In this episode of Critical Thinking - Bug Bounty Podcast, the CSRF’s up, dude! We kick off with a debate about whether or not deep link vulns in mobile apps can be considered CSRF. We also talk browser extensions and tools like Hackbar, PwnFox, and JS Weasel, and Justin tries to invent a whole new vuln term. There’s plenty of good stuff here, so what are you waiting for? Jump on in!
Follow us on twitter at: https://twitter.com/ctbbpodcast
We're new to this podcasting thing, so feel free to send us any feedback here: info@criticalthinkingpodcast.io
Shoutout to YTCracker for the awesome intro music!
====== Links ======
Follow your hosts Rhynorater & Teknogeek on twitter:
- https://twitter.com/0xteknogeek
- https://twitter.com/rhynorater
rez0's latest tip: https://twitter.com/rez0__/status/168134822190014466019
Hackbar: https://addons.mozilla.org/en-US/firefox/addon/hackbartool/
PwnFox: https://twitter.com/adrien_jeanneau/status/1681364665354289152
JS Weasel: https://www.jswzl.io/
Charlie Eriksen: https://twitter.com/CharlieEriksen
Link to talk by Rojan: https://twitter.com/uraniumhacker/status/1681381857383030785
Bypassing GitHub's OAuth flow: https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html
Great SameSite Confusion: https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/
Check out NahamSec's Channel: https://www.youtube.com/c/nahamsec
====== Timestamps ======
(00:00:00) Intro
(00:01:45) The deep link debate
(00:08:00) LHE and in-person interviews
(00:09:25) SQLMAP and raw requests
(00:11:11) Hackbar, PwnFox, and browser extensions
(00:16:45) JS Weasel tool and its features
(00:25:28) Rojan's Research and Public Talks
(Start of main content)
(00:28:36) Cross-Site Request Forgery (CSRF)
(00:35:00) Bypassing GitHub's OAuth flow
(00:45:00) A Small SameSite Story
(00:48:50) CSRF Exploitation Techniques
(01:07:15) CSRF Bug Stories
(01:15:30) NahamSec and DEFCON