For All:</p><p><a href="https://github.com/six2dez/OneListForAll">https://github.com/six2dez/OneListForAll</a></p><p></p><p>AssetNote Wordlists:</p><p><a href="https://wordlists.assetnote.io/">https://wordlists.assetnote.io/</a></p><p></p><p>Backslash Powered Scanner:</p><p><a href="https://portswigger.net/bappstore/9cff8c55432a45808432e26dbb2b41d8">https://portswigger.net/bappstore/9cff8c55432a45808432e26dbb2b41d8</a></p><p></p><p>Jason’s Handy Dandy Acronyms:</p><p>SSWLR - Sensitive Secrets Were Leaked Recently</p><ul><li><p>Status</p></li><li><p>Size</p></li><li><p>Words</p></li><li><p>Lines</p></li><li><p>Response Time</p></li></ul><p>COTS Software - Common Off-The-Shelf Software</p>]]></description>
  <embed_id>e3df6dee-9773-430d-8cf8-9c3cae6bee6a</embed_id>
  <pubDate>Thu, 23 Mar 2023 09:00:23 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="102355091" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/74ee70bb-0ae1-4a35-9455-ced1976f5fa4/episode.mp3" />
  <itunes:title><![CDATA[Episode 12: JHaddix on Hacker-&gt;Hacker CISO, OG Hacking Techniques, and Crazy Reports]]></itunes:title>
  <itunes:duration>1:46:37</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 12: In this episode of Critical Thinking - Bug Bounty Podcast we talk with Jason Haddix about his eclectic hacking techniques, Hacker -&gt; Hacker CISO life, and some crazy vulns he found. This episode is chock full of awesome tips so give it a good listen!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p></p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p>Follow JHaddix on Twitter:</p><p><a href="https://twitter.com/jhaddix">https://twitter.com/jhaddix</a></p><p></p><p>BuddoBot:</p><p><a href="https://buddobot.com/">https://buddobot.com/</a></p><p></p><p>BC Hunt:</p><p><a href="https://github.com/bugcrowd/HUNT/blob/master/README.md">https://github.com/bugcrowd/HUNT/blob/master/README.md</a></p><p></p><p>One List For All:</p><p><a href="https://github.com/six2dez/OneListForAll">https://github.com/six2dez/OneListForAll</a></p><p></p><p>AssetNote Wordlists:</p><p><a href="https://wordlists.assetnote.io/">https://wordlists.assetnote.io/</a></p><p></p><p>Backslash Powered Scanner:</p><p><a href="https://portswigger.net/bappstore/9cff8c55432a45808432e26dbb2b41d8">https://portswigger.net/bappstore/9cff8c55432a45808432e26dbb2b41d8</a></p><p></p><p>Jason’s Handy Dandy Acronyms:</p><p>SSWLR - Sensitive Secrets Were Leaked Recently</p><ul><li><p>Status</p></li><li><p>Size</p></li><li><p>Words</p></li><li><p>Lines</p></li><li><p>Response Time</p></li></ul><p>COTS Software - Common Off-The-Shelf Software</p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 12: In this episode of Critical Thinking - Bug Bounty Podcast we talk with Jason Haddix about his eclectic hacking techniques, Hacker -&gt; Hacker CISO life, and some crazy vulns he found. This episode is chock full of awesome tips so give it a good listen!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p></p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p>Follow JHaddix on Twitter:</p><p><a href="https://twitter.com/jhaddix">https://twitter.com/jhaddix</a></p><p></p><p>BuddoBot:</p><p><a href="https://buddobot.com/">https://buddobot.com/</a></p><p></p><p>BC Hunt:</p><p><a href="https://github.com/bugcrowd/HUNT/blob/master/README.md">https://github.com/bugcrowd/HUNT/blob/master/README.md</a></p><p></p><p>One List For All:</p><p><a href="https://github.com/six2dez/OneListForAll">https://github.com/six2dez/OneListForAll</a></p><p></p><p>AssetNote Wordlists:</p><p><a href="https://wordlists.assetnote.io/">https://wordlists.assetnote.io/</a></p><p></p><p>Backslash Powered Scanner:</p><p><a href="https://portswigger.net/bappstore/9cff8c55432a45808432e26dbb2b41d8">https://portswigger.net/bappstore/9cff8c55432a45808432e26dbb2b41d8</a></p><p></p><p>Jason’s Handy Dandy Acronyms:</p><p>SSWLR - Sensitive Secrets Were Leaked Recently</p><ul><li><p>Status</p></li><li><p>Size</p></li><li><p>Words</p></li><li><p>Lines</p></li><li><p>Response Time</p></li></ul><p>COTS Software - Common Off-The-Shelf Software</p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 12: In this episode of Critical Thinking - Bug Bounty Podcast we talk with Jason Haddix about his eclectic hacking techniques, Hacker -> Hacker CISO life, and some crazy vulns he found. This episode is chock full of awesome tips so give it ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>12</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">95d9f0ea-e570-4e1e-9853-1dc0d54bdc39</guid>
  <title><![CDATA[Episode 11: CV$$, Web Cache Deception, and SSTI]]></title>
  <description><![CDATA[<p>Episode 11: In this episode of Critical Thinking - Bug Bounty Podcast we talk about CVSS (the good, the bad, and the ugly), Web Cache Deception (an underrated vuln class) and a sick SSTI Joel and <a href="https://twitter.com/Regala_">Fisher</a> found.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>MDSec Outlook Vuln:</p><p><a href="https://twitter.com/MDSecLabs/status/1635791863478091778">https://twitter.com/MDSecLabs/status/1635791863478091778</a></p><p>Jub0bs User-Existance Oracle Tweet:</p><p><a href="https://twitter.com/jub0bs/status/1633786349529513986">https://twitter.com/jub0bs/status/1633786349529513986</a></p><p>James Kettle's Tweet About BB ID Header Standardization:</p><p><a href="https://twitter.com/albinowax/status/1635951506791755776">https://twitter.com/albinowax/status/1635951506791755776</a></p><p>15K Snapchat Numeric IDOR:</p><p><a href="https://hackerone.com/reports/1819832">https://hackerone.com/reports/1819832</a></p><p>Bug Bounty Reports Explained:</p><p><a href="https://www.bugbountyexplained.com/">https://www.bugbountyexplained.com/</a></p><p>CVSS Calculator:</p><p><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator">https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator</a></p><p></p><p>Web Cache Deception Write-up:</p><p><a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Gil-Web-Cache-Deception-Attack.pdf">https://www.blackhat.com/docs/us-17/wednesday/us-17-Gil-Web-Cache-Deception-Attack.pdf</a></p>]]></description>
  <embed_id>f88ec874-dcdc-420b-ab6c-8f5a3e79a1ee</embed_id>
  <pubDate>Thu, 16 Mar 2023 09:01:03 -0400</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="61244582" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/d3826dae-b3b3-4487-8d7b-167faf9c8dea/episode.mp3" />
  <itunes:title><![CDATA[Episode 11: CV$$, Web Cache Deception, and SSTI]]></itunes:title>
  <itunes:duration>1:03:47</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 11: In this episode of Critical Thinking - Bug Bounty Podcast we talk about CVSS (the good, the bad, and the ugly), Web Cache Deception (an underrated vuln class) and a sick SSTI Joel and <a href="https://twitter.com/Regala_">Fisher</a> found.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>MDSec Outlook Vuln:</p><p><a href="https://twitter.com/MDSecLabs/status/1635791863478091778">https://twitter.com/MDSecLabs/status/1635791863478091778</a></p><p>Jub0bs User-Existance Oracle Tweet:</p><p><a href="https://twitter.com/jub0bs/status/1633786349529513986">https://twitter.com/jub0bs/status/1633786349529513986</a></p><p>James Kettle's Tweet About BB ID Header Standardization:</p><p><a href="https://twitter.com/albinowax/status/1635951506791755776">https://twitter.com/albinowax/status/1635951506791755776</a></p><p>15K Snapchat Numeric IDOR:</p><p><a href="https://hackerone.com/reports/1819832">https://hackerone.com/reports/1819832</a></p><p>Bug Bounty Reports Explained:</p><p><a href="https://www.bugbountyexplained.com/">https://www.bugbountyexplained.com/</a></p><p>CVSS Calculator:</p><p><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator">https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator</a></p><p></p><p>Web Cache Deception Write-up:</p><p><a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Gil-Web-Cache-Deception-Attack.pdf">https://www.blackhat.com/docs/us-17/wednesday/us-17-Gil-Web-Cache-Deception-Attack.pdf</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 11: In this episode of Critical Thinking - Bug Bounty Podcast we talk about CVSS (the good, the bad, and the ugly), Web Cache Deception (an underrated vuln class) and a sick SSTI Joel and <a href="https://twitter.com/Regala_">Fisher</a> found.