Interested in going full-time bug bounty? Check out our blueprint!

Videos

April 6, 2024

DOM Purify Type Confusion by @slonser_

DOM Purify Type Confusion by @slonser_ How? 1. DOM Purify converts XML tags to HTML comment tags 2. Leaving the closing bracket empty, escapes to an HTML context allowing for onerror="alert(1)" and other fun stuff!

View more
April 4, 2024

Words of wisdom from Naffy (@nnwakelam)

If you do these two things well and with any kind of volume or repetition, you should be finding things!

View more
April 4, 2024

Motivation and Methodology with Sam Curry (Zlz) (Ep. 65)

Episode 65: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with Sam Curry to discuss the ethical considerations and effectiveness of hacking, the importance of good intent, and the enjoyment Sam derives from pushing the boundaries to find bugs. He shares stories of his experiences,…

View more
April 2, 2024

Exploiting .NET Remoting via a header!?

Exploiting HTTP request verb confusion via the __RequestVerb header to leak .NET remoting URLs.

View more
March 28, 2024

Is this the best tool JHaddix has EVER built!?

Jason explains how he built his self proclaimed best ever tool - SecGPT.

View more
March 28, 2024

.NET Remoting, CDN Attack Surface, and Recon vs Main App (Ep. 64)

Episode 64: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Justin and Joel delve into .NET remoting and how it can be exploited, a recent bypass in the Dom Purify library and some interesting functionality in the Cloudflare CDN-CGI endpoint. They also touch on the…

View more
March 26, 2024

Finding unknown apex domains using dig, whoisXML API and grep.

Jason explains how he used a few simple tools to find 12 apex domains that no other hunters knew about!

View more
March 24, 2024

Taking things out of the too hard basket to find bugs!

Signing up to developer programs, creating bank accounts and joining reseller programs, are awesome ways to gain additional app functionality that most people can't be bothered to go through!

View more
March 23, 2024

JHaddix inspects webhooks to catch bugs!

Jason Haddix explains why webhooks and integrations are a great starting place to look for bugs.

View more
March 22, 2024

Smuggling sensitive data via CSS injection and sequential import chaining.

Recently smuggled some sensitive data via CSS injection and sequential import chaining!

View more
March 21, 2024

Episode 63: JHaddix Returns

Episode 63: In this episode of Critical Thinking - Bug Bounty Podcast we welcome back Jason Haddix (From Episode 12) to talk about some updates to his The Bug Hunter's Methodology, as well as his own personal life and hacking journey. We talk about the start of his new company,…

View more
March 20, 2024

Dropping cookie bombs for full ATO!

This exploit is da bomb: Exploiting cookie bombing for session hijacking!

View more
March 18, 2024

iFrame Hijacking via window.open

Discovered an iFrame hijack using window.open and two iframes that allowed me to do some fun postMessage stuff.

View more
March 17, 2024

Here's a WEIRD RACE CONDITION BUG for y'all!

JR0ch17 accidentally discovered a bug in an OAuth flow where sending constant requests to the token refresh endpoint without a refresh token or authentication, could grant an access token during another user's login process!

View more
March 16, 2024

This is the FUNNIEST blind XSS story I've heard!

lollll JR0ch17 ruins a guy's day when a year old blind XSS payload finally pops... via a complaint sent to an internal email system about JR0ch17's behaviour.

View more
March 14, 2024

Exploiting DOMPurify with Meta Tag and Redirects for OAuth Token Leakage with JR0ch17.

This one deserves a golf clap for sure.

View more
March 14, 2024

Frontend Language Oddities (Ep. 62)

Episode 62: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel are back with some additional research resources that didn’t make the Portswigger Top-Ten, but that are worth looking at. Follow us on twitter at: https://twitter.com/ctbbpodcast Feel free to send us any feedback here: info@criticalthinkingpodcast.io Shoutout…

View more
March 9, 2024

COURSES, CERTS or SELF-TAUGHT? JR0ch17 shares his thoughts!

Where do you get the most bang for your buck: Courses, certs or self taught? JR0ch17 has done all three so we wanted to get his opinion! Get his full answer here: ctbb.show/61 What do you think?

View more
March 7, 2024

Exploiting PHP Filter Chains for Arbitrary File Read

Using an error based oracle (and some PHP quirks) to arbitrarily exfiltrate a file via PHP filter chains. This technique came 4th in the Portswigger's Top 10 and also made our own HackerNotes Top 5! Get the full details: ctbb.show/61

View more
March 7, 2024

GOD MODE PWNAGE with d3d! Abusing Akamai, to abuse F5, to abuse traffic routes, to steal NTLM creds

Coming in at number 8 is "From Akamai to F5 to NTLM... with love." by d3d! Abusing Akamai with request smuggling, to abuse F5 with cache poisoning, to abuse traffic routes, to steal NTLM credentials. This is what 3 months of research looks like! Get the low down here: ctbb.show/61

View more
March 7, 2024

A Hacker on Wall Street - JR0ch17 (Ep. 61)

Episode 61: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Jasmin Landry to share some stories about startup security, bug bounty, and the challenges of balancing both. He also shares his methodology for discovering OAuth-related bugs, highlights some differences between structured learning and self-teaching,…

View more
March 3, 2024

INSANE technique to exploit near unexploitable races with sub one millisecond hit times!

James Kettle combined Nagle's algorithm with HTTP/2 methods to create a single packet attack, resolving historical race condition issues caused by network jitter. Here's a quick rundown: - Use HTTP2 to bundle multiple HTTP requests into one TCP packet. - Delay the final byte and end stream frame for simultaneous…

View more
March 2, 2024

IS THE BACKSLASH ESCAPED!? If not, this is how you can use them to break context for JS execution.

Everything seems escaped. How about backslashes? If not then you might have found a "Context Break" gadget. Say you've got the following scenario: X = "your input"; Y = "your input"; Try adding a backslash to the end of your input to un-terminate the string. If the backslash isn't escaped…

View more
Feb. 29, 2024

How I exploited a stored image injection vulnerability

I exploited a stored image injection vuln recently where I could repeatedly log a user into a different account and then they could never get access to their own account! Here's how I did it.

View more