Interested in going full-time bug bounty? Check out our blueprint!

Videos

June 30, 2024

This is why you need to look gadgets!

Another great example of the importance of gadget hunting as well as bug hunting!

View more
June 28, 2024

Case-sensitive bypass for X-Forwarded-For headers!

Found a gadget where X-Forwarded-For was blocked, but x-forwarded-for was allowed. Tools like ffuf actually auto-capitalize headers so you would easily miss this without manually testing!

View more
June 27, 2024

Bug Bounty Mental - Practical Tips for Staying Sharp & Motivated (Ep.77)

Episode 77: In this episode of Critical Thinking - Bug Bounty Podcast Joel and Justin discuss some fresh writeups including some MongoDB injections, ORMs, and exploits in Kakao and iOS before pivoting into a conversation about staying motivated and avoiding burnout while hunting. Follow us on twitter at: https://twitter.com/ctbbpodcast We're…

View more
June 26, 2024

Is this one of the CRAZIEST XXEs ever?

Some seriously good research dropped on the pod last week. Shout out to Piotr Bazydło and The Zero Day Initiative for this crazy XXE in Microsoft Sharepoint!

View more
June 25, 2024

STOP overcomplicating bug bounties!

Joel's tip of the week: Keep it simple. It's easy to overcomplicate things. Sometimes all you need is a simple match and replace instead of some next level regex!

View more
June 24, 2024

"Cookie XSS" affecting every page and subdomain on Zoom!

H4R3L's "Cookie XSS" affecting almost every Zoom page and subdomain demonstrates the effectiveness of experimenting with escape characters in cookie values. It all started when @H4R3L discovered a CSP Nonce cookie that was being used in every page with a CSP policy. Because Zoom takes their security seriously, there was…

View more
June 21, 2024

How to do a brain reset.

When unmotivated, reset. Ignore excuses, just start small. Just remember it's hard to begin but easy once you're rolling.

View more
June 20, 2024

Match & Replace - HTTP Proxies' Most Underrated Feature (Ep. 76)

Episode 76: In this episode of Critical Thinking - Bug Bounty Podcast we’re talking about Match and Replace and the often overlooked use cases for it, like bypassing paywalls, modifying host headers, and storing payloads. We also talk about the HackerOne Ambassador World Cup and the issues with dupe submissions,…

View more
June 19, 2024

How to stay motivated in bug bounty!

Joel's top tips for staying motivated in bug bounty.

View more
June 18, 2024

NPX Package Manager Confusion with Lupin!

Lupin discovered that many companies were mistakenly calling a package that didn't exist. So what did he do? He claimed it so they downloaded his package instead.

View more
June 16, 2024

The emotional rollercoaster that is bug hunting.

From the peak of happiness to the pit of despair and back again.

View more
June 13, 2024

*Rerun* of The OG Bug Bounty King - Frans Rosen (Ep. 75)

Episode 75: In this episode of Critical Thinking - Bug Bounty Podcast, Justin and Joel are sick, So instead of a new full episode, we're going back 30 episodes to review. Follow us on twitter at: https://twitter.com/ctbbpodcast We're new to this podcasting thing, so feel free to send us any…

View more
June 12, 2024

How deep do you go when looking for secrets in CI/CD Pipelines?

How deep do you go when looking for secrets in CI/CD Pipelines? That's the question. Lupin discusses how devs are exposing orgs via insecure private CI/CD pipelines using their own npm tokens.

View more
June 11, 2024

ACCIDENTALLY found cache poisoning in NPM!

It's one thing when your script works first time. It's whole other thing when it works on the biggest public registry out there!

View more
June 9, 2024

Iframe hijacking via predictable window.open target names.

Whenever you see a pop-up or change happening in an iframe, look to see the window.open call that's doing it and check the name on that. If using a guessable iframe name, you might be able to hijack it and control the flow!

View more
June 7, 2024

You can escape a sandbox from inside an iFrame!?

Leaking the top-level window.location.href by accessing the document.baseURI of a sandboxed iframe with a srcdoc! Credit for this one goes to the one and only Johan Carlsson!

View more
June 6, 2024

Supply Chain Attack Primer - Popping RCE Without an HTTP Request (feat 0xLupin) (Ep. 74)

Episode 74: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Roni "Lupin" Carta for a deep dive into supply chain attacks and dependency confusion. We explore the supply chain attacks, the ethical considerations surrounding maintainers and hosting packages on public registries, and chat about…

View more
June 5, 2024

Adding padding to your requests to bypass WAFs!

It's possible to bypass WAFs by adding as little as 8KB of padding to your requests! Props to Assetnote for creating the O.G nowafspls and Justin for recreating the Caido version!

View more
June 3, 2024

Justin getting SCHOOLED by Johan Calrsson!

Did you know the optional chaining operator "?." can be used to bypass blacklists? Justin didn't but luckily Johan was there to call him out on it. Original tweet here: https://loom.ly/-KVqwlM

View more
June 2, 2024

Exploiting Phone Number Parsing for XSS!

Here are some RFC-compliant payloads to try and put in your telephone number fields on your next target!

View more
May 31, 2024

Dropping a MEGA CRIT on Boxing Day!

That time Cache-Money dropped a mega crit and ruined Peter Yaworski's Christmas...

View more
May 30, 2024

Sandboxed IFrames and WAF Bypasses (Ep. 73)

Episode 73: In this episode of Critical Thinking - Bug Bounty Podcast we give a brief recap of Nahamcon and then touch on some topics like WAF bypass tools, sandboxed iframes, and programs redacting your reports. Follow us on twitter at: https://twitter.com/ctbbpodcast We're new to this podcasting thing, so feel…

View more
May 29, 2024

What to look for when reviewing source code...

Templating is huge for RCE when looking at source code. Stay on the look out for interactions with files, external APIs, Redis, deserialization of binary formats, YAML, JSON etc. They could lead to unintended RCE or prototype pollution.

View more
May 27, 2024

Indirect method invocation in 5 different languages!

Seen a trend recently where vulns are the result of indirect method invocation and there are LOADS of ways to do this. Ruby: obj.send(method, args) PHP: $obj -► $method Python: globals()[method]() Java: Method.invoke(), callable.call() JS: obj[method](), .apply()

View more