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>MDSec Outlook Vuln:</p><p><a href="https://twitter.com/MDSecLabs/status/1635791863478091778">https://twitter.com/MDSecLabs/status/1635791863478091778</a></p><p>Jub0bs User-Existance Oracle Tweet:</p><p><a href="https://twitter.com/jub0bs/status/1633786349529513986">https://twitter.com/jub0bs/status/1633786349529513986</a></p><p>James Kettle's Tweet About BB ID Header Standardization:</p><p><a href="https://twitter.com/albinowax/status/1635951506791755776">https://twitter.com/albinowax/status/1635951506791755776</a></p><p>15K Snapchat Numeric IDOR:</p><p><a href="https://hackerone.com/reports/1819832">https://hackerone.com/reports/1819832</a></p><p>Bug Bounty Reports Explained:</p><p><a href="https://www.bugbountyexplained.com/">https://www.bugbountyexplained.com/</a></p><p>CVSS Calculator:</p><p><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator">https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator</a></p><p></p><p>Web Cache Deception Write-up:</p><p><a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Gil-Web-Cache-Deception-Attack.pdf">https://www.blackhat.com/docs/us-17/wednesday/us-17-Gil-Web-Cache-Deception-Attack.pdf</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 11: In this episode of Critical Thinking - Bug Bounty Podcast we talk about CVSS (the good, the bad, and the ugly), Web Cache Deception (an underrated vuln class) and a sick SSTI Joel and Fisher found.Follow us on twitter at: @ctbbpodcastWe...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>11</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">66ee8660-ddc4-4f27-9c65-97a5722b5b2d</guid>
  <title><![CDATA[Episode 10: The Life of a Full-Time Bug Bounty Hunter + BB News + Reports from Mentees]]></title>
  <description><![CDATA[<p>Episode 10: In this episode of Critical Thinking - Bug Bounty Podcast we talk about what its like to be a full-time bug bounty hunter, a tonne of bug bounty news, and some great report summaries from Justin’s two mentees: Kodai and Soma. </p><p>Follow us on twitter at: <a href="https://twitter.com/ctbbpodcast">https://twitter.com/ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>HackVertor <a href="https://portswigger.net/bappstore/65033cbd2c344fbabe57ac060b5dd100">https://portswigger.net/bappstore/65033cbd2c344fbabe57ac060b5dd100</a> </p><p>Not_An_Aardvark (Teddy Katz) Blog: <a href="https://blog.teddykatz.com/">https://blog.teddykatz.com/</a> </p><p>Tweets from PortSwigger Research:</p><p><a href="https://twitter.com/PortSwiggerRes/status/1632742844535324677">https://twitter.com/PortSwiggerRes/status/1632742844535324677</a></p><p><a href="https://twitter.com/PortSwiggerRes/status/1630221223874445314">https://twitter.com/PortSwiggerRes/status/1630221223874445314</a></p><p><a href="https://twitter.com/PortSwiggerRes/status/1629131380473970688">https://twitter.com/PortSwiggerRes/status/1629131380473970688</a></p><p>HackerOne LHE Standards: <a href="https://www.hackerone.com/hackerone-community-blog/get-invited-how-live-hacking-event-invites-have-changed">https://www.hackerone.com/hackerone-community-blog/get-invited-how-live-hacking-event-invites-have-changed</a> </p><p>Rez0 Bug Bounty Tweet: <a href="https://twitter.com/rez0__/status/1553371602770960384?t=NCr_esHcEts9PrcjxIZ5uw&amp;s=19">https://twitter.com/rez0__/status/1553371602770960384?t=NCr_esHcEts9PrcjxIZ5uw&amp;s=19</a></p><p>Rojan’s Github Bug: <a href="https://twitter.com/uraniumhacker/status/1633199768263593984">https://twitter.com/uraniumhacker/status/1633199768263593984</a></p><p>Goodbye Daily Swig: <a href="https://portswigger.net/daily-swig/were-going-teetotal-its-goodbye-to-the-daily-swig">https://portswigger.net/daily-swig/were-going-teetotal-its-goodbye-to-the-daily-swig</a> </p><p>Gareth Heyes JavaScript for Hackers:<a href="https://leanpub.com/javascriptforhackers/">https://leanpub.com/javascriptforhackers/</a></p>]]></description>
  <embed_id>c1682183-5450-4b78-a94b-add7eca21eb1</embed_id>
  <pubDate>Thu, 09 Mar 2023 10:01:17 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="73581104" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/0666d643-5657-4011-ad0a-fa55ef66949d/episode.mp3" />
  <itunes:title><![CDATA[Episode 10: The Life of a Full-Time Bug Bounty Hunter + BB News + Reports from Mentees]]></itunes:title>
  <itunes:duration>1:16:38</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 10: In this episode of Critical Thinking - Bug Bounty Podcast we talk about what its like to be a full-time bug bounty hunter, a tonne of bug bounty news, and some great report summaries from Justin’s two mentees: Kodai and Soma. </p><p>Follow us on twitter at: <a href="https://twitter.com/ctbbpodcast">https://twitter.com/ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>HackVertor <a href="https://portswigger.net/bappstore/65033cbd2c344fbabe57ac060b5dd100">https://portswigger.net/bappstore/65033cbd2c344fbabe57ac060b5dd100</a> </p><p>Not_An_Aardvark (Teddy Katz) Blog: <a href="https://blog.teddykatz.com/">https://blog.teddykatz.com/</a> </p><p>Tweets from PortSwigger Research:</p><p><a href="https://twitter.com/PortSwiggerRes/status/1632742844535324677">https://twitter.com/PortSwiggerRes/status/1632742844535324677</a></p><p><a href="https://twitter.com/PortSwiggerRes/status/1630221223874445314">https://twitter.com/PortSwiggerRes/status/1630221223874445314</a></p><p><a href="https://twitter.com/PortSwiggerRes/status/1629131380473970688">https://twitter.com/PortSwiggerRes/status/1629131380473970688</a></p><p>HackerOne LHE Standards: <a href="https://www.hackerone.com/hackerone-community-blog/get-invited-how-live-hacking-event-invites-have-changed">https://www.hackerone.com/hackerone-community-blog/get-invited-how-live-hacking-event-invites-have-changed</a> </p><p>Rez0 Bug Bounty Tweet: <a href="https://twitter.com/rez0__/status/1553371602770960384?t=NCr_esHcEts9PrcjxIZ5uw&amp;s=19">https://twitter.com/rez0__/status/1553371602770960384?t=NCr_esHcEts9PrcjxIZ5uw&amp;s=19</a></p><p>Rojan’s Github Bug: <a href="https://twitter.com/uraniumhacker/status/1633199768263593984">https://twitter.com/uraniumhacker/status/1633199768263593984</a></p><p>Goodbye Daily Swig: <a href="https://portswigger.net/daily-swig/were-going-teetotal-its-goodbye-to-the-daily-swig">https://portswigger.net/daily-swig/were-going-teetotal-its-goodbye-to-the-daily-swig</a> </p><p>Gareth Heyes JavaScript for Hackers:<a href="https://leanpub.com/javascriptforhackers/">https://leanpub.com/javascriptforhackers/</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 10: In this episode of Critical Thinking - Bug Bounty Podcast we talk about what its like to be a full-time bug bounty hunter, a tonne of bug bounty news, and some great report summaries from Justin’s two mentees: Kodai and Soma. </p><p>Follow us on twitter at: <a href="https://twitter.com/ctbbpodcast">https://twitter.com/ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>HackVertor <a href="https://portswigger.net/bappstore/65033cbd2c344fbabe57ac060b5dd100">https://portswigger.net/bappstore/65033cbd2c344fbabe57ac060b5dd100</a> </p><p>Not_An_Aardvark (Teddy Katz) Blog: <a href="https://blog.teddykatz.com/">https://blog.teddykatz.com/</a> </p><p>Tweets from PortSwigger Research:</p><p><a href="https://twitter.com/PortSwiggerRes/status/1632742844535324677">https://twitter.com/PortSwiggerRes/status/1632742844535324677</a></p><p><a href="https://twitter.com/PortSwiggerRes/status/1630221223874445314">https://twitter.com/PortSwiggerRes/status/1630221223874445314</a></p><p><a href="https://twitter.com/PortSwiggerRes/status/1629131380473970688">https://twitter.com/PortSwiggerRes/status/1629131380473970688</a></p><p>HackerOne LHE Standards: <a href="https://www.hackerone.com/hackerone-community-blog/get-invited-how-live-hacking-event-invites-have-changed">https://www.hackerone.com/hackerone-community-blog/get-invited-how-live-hacking-event-invites-have-changed</a> </p><p>Rez0 Bug Bounty Tweet: <a href="https://twitter.com/rez0__/status/1553371602770960384?t=NCr_esHcEts9PrcjxIZ5uw&amp;s=19">https://twitter.com/rez0__/status/1553371602770960384?t=NCr_esHcEts9PrcjxIZ5uw&amp;s=19</a></p><p>Rojan’s Github Bug: <a href="https://twitter.com/uraniumhacker/status/1633199768263593984">https://twitter.com/uraniumhacker/status/1633199768263593984</a></p><p>Goodbye Daily Swig: <a href="https://portswigger.net/daily-swig/were-going-teetotal-its-goodbye-to-the-daily-swig">https://portswigger.net/daily-swig/were-going-teetotal-its-goodbye-to-the-daily-swig</a> </p><p>Gareth Heyes JavaScript for Hackers:<a href="https://leanpub.com/javascriptforhackers/">https://leanpub.com/javascriptforhackers/</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 10: In this episode of Critical Thinking - Bug Bounty Podcast we talk about what its like to be a full-time bug bounty hunter, a tonne of bug bounty news, and some great report summaries from Justin’s two mentees: Kodai and Soma. Follow us ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>10</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">e966859a-ab2d-4f64-9e8a-351d9dbe37e8</guid>
