Interested in going full-time bug bounty? Check out our blueprint!

Videos

June 2, 2024

Exploiting Phone Number Parsing for XSS!

Here are some RFC-compliant payloads to try and put in your telephone number fields on your next target!

View more
May 31, 2024

Dropping a MEGA CRIT on Boxing Day!

That time Cache-Money dropped a mega crit and ruined Peter Yaworski's Christmas...

View more
May 30, 2024

Sandboxed IFrames and WAF Bypasses (Ep. 73)

Episode 73: In this episode of Critical Thinking - Bug Bounty Podcast we give a brief recap of Nahamcon and then touch on some topics like WAF bypass tools, sandboxed iframes, and programs redacting your reports. Follow us on twitter at: https://twitter.com/ctbbpodcast We're new to this podcasting thing, so feel…

View more
May 29, 2024

What to look for when reviewing source code...

Templating is huge for RCE when looking at source code. Stay on the look out for interactions with files, external APIs, Redis, deserialization of binary formats, YAML, JSON etc. They could lead to unintended RCE or prototype pollution.

View more
May 27, 2024

Indirect method invocation in 5 different languages!

Seen a trend recently where vulns are the result of indirect method invocation and there are LOADS of ways to do this. Ruby: obj.send(method, args) PHP: $obj -► $method Python: globals()[method]() Java: Method.invoke(), callable.call() JS: obj[method](), .apply()

View more
May 24, 2024

The VDP debate continues...

The guys discussing the issue of affordability in starting and maintaining a bug bounty program.

View more
May 23, 2024

Research TLDRs & Smuggling Payloads in Well Known Data Types (Ep. 72)

Episode 72: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel discuss some hot research from the past couple months. This includes ways to smuggle payloads in phone numbers and IPv6 Addresses, the NextJS SSRF, the PDF.JS PoC drop, and a GitHub Enterprise Indirect Method Information…

View more
May 22, 2024

THIS is how to prove the impact of AI bias!

AI bias bugs can be subjective and tricky to prove actual impact. @securingdev shared a great tip on the pod which you may remember from science class: "Keep as many things consistently the same for your inputs with select independent variables."

View more
May 20, 2024

Should the government subsidize VDPs!?

Joel enters the idea of government subsidies into the VDP debate.

View more
May 19, 2024

Is security just another FEATURE!?

Things getting hot and spicy on the pod last week when @securingdev brought up the idea of "Security as a Feature"!

View more
May 18, 2024

Nahamsec secures $50k bonuses for NahamCon!

Nothing adds value like $50,000, right!? Nahamsec dropped some exciting news on the pod last week when talking bonuses for NahamCon.

View more
May 17, 2024

Most people don't use this simple RECON trick!

Dropped this simple but effective recon tip on the pod last week.

View more
May 16, 2024

$300,000 for a SINGLE BOUNTY with Meta!?

Dang, dude, the Meta program is insane. Their biggest bounty is $300k. That's as much as an entire hacking event back in the day! Here's @nahamsec's explaining how crazy this is for hunting.

View more
May 16, 2024

More VDP Chats & AI Bias Bounty Strats with Keith Hoodlet (Ep. 71)

Episode 71: In this episode of Critical Thinking - Bug Bounty Podcast Keith Hoodlet joins us to weigh in on the VDP Debate. He shares some of his insights on when VDPs are appropriate in a company's security posture, and the challenges of securing large organizations. Then we switch gears…

View more
May 14, 2024

Getting schooled by Nahamsec... AGAIN!

Got schooled by @NahamSec when we showed him this common CSP bypass.

View more
May 13, 2024

Why you need to start looking for SCRIPT GADGETS!

Script gadgets can be gold when normal script execution is blocked! Often applications will bind functionality to the action of adding elements with specific classes to the DOM. These can be leveraged as gadgets to build an exploit for your target.

View more
May 11, 2024

He could've BACKDOORED GITLAB's code base!?

Johan Carlsson takes proving impact to the extreme by showing that a GitLab bug could've resulted in an attacker being able to: - Trigger new and existing pipelines - Overwrite variables - Upload images for RCE - Gain full access to all CI variables - [INSERT IMAGINATION]

View more
May 9, 2024

ACCIDENTAL XSS followed by his first encounter with a CSP!

There's a first time for everything! Here's how @joaxcar discovered his first XSS (by accident) followed swiftly by his first experience with a CSP. Sorry Johan! #infosec #bugbounty #bugbounties #cybersecurity #criticalthinking #CTBBpodcast #bugbountytips #bugbountyhunters #hacking #hackers

View more
May 9, 2024

NahamCon and CSP Bypasses Everywhere (Ep. 70)

Episode 70: In this episode of Critical Thinking - Bug Bounty Podcast we’re once again joined by Ben Sadeghipour to talk about some Nahamcon news, as well as discuss a couple other LHE’s taking place. Then they cover CI/CD and drop some cool CSP Bypasses. Follow us on twitter at:…

View more
May 7, 2024

NEXT LEVEL chaining for a CSP bypass in GitHub!?

WOW. Some next level chaining by @joaxcar for this CSP bypass in GitHub! Drag and drop triggers HTML injection which injects a form which triggers a hash change which triggers a button click which injects more and triggers another click gadget which triggers a hash change again which finally triggers…

View more
May 6, 2024

Cloudflare Image Optimization Proxy ALLOWS SUBDOMAIN REDIRECTS via onerror attribute injection

When the pod guests brings a path-based 307 semi-open redirect gadget that affects a large portion of the internet to share on the pod - you know you've found the one. 😍 example[.]com/cdn-cgi/image/onerror=redirect/http://hello[.]example[.]com

View more
May 4, 2024

XSS via HTMX trigger attribute injection into an HTML ELEMENT!?

Another one of ­Mathias' HTMX bugs from the pod. This one is an HTMX trigger attribute injection into an HTML element leading to XSS!

View more
May 2, 2024

XSS via Response Header Injection in HTMX - EXPLAINED

HTMX uses certain headers to help instruct the framework for certain behaviours. This can be abused via HX-Redirect: javascript:alert(1) for XSS if you can inject a response header. Mathias Karlsson explains how...

View more
May 2, 2024

Johan Carlsson - 3 Month Check-in on Full-time Bug Bounty. (Ep. 69)

Episode 69: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Johan Carlsson to hear about some updates on his bug hunting journey. We deep-dive a CSP bypass he found in GitHub, a critical he found in GitLab's pipeline, and also talk through his approach to…

View more