  <title><![CDATA[Episode 9: Headless Browser SSRF & RebindMultiA Tool Release + Web3 Bug]]></title>
  <description><![CDATA[<p>Episode 9: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Headless Browser SSRF and drop a tool called RebindMultiA. Joel also walks us through a web3 bug and we cover some bug bounty news from the past week. As always, we drop some bug bounty tips and give you some attack vectors to think about.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Truffle Security End-To-End Encryption Video:</p><p><a href="https://www.youtube.com/watch?v=BBcZcoIZ1Jc">https://www.youtube.com/watch?v=BBcZcoIZ1Jc</a></p><p>HackerOne World Cup:</p><p><a href="https://www.hackerone.com/hackers/brand-ambassador-program">https://www.hackerone.com/hackers/brand-ambassador-program</a></p><p>HackerOne World Cup Sign Up Form for USA:</p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSeRQpH2y0J-opxlsz8dPkvnIu8BqC_DA3CJe_eFhTFroPwdcg/viewform">https://docs.google.com/forms/d/e/1FAIpQLSeRQpH2y0J-opxlsz8dPkvnIu8BqC_DA3CJe_eFhTFroPwdcg/viewform</a></p><p>ChatGPT API:</p><p><a href="https://openai.com/blog/introducing-chatgpt-and-whisper-apis">https://openai.com/blog/introducing-chatgpt-and-whisper-apis</a></p><p>Megachad RobertMD GitHub Issue:</p><p><a href="https://github.com/nccgroup/singularity/issues/2">https://github.com/nccgroup/singularity/issues/2</a></p><p>Justin’s RebindMultiA Tool:</p><p><a href="https://github.com/Rhynorater/rebindMultiA">https://github.com/Rhynorater/rebindMultiA</a></p><p>Brandon Dorsey’s WhoNow Tool:</p><p><a href="https://github.com/brannondorsey/whonow">https://github.com/brannondorsey/whonow</a></p><p>NCC Group’s Singularity:</p><p><a href="https://github.com/nccgroup/singularity">https://github.com/nccgroup/singularity</a></p><p>Chromium Disclosed Bugs:</p><p><a href="https://chromium-disclosed-bugs.appspot.com/">https://chromium-disclosed-bugs.appspot.com/</a></p><p>NahamSec Talk on Headless Browser SSRF:</p><p><a href="https://docs.google.com/presentation/d/1JdIjHHPsFSgLbaJcHmMkE904jmwPM4xdhEuwhy2ebvo/htmlpresen">https://docs.google.com/presentation/d/1JdIjHHPsFSgLbaJcHmMkE904jmwPM4xdhEuwhy2ebvo/htmlpresen</a></p><p>Jonathan Bowman - LFI via &lt;annotation&gt;:</p><p><a href="https://medium.com/@jonathanbouman/local-file-inclusion-at-ikea-com-e695ed64d82f">https://medium.com/@jonathanbouman/local-file-inclusion-at-ikea-com-e695ed64d82f</a></p><p>WASM Port Scanning:</p><p><a href="https://github.com/avilum/portsscan">https://github.com/avilum/portsscan</a></p><p>Jack Halon - Chrome Browser Exploitation:</p><p><a href="https://twitter.com/jack_halon/status/1583957704930131968">https://twitter.com/jack_halon/status/1583957704930131968</a></p><p>DNSChef:</p><p><a href="https://github.com/iphelix/dnschef">https://github.com/iphelix/dnschef</a></p>]]></description>
  <embed_id>eca61d8f-0cb4-46ed-b125-22c67aaa2c0c</embed_id>
  <pubDate>Thu, 02 Mar 2023 10:01:12 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="65925333" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/cab36c96-d3cb-48cc-964d-6b919a3a58b6/episode.mp3" />
  <itunes:title><![CDATA[Episode 9: Headless Browser SSRF & RebindMultiA Tool Release + Web3 Bug]]></itunes:title>
  <itunes:duration>1:08:40</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 9: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Headless Browser SSRF and drop a tool called RebindMultiA. Joel also walks us through a web3 bug and we cover some bug bounty news from the past week. As always, we drop some bug bounty tips and give you some attack vectors to think about.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Truffle Security End-To-End Encryption Video:</p><p><a href="https://www.youtube.com/watch?v=BBcZcoIZ1Jc">https://www.youtube.com/watch?v=BBcZcoIZ1Jc</a></p><p>HackerOne World Cup:</p><p><a href="https://www.hackerone.com/hackers/brand-ambassador-program">https://www.hackerone.com/hackers/brand-ambassador-program</a></p><p>HackerOne World Cup Sign Up Form for USA:</p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSeRQpH2y0J-opxlsz8dPkvnIu8BqC_DA3CJe_eFhTFroPwdcg/viewform">https://docs.google.com/forms/d/e/1FAIpQLSeRQpH2y0J-opxlsz8dPkvnIu8BqC_DA3CJe_eFhTFroPwdcg/viewform</a></p><p>ChatGPT API:</p><p><a href="https://openai.com/blog/introducing-chatgpt-and-whisper-apis">https://openai.com/blog/introducing-chatgpt-and-whisper-apis</a></p><p>Megachad RobertMD GitHub Issue:</p><p><a href="https://github.com/nccgroup/singularity/issues/2">https://github.com/nccgroup/singularity/issues/2</a></p><p>Justin’s RebindMultiA Tool:</p><p><a href="https://github.com/Rhynorater/rebindMultiA">https://github.com/Rhynorater/rebindMultiA</a></p><p>Brandon Dorsey’s WhoNow Tool:</p><p><a href="https://github.com/brannondorsey/whonow">https://github.com/brannondorsey/whonow</a></p><p>NCC Group’s Singularity:</p><p><a href="https://github.com/nccgroup/singularity">https://github.com/nccgroup/singularity</a></p><p>Chromium Disclosed Bugs:</p><p><a href="https://chromium-disclosed-bugs.appspot.com/">https://chromium-disclosed-bugs.appspot.com/</a></p><p>NahamSec Talk on Headless Browser SSRF:</p><p><a href="https://docs.google.com/presentation/d/1JdIjHHPsFSgLbaJcHmMkE904jmwPM4xdhEuwhy2ebvo/htmlpresen">https://docs.google.com/presentation/d/1JdIjHHPsFSgLbaJcHmMkE904jmwPM4xdhEuwhy2ebvo/htmlpresen</a></p><p>Jonathan Bowman - LFI via &lt;annotation&gt;:</p><p><a href="https://medium.com/@jonathanbouman/local-file-inclusion-at-ikea-com-e695ed64d82f">https://medium.com/@jonathanbouman/local-file-inclusion-at-ikea-com-e695ed64d82f</a></p><p>WASM Port Scanning:</p><p><a href="https://github.com/avilum/portsscan">https://github.com/avilum/portsscan</a></p><p>Jack Halon - Chrome Browser Exploitation:</p><p><a href="https://twitter.com/jack_halon/status/1583957704930131968">https://twitter.com/jack_halon/status/1583957704930131968</a></p><p>DNSChef:</p><p><a href="https://github.com/iphelix/dnschef">https://github.com/iphelix/dnschef</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 9: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Headless Browser SSRF and drop a tool called RebindMultiA. Joel also walks us through a web3 bug and we cover some bug bounty news from the past week. As always, we drop some bug bounty tips and give you some attack vectors to think about.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Truffle Security End-To-End Encryption Video:</p><p><a href="https://www.youtube.com/watch?v=BBcZcoIZ1Jc">https://www.youtube.com/watch?v=BBcZcoIZ1Jc</a></p><p>HackerOne World Cup:</p><p><a href="https://www.hackerone.com/hackers/brand-ambassador-program">https://www.hackerone.com/hackers/brand-ambassador-program</a></p><p>HackerOne World Cup Sign Up Form for USA:</p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSeRQpH2y0J-opxlsz8dPkvnIu8BqC_DA3CJe_eFhTFroPwdcg/viewform">https://docs.google.com/forms/d/e/1FAIpQLSeRQpH2y0J-opxlsz8dPkvnIu8BqC_DA3CJe_eFhTFroPwdcg/viewform</a></p><p>ChatGPT API:</p><p><a href="https://openai.com/blog/introducing-chatgpt-and-whisper-apis">https://openai.com/blog/introducing-chatgpt-and-whisper-apis</a></p><p>Megachad RobertMD GitHub Issue:</p><p><a href="https://github.com/nccgroup/singularity/issues/2">https://github.com/nccgroup/singularity/issues/2</a></p><p>Justin’s RebindMultiA Tool:</p><p><a href="https://github.com/Rhynorater/rebindMultiA">https://github.com/Rhynorater/rebindMultiA</a></p><p>Brandon Dorsey’s WhoNow Tool:</p><p><a href="https://github.com/brannondorsey/whonow">https://github.com/brannondorsey/whonow</a></p><p>NCC Group’s Singularity:</p><p><a href="https://github.com/nccgroup/singularity">https://github.com/nccgroup/singularity</a></p><p>Chromium Disclosed Bugs:</p><p><a href="https://chromium-disclosed-bugs.appspot.com/">https://chromium-disclosed-bugs.appspot.com/</a></p><p>NahamSec Talk on Headless Browser SSRF:</p><p><a href="https://docs.google.com/presentation/d/1JdIjHHPsFSgLbaJcHmMkE904jmwPM4xdhEuwhy2ebvo/htmlpresen">https://docs.google.com/presentation/d/1JdIjHHPsFSgLbaJcHmMkE904jmwPM4xdhEuwhy2ebvo/htmlpresen</a></p><p>Jonathan Bowman - LFI via &lt;annotation&gt;:</p><p><a href="https://medium.com/@jonathanbouman/local-file-inclusion-at-ikea-com-e695ed64d82f">https://medium.com/@jonathanbouman/local-file-inclusion-at-ikea-com-e695ed64d82f</a></p><p>WASM Port Scanning:</p><p><a href="https://github.com/avilum/portsscan">https://github.com/avilum/portsscan</a></p><p>Jack Halon - Chrome Browser Exploitation:</p><p><a href="https://twitter.com/jack_halon/status/1583957704930131968">https://twitter.com/jack_halon/status/1583957704930131968</a></p><p>DNSChef:</p><p><a href="https://github.com/iphelix/dnschef">https://github.com/iphelix/dnschef</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 9: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Headless Browser SSRF and drop a tool called RebindMultiA. Joel also walks us through a web3 bug and we cover some bug bounty news from the past week. As always, we ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>9</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">ff3379ad-8c45-4371-8a00-2f8fe8a01a91</guid>
  <title><![CDATA[Episode 8: PostMessage Bugs, CSS Injection, and Bug Drops]]></title>
  <description><![CDATA[<p>Episode 8: In this episode of Critical Thinking - Bug Bounty Podcast we drop some critical bugs which leak raw credit card info. We also discuss some CSS Injection &amp; PostMessage related techniques. It's a short one but a good one! Don't miss it!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>CSS Escape Blog Post:</p><p><a href="https://mathiasbynens.be/notes/css-escapes">https://mathiasbynens.be/notes/css-escapes</a></p><p>Rez0’s blog on ChatGPT:</p><p><a href="https://rez0.blog/hacking/2023/02/21/hacking-with-chatgpt.html">https://rez0.blog/hacking/2023/02/21/hacking-with-chatgpt.html</a></p><p>All the ways to get a reference to a frame (shoutout to @wcbowling for the article):</p><p><a href="https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d">https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d</a></p><p>CSS Painting API:</p><p><a href="https://developer.mozilla.org/en-US/docs/Web/API/CSS_Painting_API">https://developer.mozilla.org/en-US/docs/Web/API/CSS_Painting_API</a></p><p>Import Chaining:</p><p><a href="https://d0nut.medium.com/better-exfiltration-via-html-injection-31c72a2dae8b">https://d0nut.medium.com/better-exfiltration-via-html-injection-31c72a2dae8b</a></p>]]></description>
  <embed_id>707333b0-23cd-4984-9f86-1b9e76318345</embed_id>
  <pubDate>Wed, 22 Feb 2023 10:00:54 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="34522811" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/0dac98b3-0881-4590-94f8-b5b3aea8e85d/episode.mp3" />
  <itunes:title><![CDATA[Episode 8: PostMessage Bugs, CSS Injection, and Bug Drops]]></itunes:title>
  <itunes:duration>35:57</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 8: In this episode of Critical Thinking - Bug Bounty Podcast we drop some critical bugs which leak raw credit card info. We also discuss some CSS Injection &amp; PostMessage related techniques. It's a short one but a good one! Don't miss it!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>CSS Escape Blog Post:</p><p><a href="https://mathiasbynens.be/notes/css-escapes">https://mathiasbynens.be/notes/css-escapes</a></p><p>Rez0’s blog on ChatGPT:</p><p><a href="https://rez0.blog/hacking/2023/02/21/hacking-with-chatgpt.html">https://rez0.blog/hacking/2023/02/21/hacking-with-chatgpt.html</a></p><p>All the ways to get a reference to a frame (shoutout to @wcbowling for the article):</p><p><a href="https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d">https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d</a></p><p>CSS Painting API:</p><p><a href="https://developer.mozilla.org/en-US/docs/Web/API/CSS_Painting_API">https://developer.mozilla.org/en-US/docs/Web/API/CSS_Painting_API</a></p><p>Import Chaining:</p><p><a href="https://d0nut.medium.com/better-exfiltration-via-html-injection-31c72a2dae8b">https://d0nut.medium.com/better-exfiltration-via-html-injection-31c72a2dae8b</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 8: In this episode of Critical Thinking - Bug Bounty Podcast we drop some critical bugs which leak raw credit card info. We also discuss some CSS Injection &amp; PostMessage related techniques. It's a short one but a good one! Don't miss it!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>CSS Escape Blog Post:</p><p><a href="https://mathiasbynens.be/notes/css-escapes">https://mathiasbynens.be/notes/css-escapes</a></p><p>Rez0’s blog on ChatGPT:</p><p><a href="https://rez0.blog/hacking/2023/02/21/hacking-with-chatgpt.html">https://rez0.blog/hacking/2023/02/21/hacking-with-chatgpt.html</a></p><p>All the ways to get a reference to a frame (shoutout to @wcbowling for the article):</p><p><a href="https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d">https://bluepnume.medium.com/every-known-way-to-get-references-to-windows-in-javascript-223778bede2d</a></p><p>CSS Painting API:</p><p><a href="https://developer.mozilla.org/en-US/docs/Web/API/CSS_Painting_API">https://developer.mozilla.org/en-US/docs/Web/API/CSS_Painting_API</a></p><p>Import Chaining:</p><p><a href="https://d0nut.medium.com/better-exfiltration-via-html-injection-31c72a2dae8b">https://d0nut.medium.com/better-exfiltration-via-html-injection-31c72a2dae8b</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 8: In this episode of Critical Thinking - Bug Bounty Podcast we drop some critical bugs which leak raw credit card info. We also discuss some CSS Injection & PostMessage related techniques. It's a short one but a good one! Don't miss it!Fol...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>8</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">e36f103f-a4f7-452b-b3fe-d05db2b62e56</guid>
  <title><![CDATA[Episode 7: PortSwigger Top 10, TruffleSecurity Drama, and More!]]></title>
  <description><![CDATA[<p>Episode 7: In this episode of Critical Thinking - Bug Bounty Podcast we talk about PortSwigger's Top 10 Web Hacking Techniques of 2022 (link below), some drama surrounding TruffleSecurity's XSS Hunter, and, as always, some great bug bounty tips.</p><p>Sorry if the audio is a little rough around the edges this time, should be better than ever next time.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>PortSwigger's Top 10 Web Hacking Techniques of 2022:</p><p><a href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2022">https://portswigger.net/research/top-10-web-hacking-techniques-of-2022</a></p><p>Ian Carroll Cookie Monster:</p><p><a href="https://github.com/iangcarroll/cookiemonster">https://github.com/iangcarroll/cookiemonster</a></p><p>Frans Rosen's postMessage Tracker Chrome Extension:</p><p><a href="https://github.com/fransr/postMessage-tracker">https://github.com/fransr/postMessage-tracker</a></p><p>Notes from Justin on postMessages:</p><p><a href="https://rhynorater.github.io/postMessage-Braindump">https://rhynorater.github.io/postMessage-Braindump</a></p><p>Frans Rosen's research on nginx misconfiguration that are similar to #6:</p><p><a href="https://blog.detectify.com/2020/11/10/common-nginx-misconfigurations/">https://blog.detectify.com/2020/11/10/common-nginx-misconfigurations/</a></p><p>"Mount" Wycheproof 😂:</p><p><a href="https://github.com/google/wycheproof">https://github.com/google/wycheproof</a></p><p><a href="https://en.wikipedia.org/wiki/Mount_Wycheproof">https://en.wikipedia.org/wiki/Mount_Wycheproof</a></p><p>Nathan Davison - Abusing Hop-by-Hop headers:</p><p><a href="https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers">https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers</a></p><p></p><p>Awesome example of client-side path traversal:</p><p><a href="https://erasec.be/blog/client-side-path-manipulation/">https://erasec.be/blog/client-side-path-manipulation/</a></p><p></p><p>Joohoi Ffuf 2.0:</p><p><a href="https://infosec.exchange/@joohoi/109806822104162973">https://infosec.exchange/@joohoi/109806822104162973</a></p><p></p><p>FeroxBuster:</p><p><a href="https://github.com/epi052/feroxbuster">https://github.com/epi052/feroxbuster</a></p>]]></description>
  <embed_id>23e893b1-5b14-40d1-9ec9-3db456f2a1e6</embed_id>
  <pubDate>Thu, 16 Feb 2023 10:00:26 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="54392156" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/5a216f51-6eda-4a08-9f18-180213e1456f/episode.mp3" />
  <itunes:title><![CDATA[Episode 7: PortSwigger Top 10, TruffleSecurity Drama, and More!]]></itunes:title>
  <itunes:duration>56:39</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 7: In this episode of Critical Thinking - Bug Bounty Podcast we talk about PortSwigger's Top 10 Web Hacking Techniques of 2022 (link below), some drama surrounding TruffleSecurity's XSS Hunter, and, as always, some great bug bounty tips.</p><p>Sorry if the audio is a little rough around the edges this time, should be better than ever next time.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>PortSwigger's Top 10 Web Hacking Techniques of 2022:</p><p><a href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2022">https://portswigger.net/research/top-10-web-hacking-techniques-of-2022</a></p><p>Ian Carroll Cookie Monster:</p><p><a href="https://github.com/iangcarroll/cookiemonster">https://github.com/iangcarroll/cookiemonster</a></p><p>Frans Rosen's postMessage Tracker Chrome Extension:</p><p><a href="https://github.com/fransr/postMessage-tracker">https://github.com/fransr/postMessage-tracker</a></p><p>Notes from Justin on postMessages:</p><p><a href="https://rhynorater.github.io/postMessage-Braindump">https://rhynorater.github.io/postMessage-Braindump</a></p><p>Frans Rosen's research on nginx misconfiguration that are similar to #6:</p><p><a href="https://blog.detectify.com/2020/11/10/common-nginx-misconfigurations/">https://blog.detectify.com/2020/11/10/common-nginx-misconfigurations/</a></p><p>"Mount" Wycheproof 😂:</p><p><a href="https://github.com/google/wycheproof">https://github.com/google/wycheproof</a></p><p><a href="https://en.wikipedia.org/wiki/Mount_Wycheproof">https://en.wikipedia.org/wiki/Mount_Wycheproof</a></p><p>Nathan Davison - Abusing Hop-by-Hop headers:</p><p><a href="https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers">https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers</a></p><p></p><p>Awesome example of client-side path traversal:</p><p><a href="https://erasec.be/blog/client-side-path-manipulation/">https://erasec.be/blog/client-side-path-manipulation/</a></p><p></p><p>Joohoi Ffuf 2.0:</p><p><a href="https://infosec.exchange/@joohoi/109806822104162973">https://infosec.exchange/@joohoi/109806822104162973</a></p><p></p><p>FeroxBuster:</p><p><a href="https://github.com/epi052/feroxbuster">https://github.com/epi052/feroxbuster</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 7: In this episode of Critical Thinking - Bug Bounty Podcast we talk about PortSwigger's Top 10 Web Hacking Techniques of 2022 (link below), some drama surrounding TruffleSecurity's XSS Hunter, and, as always, some great bug bounty tips.</p><p>Sorry if the audio is a little rough around the edges this time, should be better than ever next time.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>PortSwigger's Top 10 Web Hacking Techniques of 2022:</p><p><a href="https://portswigger.net/research/top-10-web-hacking-techniques-of-2022">https://portswigger.net/research/top-10-web-hacking-techniques-of-2022</a></p><p>Ian Carroll Cookie Monster:</p><p><a href="https://github.com/iangcarroll/cookiemonster">https://github.com/iangcarroll/cookiemonster</a></p><p>Frans Rosen's postMessage Tracker Chrome Extension:</p><p><a href="https://github.com/fransr/postMessage-tracker">https://github.com/fransr/postMessage-tracker</a></p><p>Notes from Justin on postMessages:</p><p><a href="https://rhynorater.github.io/postMessage-Braindump">https://rhynorater.github.io/postMessage-Braindump</a></p><p>Frans Rosen's research on nginx misconfiguration that are similar to #6:</p><p><a href="https://blog.detectify.com/2020/11/10/common-nginx-misconfigurations/">https://blog.detectify.com/2020/11/10/common-nginx-misconfigurations/</a></p><p>"Mount" Wycheproof 😂:</p><p><a href="https://github.com/google/wycheproof">https://github.com/google/wycheproof</a></p><p><a href="https://en.wikipedia.org/wiki/Mount_Wycheproof">https://en.wikipedia.org/wiki/Mount_Wycheproof</a></p><p>Nathan Davison - Abusing Hop-by-Hop headers:</p><p><a href="https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers">https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers</a></p><p></p><p>Awesome example of client-side path traversal:</p><p><a href="https://erasec.be/blog/client-side-path-manipulation/">https://erasec.be/blog/client-side-path-manipulation/</a></p><p></p><p>Joohoi Ffuf 2.0:</p><p><a href="https://infosec.exchange/@joohoi/109806822104162973">https://infosec.exchange/@joohoi/109806822104162973</a></p><p></p><p>FeroxBuster:</p><p><a href="https://github.com/epi052/feroxbuster">https://github.com/epi052/feroxbuster</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 7: In this episode of Critical Thinking - Bug Bounty Podcast we talk about PortSwigger's Top 10 Web Hacking Techniques of 2022 (link below), some drama surrounding TruffleSecurity's XSS Hunter, and, as always, some great bug bounty tips.Sor...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>7</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">c88a628e-f5ec-4641-bdf8-94371f36f0e6</guid>
  <title><![CDATA[Episode 6: Mobile Hacking Attack Vectors with Teknogeek (Joel Margolis)]]></title>
  <description><![CDATA[<p>Episode 6: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with mobile hacking legend Joel Margolis and get the scoop on his approach to popping bugs on Android.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Joel’s HackerOne Android Hacking Introduction:</p><p><a href="https://t.ly/f87D">https://t.ly/f87D</a></p><p>Android Pixel Lock Screen Bypass</p><p><a href="https://t.ly/Q_qq">https://t.ly/Q_qq</a></p><p>Exploiting Deeplink URLs:</p><p><a href="https://inesmartins.github.io/exploiting-deep-links-in-android-part1/index.html">https://inesmartins.github.io/exploiting-deep-links-in-android-part1/index.html</a></p><p>Joel’s get_schemas tool:</p><p><a href="https://github.com/teknogeek/get_schemas">https://github.com/teknogeek/get_schemas</a></p><p>Example AndroidManfest.xml we referenced:</p><p><a href="https://t.ly/mcN1">https://t.ly/mcN1</a></p><p><a href="https://t.ly/ErVV">https://t.ly/ErVV</a></p><p>Android docs for intent filters:</p><p><a href="https://developer.android.com/guide/components/intents-filters.html">https://developer.android.com/guide/components/intents-filters.html</a></p><p>Android docs for “setAllowContentaccess”:</p><p><a href="https://t.ly/hXOZ">https://t.ly/hXOZ</a></p><p>Android docs for “setAllowFileAccess”:</p><p><a href="https://developer.android.com/reference/android/webkit/WebSettings#setAllowFileAccess(boolean)">https://developer.android.com/reference/android/webkit/WebSettings#setAllowFileAccess(boolean)</a></p><p>Add JavaScript Interface to Webview:</p><p><a href="https://developer.android.com/reference/android/webkit/WebView#addJavascriptInterface(java.lang.Object,%20java.lang.String)">https://developer.android.com/reference/android/webkit/WebView#addJavascriptInterface(java.lang.Object,%20java.lang.String)</a></p><p>Joel’s SSL Pinning Bypass:</p><p><a href="https://gist.github.com/teknogeek/4dc35fb3801bd7f13e5f0da5b784c725">https://gist.github.com/teknogeek/4dc35fb3801bd7f13e5f0da5b784c725</a></p><p>Google Chrome Docs for Intent URLs:</p><p><a href="https://developer.chrome.com/docs/multidevice/android/intents/#considerations">https://developer.chrome.com/docs/multidevice/android/intents/#considerations</a></p><p>Joel’s Bug Bounty Report:</p><p><a href="https://hackerone.com/reports/423467">https://hackerone.com/reports/423467</a></p>]]></description>
  <embed_id>802e2e0b-409c-444a-833b-8f829a603cac</embed_id>
  <pubDate>Thu, 09 Feb 2023 10:00:37 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="95156142" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/aaaa2214-815d-4671-87bf-52e55131a377/episode.mp3" />
  <itunes:title><![CDATA[Episode 6: Mobile Hacking Attack Vectors with Teknogeek (Joel Margolis)]]></itunes:title>
  <itunes:duration>1:39:07</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 6: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with mobile hacking legend Joel Margolis and get the scoop on his approach to popping bugs on Android.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Joel’s HackerOne Android Hacking Introduction:</p><p><a href="https://t.ly/f87D">https://t.ly/f87D</a></p><p>Android Pixel Lock Screen Bypass</p><p><a href="https://t.ly/Q_qq">https://t.ly/Q_qq</a></p><p>Exploiting Deeplink URLs:</p><p><a href="https://inesmartins.github.io/exploiting-deep-links-in-android-part1/index.html">https://inesmartins.github.io/exploiting-deep-links-in-android-part1/index.html</a></p><p>Joel’s get_schemas tool:</p><p><a href="https://github.com/teknogeek/get_schemas">https://github.com/teknogeek/get_schemas</a></p><p>Example AndroidManfest.xml we referenced:</p><p><a href="https://t.ly/mcN1">https://t.ly/mcN1</a></p><p><a href="https://t.ly/ErVV">https://t.ly/ErVV</a></p><p>Android docs for intent filters:</p><p><a href="https://developer.android.com/guide/components/intents-filters.html">https://developer.android.com/guide/components/intents-filters.html</a></p><p>Android docs for “setAllowContentaccess”:</p><p><a href="https://t.ly/hXOZ">https://t.ly/hXOZ</a></p><p>Android docs for “setAllowFileAccess”:</p><p><a href="https://developer.android.com/reference/android/webkit/WebSettings#setAllowFileAccess(boolean)">https://developer.android.com/reference/android/webkit/WebSettings#setAllowFileAccess(boolean)</a></p><p>Add JavaScript Interface to Webview:</p><p><a href="https://developer.android.com/reference/android/webkit/WebView#addJavascriptInterface(java.lang.Object,%20java.lang.String)">https://developer.android.com/reference/android/webkit/WebView#addJavascriptInterface(java.lang.Object,%20java.lang.String)</a></p><p>Joel’s SSL Pinning Bypass:</p><p><a href="https://gist.github.com/teknogeek/4dc35fb3801bd7f13e5f0da5b784c725">https://gist.github.com/teknogeek/4dc35fb3801bd7f13e5f0da5b784c725</a></p><p>Google Chrome Docs for Intent URLs:</p><p><a href="https://developer.chrome.com/docs/multidevice/android/intents/#considerations">https://developer.chrome.com/docs/multidevice/android/intents/#considerations</a></p><p>Joel’s Bug Bounty Report:</p><p><a href="https://hackerone.com/reports/423467">https://hackerone.com/reports/423467</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 6: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with mobile hacking legend Joel Margolis and get the scoop on his approach to popping bugs on Android.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Joel’s HackerOne Android Hacking Introduction:</p><p><a href="https://t.ly/f87D">https://t.ly/f87D</a></p><p>Android Pixel Lock Screen Bypass</p><p><a href="https://t.ly/Q_qq">https://t.ly/Q_qq</a></p><p>Exploiting Deeplink URLs:</p><p><a href="https://inesmartins.github.io/exploiting-deep-links-in-android-part1/index.html">https://inesmartins.github.io/exploiting-deep-links-in-android-part1/index.html</a></p><p>Joel’s get_schemas tool:</p><p><a href="https://github.com/teknogeek/get_schemas">https://github.com/teknogeek/get_schemas</a></p><p>Example AndroidManfest.xml we referenced:</p><p><a href="https://t.ly/mcN1">https://t.ly/mcN1</a></p><p><a href="https://t.ly/ErVV">https://t.ly/ErVV</a></p><p>Android docs for intent filters:</p><p><a href="https://developer.android.com/guide/components/intents-filters.html">https://developer.android.com/guide/components/intents-filters.html</a></p><p>Android docs for “setAllowContentaccess”:</p><p><a href="https://t.ly/hXOZ">https://t.ly/hXOZ</a></p><p>Android docs for “setAllowFileAccess”:</p><p><a href="https://developer.android.com/reference/android/webkit/WebSettings#setAllowFileAccess(boolean)">https://developer.android.com/reference/android/webkit/WebSettings#setAllowFileAccess(boolean)</a></p><p>Add JavaScript Interface to Webview:</p><p><a href="https://developer.android.com/reference/android/webkit/WebView#addJavascriptInterface(java.lang.Object,%20java.lang.String)">https://developer.android.com/reference/android/webkit/WebView#addJavascriptInterface(java.lang.Object,%20java.lang.String)</a></p><p>Joel’s SSL Pinning Bypass:</p><p><a href="https://gist.github.com/teknogeek/4dc35fb3801bd7f13e5f0da5b784c725">https://gist.github.com/teknogeek/4dc35fb3801bd7f13e5f0da5b784c725</a></p><p>Google Chrome Docs for Intent URLs:</p><p><a href="https://developer.chrome.com/docs/multidevice/android/intents/#considerations">https://developer.chrome.com/docs/multidevice/android/intents/#considerations</a></p><p>Joel’s Bug Bounty Report:</p><p><a href="https://hackerone.com/reports/423467">https://hackerone.com/reports/423467</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 6: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with mobile hacking legend Joel Margolis and get the scoop on his approach to popping bugs on Android.Follow us on twitter at: @ctbbpodcastWe're new to this podcasting...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>6</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">a6e48ef9-f3d2-4406-acb4-901cb0a38981</guid>
  <title><![CDATA[Episode 4: H1-407 Event Madness & Takeaways Part 2 w/ Special Guest Spaceraccoon]]></title>
  <description><![CDATA[<p>Episode 4: In this episode of Critical Thinking - Bug Bounty Podcast we have part two of our series on the H1-407 HackerOne Live Hacking Event. This time, we have a special guest SpaceRaccoon (<a href="https://twitter.com/spaceraccoonsec">@spaceraccoonsec</a>) talking about techniques and takeaways from the event.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Spaceraccoon’s blog:</p><p><a href="https://spaceraccoon.dev/">https://spaceraccoon.dev/</a></p><p>Spaceraccoon’s twitter:</p><p><a href="https://twitter.com/spaceraccoonsec">https://twitter.com/spaceraccoonsec</a></p><p>Responder (NTLM Hash harvesting tool):</p><p><a href="https://github.com/lgandx/Responder">https://github.com/lgandx/Responder</a></p><p>The malware reversing course Spaceraccoon recommended:</p><p><a href="https://courses.zero2auto.com/">https://courses.zero2auto.com/</a></p><p>Offensive Security Exploit Development Courses:</p><p><a href="https://www.offensive-security.com/courses-and-certifications/">https://www.offensive-security.com/courses-and-certifications/</a></p>]]></description>
  <embed_id>53da88f8-899d-4118-9959-61a37166b7c6</embed_id>
  <pubDate>Thu, 02 Feb 2023 10:00:37 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="44081837" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/e32fe75f-8045-462a-95be-dd6e23e531a9/episode.mp3" />
  <itunes:title><![CDATA[Episode 4: H1-407 Event Madness & Takeaways Part 2 w/ Special Guest Spaceraccoon]]></itunes:title>
  <itunes:duration>45:55</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 4: In this episode of Critical Thinking - Bug Bounty Podcast we have part two of our series on the H1-407 HackerOne Live Hacking Event. This time, we have a special guest SpaceRaccoon (<a href="https://twitter.com/spaceraccoonsec">@spaceraccoonsec</a>) talking about techniques and takeaways from the event.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Spaceraccoon’s blog:</p><p><a href="https://spaceraccoon.dev/">https://spaceraccoon.dev/</a></p><p>Spaceraccoon’s twitter:</p><p><a href="https://twitter.com/spaceraccoonsec">https://twitter.com/spaceraccoonsec</a></p><p>Responder (NTLM Hash harvesting tool):</p><p><a href="https://github.com/lgandx/Responder">https://github.com/lgandx/Responder</a></p><p>The malware reversing course Spaceraccoon recommended:</p><p><a href="https://courses.zero2auto.com/">https://courses.zero2auto.com/</a></p><p>Offensive Security Exploit Development Courses:</p><p><a href="https://www.offensive-security.com/courses-and-certifications/">https://www.offensive-security.com/courses-and-certifications/</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 4: In this episode of Critical Thinking - Bug Bounty Podcast we have part two of our series on the H1-407 HackerOne Live Hacking Event. This time, we have a special guest SpaceRaccoon (<a href="https://twitter.com/spaceraccoonsec">@spaceraccoonsec</a>) talking about techniques and takeaways from the event.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Spaceraccoon’s blog:</p><p><a href="https://spaceraccoon.dev/">https://spaceraccoon.dev/</a></p><p>Spaceraccoon’s twitter:</p><p><a href="https://twitter.com/spaceraccoonsec">https://twitter.com/spaceraccoonsec</a></p><p>Responder (NTLM Hash harvesting tool):</p><p><a href="https://github.com/lgandx/Responder">https://github.com/lgandx/Responder</a></p><p>The malware reversing course Spaceraccoon recommended:</p><p><a href="https://courses.zero2auto.com/">https://courses.zero2auto.com/</a></p><p>Offensive Security Exploit Development Courses:</p><p><a href="https://www.offensive-security.com/courses-and-certifications/">https://www.offensive-security.com/courses-and-certifications/</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 4: In this episode of Critical Thinking - Bug Bounty Podcast we have part two of our series on the H1-407 HackerOne Live Hacking Event. This time, we have a special guest SpaceRaccoon (@spaceraccoonsec) talking about techniques and takeaway...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>4</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">64e8ab79-7818-463c-aa11-473148994e5a</guid>
  <title><![CDATA[Episode 5: AI Security, Hacking WiFi, the New XSS Hunter, and more]]></title>
  <description><![CDATA[<p>Episode 5: In this episode of Critical Thinking - Bug Bounty Podcast we talk about the new XSS Hunter, MD5 collisions and using ChatGPT for security, and much more!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Save All Resources Chrome Extension: <a href="https://chrome.google.com/webstore/detail/save-all-resources/abpdnfjocnmdomablahdcfnoggeeiedb?hl=en">https://chrome.google.com/webstore/detail/save-all-resources/abpdnfjocnmdomablahdcfnoggeeiedb?hl=en</a></p><p>Corben's AMA: <a href="https://twitter.com/hacker_/status/1620514351521366016">https://twitter.com/hacker_/status/1620514351521366016</a></p><p>Collisions repo: <a href="https://github.com/corkami/collisions">https://github.com/corkami/collisions</a></p>]]></description>
  <embed_id>05cb763f-1c4c-4384-9a70-8811fe714fad</embed_id>
  <pubDate>Thu, 02 Feb 2023 10:00:37 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="51351082" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/493aa98b-8b32-4902-b3ab-d13c371aecc4/episode.mp3" />
  <itunes:title><![CDATA[Episode 5: AI Security, Hacking WiFi, the New XSS Hunter, and more]]></itunes:title>
  <itunes:duration>53:29</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 5: In this episode of Critical Thinking - Bug Bounty Podcast we talk about the new XSS Hunter, MD5 collisions and using ChatGPT for security, and much more!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Save All Resources Chrome Extension: <a href="https://chrome.google.com/webstore/detail/save-all-resources/abpdnfjocnmdomablahdcfnoggeeiedb?hl=en">https://chrome.google.com/webstore/detail/save-all-resources/abpdnfjocnmdomablahdcfnoggeeiedb?hl=en</a></p><p>Corben's AMA: <a href="https://twitter.com/hacker_/status/1620514351521366016">https://twitter.com/hacker_/status/1620514351521366016</a></p><p>Collisions repo: <a href="https://github.com/corkami/collisions">https://github.com/corkami/collisions</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 5: In this episode of Critical Thinking - Bug Bounty Podcast we talk about the new XSS Hunter, MD5 collisions and using ChatGPT for security, and much more!</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Save All Resources Chrome Extension: <a href="https://chrome.google.com/webstore/detail/save-all-resources/abpdnfjocnmdomablahdcfnoggeeiedb?hl=en">https://chrome.google.com/webstore/detail/save-all-resources/abpdnfjocnmdomablahdcfnoggeeiedb?hl=en</a></p><p>Corben's AMA: <a href="https://twitter.com/hacker_/status/1620514351521366016">https://twitter.com/hacker_/status/1620514351521366016</a></p><p>Collisions repo: <a href="https://github.com/corkami/collisions">https://github.com/corkami/collisions</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 5: In this episode of Critical Thinking - Bug Bounty Podcast we talk about the new XSS Hunter, MD5 collisions and using ChatGPT for security, and much more!Follow us on twitter at: @ctbbpodcastWe're new to this podcasting thing, so feel fre...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>5</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">3e0378ee-40bc-48a2-9c37-b9f4e85fa07c</guid>
  <title><![CDATA[Episode 3: H1-407 Event Madness & Takeaways Part 1]]></title>
  <description><![CDATA[<p>Episode 3: In this episode of Critical Thinking - Bug Bounty Podcast we talk about some of the interesting things we’ve learned from participating in HackerOne's H1-407 Live Hacking event. We cover decompiling binaries in various different languages, Windows URI Handlers, Caido, and SameSite Lax + POST.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Frans Rosen S3 Bucket Authorization Blog Post: <a href="https://labs.detectify.com/2018/08/02/bypassing-exploiting-bucket-upload-policies-signed-urls/">https://labs.detectify.com/2018/08/02/bypassing-exploiting-bucket-upload-policies-signed-urls/</a></p><p>Getting code from executables:</p><p><a href="https://github.com/icsharpcode/ILSpy">ILSpy</a></p><p><a href="https://www.jetbrains.com/decompiler/">DotPeek</a></p><p><a href="https://github.com/skylot/jadx">Jadx-GUI</a></p><p><a href="https://github.com/extremecoders-re/pyinstxtractor">Pyinstxtractor</a></p><p><a href="https://github.com/rocky/python-uncompyle6">Uncompyle6</a></p><p>Jub0b’s SameSite Article:</p><p><a href="https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/">https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/</a></p><p>Mgeeky’s Powershell Script to Enumerate Windows App URI Handlers</p><p><a href="https://gist.github.com/mgeeky/5a30a0619a7486b2fb0bd5233490fa64">https://gist.github.com/mgeeky/5a30a0619a7486b2fb0bd5233490fa64</a></p>]]></description>
  <embed_id>6cb63689-08d0-4c41-becb-ca95f557a348</embed_id>
  <pubDate>Thu, 26 Jan 2023 09:30:14 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="44118291" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/7b60b6c8-cedc-4825-b399-5b85f1ea54d0/episode.mp3" />
  <itunes:title><![CDATA[Episode 3: H1-407 Event Madness & Takeaways Part 1]]></itunes:title>
  <itunes:duration>45:57</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 3: In this episode of Critical Thinking - Bug Bounty Podcast we talk about some of the interesting things we’ve learned from participating in HackerOne's H1-407 Live Hacking event. We cover decompiling binaries in various different languages, Windows URI Handlers, Caido, and SameSite Lax + POST.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Frans Rosen S3 Bucket Authorization Blog Post: <a href="https://labs.detectify.com/2018/08/02/bypassing-exploiting-bucket-upload-policies-signed-urls/">https://labs.detectify.com/2018/08/02/bypassing-exploiting-bucket-upload-policies-signed-urls/</a></p><p>Getting code from executables:</p><p><a href="https://github.com/icsharpcode/ILSpy">ILSpy</a></p><p><a href="https://www.jetbrains.com/decompiler/">DotPeek</a></p><p><a href="https://github.com/skylot/jadx">Jadx-GUI</a></p><p><a href="https://github.com/extremecoders-re/pyinstxtractor">Pyinstxtractor</a></p><p><a href="https://github.com/rocky/python-uncompyle6">Uncompyle6</a></p><p>Jub0b’s SameSite Article:</p><p><a href="https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/">https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/</a></p><p>Mgeeky’s Powershell Script to Enumerate Windows App URI Handlers</p><p><a href="https://gist.github.com/mgeeky/5a30a0619a7486b2fb0bd5233490fa64">https://gist.github.com/mgeeky/5a30a0619a7486b2fb0bd5233490fa64</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 3: In this episode of Critical Thinking - Bug Bounty Podcast we talk about some of the interesting things we’ve learned from participating in HackerOne's H1-407 Live Hacking event. We cover decompiling binaries in various different languages, Windows URI Handlers, Caido, and SameSite Lax + POST.</p><p>Follow us on twitter at:<a href="https://twitter.com/ctbbpodcast"> @ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to<a href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Frans Rosen S3 Bucket Authorization Blog Post: <a href="https://labs.detectify.com/2018/08/02/bypassing-exploiting-bucket-upload-policies-signed-urls/">https://labs.detectify.com/2018/08/02/bypassing-exploiting-bucket-upload-policies-signed-urls/</a></p><p>Getting code from executables:</p><p><a href="https://github.com/icsharpcode/ILSpy">ILSpy</a></p><p><a href="https://www.jetbrains.com/decompiler/">DotPeek</a></p><p><a href="https://github.com/skylot/jadx">Jadx-GUI</a></p><p><a href="https://github.com/extremecoders-re/pyinstxtractor">Pyinstxtractor</a></p><p><a href="https://github.com/rocky/python-uncompyle6">Uncompyle6</a></p><p>Jub0b’s SameSite Article:</p><p><a href="https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/">https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/</a></p><p>Mgeeky’s Powershell Script to Enumerate Windows App URI Handlers</p><p><a href="https://gist.github.com/mgeeky/5a30a0619a7486b2fb0bd5233490fa64">https://gist.github.com/mgeeky/5a30a0619a7486b2fb0bd5233490fa64</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 3: In this episode of Critical Thinking - Bug Bounty Podcast we talk about some of the interesting things we’ve learned from participating in HackerOne's H1-407 Live Hacking event. We cover decompiling binaries in various different language...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>3</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">e90bced9-9edb-468f-8905-8bb80714d4a9</guid>
  <title><![CDATA[Episode 2: Exploit Writing & Automation / Do you need to know how to program to hack?]]></title>
  <description><![CDATA[<p>Episode 2: In this episode of Critical Thinking - Bug Bounty Podcast we talk about exploit writing/automation, some new tools released in the industry (Of-CORS), the age old question of "Do you have to know how to program to hack?", a walk-through of some very impactful bug bounty reports, and some tips and tricks for exploit writing.</p><p>Follow us on twitter at: <a href="https://twitter.com/ctbbpodcast">@ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a href="https://twitter.com/realytcracker">YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Of-CORS by TruffleSecurity</p><p><a href="https://trufflesecurity.com/blog/of-cors/">https://trufflesecurity.com/blog/of-cors/</a></p><p><a href="https://github.com/trufflesecurity/of-cors">https://github.com/trufflesecurity/of-cors</a></p><p>CyberChef</p><p><a href="https://gchq.github.io/CyberChef/">https://gchq.github.io/CyberChef/</a></p><p>Curl Converter</p><p><a href="https://curlconverter.com/">https://curlconverter.com/</a></p><p>Caido</p><p><a href="https://caido.io/">https://caido.io/</a></p><p>Copy As Python Requests</p><p><a href="https://portswigger.net/bappstore/b324647b6efa4b6a8f346389730df160">https://portswigger.net/bappstore/b324647b6efa4b6a8f346389730df160</a></p><p>eMMC Card Reader:</p><p><a href="https://www.allsocket.com/">https://www.allsocket.com/</a></p><p>Joel's Funny Automation XKCD:</p><p><a href="https://xkcd.com/1319/">https://xkcd.com/1319/</a></p><p>Flipper:</p><p><a href="https://shop.flipperzero.one/">https://shop.flipperzero.one/</a></p>]]></description>
  <embed_id>a1448ca4-301a-4adf-a94c-439dde9dda96</embed_id>
  <pubDate>Wed, 18 Jan 2023 18:02:03 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="71522925" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/5548d87d-281d-4e16-94c8-8a7499240df5/episode.mp3" />
  <itunes:title><![CDATA[Episode 2: Exploit Writing & Automation / Do you need to know how to program to hack?]]></itunes:title>
  <itunes:duration>1:14:30</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 2: In this episode of Critical Thinking - Bug Bounty Podcast we talk about exploit writing/automation, some new tools released in the industry (Of-CORS), the age old question of "Do you have to know how to program to hack?", a walk-through of some very impactful bug bounty reports, and some tips and tricks for exploit writing.</p><p>Follow us on twitter at: <a href="https://twitter.com/ctbbpodcast">@ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a href="https://twitter.com/realytcracker">YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Of-CORS by TruffleSecurity</p><p><a href="https://trufflesecurity.com/blog/of-cors/">https://trufflesecurity.com/blog/of-cors/</a></p><p><a href="https://github.com/trufflesecurity/of-cors">https://github.com/trufflesecurity/of-cors</a></p><p>CyberChef</p><p><a href="https://gchq.github.io/CyberChef/">https://gchq.github.io/CyberChef/</a></p><p>Curl Converter</p><p><a href="https://curlconverter.com/">https://curlconverter.com/</a></p><p>Caido</p><p><a href="https://caido.io/">https://caido.io/</a></p><p>Copy As Python Requests</p><p><a href="https://portswigger.net/bappstore/b324647b6efa4b6a8f346389730df160">https://portswigger.net/bappstore/b324647b6efa4b6a8f346389730df160</a></p><p>eMMC Card Reader:</p><p><a href="https://www.allsocket.com/">https://www.allsocket.com/</a></p><p>Joel's Funny Automation XKCD:</p><p><a href="https://xkcd.com/1319/">https://xkcd.com/1319/</a></p><p>Flipper:</p><p><a href="https://shop.flipperzero.one/">https://shop.flipperzero.one/</a></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 2: In this episode of Critical Thinking - Bug Bounty Podcast we talk about exploit writing/automation, some new tools released in the industry (Of-CORS), the age old question of "Do you have to know how to program to hack?", a walk-through of some very impactful bug bounty reports, and some tips and tricks for exploit writing.</p><p>Follow us on twitter at: <a href="https://twitter.com/ctbbpodcast">@ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a href="https://twitter.com/realytcracker">YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p>Of-CORS by TruffleSecurity</p><p><a href="https://trufflesecurity.com/blog/of-cors/">https://trufflesecurity.com/blog/of-cors/</a></p><p><a href="https://github.com/trufflesecurity/of-cors">https://github.com/trufflesecurity/of-cors</a></p><p>CyberChef</p><p><a href="https://gchq.github.io/CyberChef/">https://gchq.github.io/CyberChef/</a></p><p>Curl Converter</p><p><a href="https://curlconverter.com/">https://curlconverter.com/</a></p><p>Caido</p><p><a href="https://caido.io/">https://caido.io/</a></p><p>Copy As Python Requests</p><p><a href="https://portswigger.net/bappstore/b324647b6efa4b6a8f346389730df160">https://portswigger.net/bappstore/b324647b6efa4b6a8f346389730df160</a></p><p>eMMC Card Reader:</p><p><a href="https://www.allsocket.com/">https://www.allsocket.com/</a></p><p>Joel's Funny Automation XKCD:</p><p><a href="https://xkcd.com/1319/">https://xkcd.com/1319/</a></p><p>Flipper:</p><p><a href="https://shop.flipperzero.one/">https://shop.flipperzero.one/</a></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 2: In this episode of Critical Thinking - Bug Bounty Podcast we talk about exploit writing/automation, some new tools released in the industry (Of-CORS), the age old question of "Do you have to know how to program to hack?", a walk-through ...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>2</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
<item>
  <guid isPermaLink="false">f4f084c2-755a-49f8-b782-ee319bc5dca0</guid>
  <title><![CDATA[Episode 1: Introductions, Bug Bounty Reports, and BB Tips]]></title>
  <description><![CDATA[<p>Episode 1: In this episode of Critical Thinking - Bug Bounty Podcast, <a href="https://twitter.com/.0xteknogeek">Joel Margolis (aka 0xteknogeek) </a>and <a href="https://twitter.com/rhynorater">Justin Gardner (aka Rhynorater) </a>cover introductions, a couple of cool bug bounty reports, and some really helpful BB Tips.</p><p>Follow us on twitter at: <a href="https://twitter.com/ctbbpodcast">@ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a href="https://twitter.com/realytcracker">YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p>The report Joel was talking about: <a href="https://hackerone.com/reports/1672388">https://hackerone.com/reports/1672388</a></p><p></p>]]></description>
  <embed_id>afa221e8-e668-4cb1-9f86-9b76b10939cb</embed_id>
  <pubDate>Mon, 09 Jan 2023 19:50:30 -0500</pubDate>
  <link>https://criticalthinkingpodcast.io</link>
  <author><![CDATA[info@criticalthinkingpodcast.io (Justin Gardner (Rhynorater) & Joseph Thacker (Rez0))]]></author>
  <enclosure length="53601337" type="audio/mpeg" url="https://audio-delivery.cohostpodcasting.com/audio/8d5e4388-13f4-45c8-b82f-aff313a5ac76/episodes/a93972b1-d001-4dcc-b1b0-0b1d92dc1d27/episode.mp3" />
  <itunes:title><![CDATA[Episode 1: Introductions, Bug Bounty Reports, and BB Tips]]></itunes:title>
  <itunes:duration>55:50</itunes:duration>
  <itunes:summary><![CDATA[<p>Episode 1: In this episode of Critical Thinking - Bug Bounty Podcast, <a href="https://twitter.com/.0xteknogeek">Joel Margolis (aka 0xteknogeek) </a>and <a href="https://twitter.com/rhynorater">Justin Gardner (aka Rhynorater) </a>cover introductions, a couple of cool bug bounty reports, and some really helpful BB Tips.</p><p>Follow us on twitter at: <a href="https://twitter.com/ctbbpodcast">@ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a href="https://twitter.com/realytcracker">YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p>The report Joel was talking about: <a href="https://hackerone.com/reports/1672388">https://hackerone.com/reports/1672388</a></p><p></p>]]></itunes:summary>
  <content:encoded><![CDATA[<p>Episode 1: In this episode of Critical Thinking - Bug Bounty Podcast, <a href="https://twitter.com/.0xteknogeek">Joel Margolis (aka 0xteknogeek) </a>and <a href="https://twitter.com/rhynorater">Justin Gardner (aka Rhynorater) </a>cover introductions, a couple of cool bug bounty reports, and some really helpful BB Tips.</p><p>Follow us on twitter at: <a href="https://twitter.com/ctbbpodcast">@ctbbpodcast</a></p><p>We're new to this podcasting thing, so feel free to send us any feedback here: <a href="mailto:info@criticalthinkingpodcast.io">info@criticalthinkingpodcast.io</a></p><p>Shoutout to <a href="https://twitter.com/realytcracker">YTCracker</a> for the awesome intro music!</p><p>------ Links ------</p><p>Follow your hosts Rhynorater &amp; Teknogeek on twitter:</p><p><a href="https://twitter.com/0xteknogeek">https://twitter.com/0xteknogeek</a></p><p><a href="https://twitter.com/rhynorater">https://twitter.com/rhynorater</a></p><p></p><p>The report Joel was talking about: <a href="https://hackerone.com/reports/1672388">https://hackerone.com/reports/1672388</a></p><p></p>]]></content:encoded>
  <itunes:subtitle><![CDATA[Episode 1: In this episode of Critical Thinking - Bug Bounty Podcast, Joel Margolis (aka 0xteknogeek) and Justin Gardner (aka Rhynorater) cover introductions, a couple of cool bug bounty reports, and some really helpful BB Tips.Follow us on twitter...]]></itunes:subtitle>
  <itunes:explicit>false</itunes:explicit>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:episode>1</itunes:episode>
  <itunes:season>1</itunes:season>
</item>
</channel>
</rss>