Critical Thinking - Bug Bounty Podcast
Critical Thinking - Bug Bounty Podcast

Critical Thinking - Bug Bounty Podcast

Justin Gardner (Rhynorater) & Joseph Thacker (Rez0)

Overview
Episodes

Details

A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.

Recent Episodes

Episode 152: GeminiJack and Agentic Security with Sasi Levi
DEC 11, 2025
Episode 152: GeminiJack and Agentic Security with Sasi Levi
<p>Episode 152: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Sasi Levi from Noma Security to talk about AI and Agentic Security. We also talk about ForcedLeak, a Google Vertex Bug, and debate if Prompt Injection is a real Vuln.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:[email protected]">[email protected]</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>CHeck out our New Christmas Swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Elevation Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/tl-ec">https://ctbb.show/tl-ec</a></p><p>And Noma Security! <a target="_blank" rel="noopener noreferrer nofollow" href="https://noma.security/">https://noma.security/</a></p><p>Today’s Guest: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/sasi2103">https://x.com/sasi2103</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/vercel_platform_protection?type=team">Vercel Platform Protection</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/cramforce/status/1998072892391592195?s=20">Dedicated HackerOne program for Vercel WAF</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://yeswehack.com/programs?scopeType%5B%5D=open-source&amp;page=1">YesWeHack Open Source Programs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide">Android recon for Bug Bounty hunters</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/sasi2103/status/608349038778437632">Sasi's Tweet from 2015</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://noma.security/blog/forcedleak-agent-risks-exposed-in-salesforce-agentforce/">ForcedLeak: AI Agent risks exposed in Salesforce AgentForce</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://danielmiessler.com/blog/is-prompt-injection-a-vulnerability">Is Prompt Injection a Vulnerability?</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:09:16) Google Vertex AI Bug</p><p>(00:29:28) Sasi's Background and Bug Bounty Journey</p><p>(00:38:55) Resources for AI and Agentic Security Methodology</p><p>(00:50:34) ForcedLeak</p><p>(01:02:06) Is Prompt Injection a Vuln?</p>
play-circle icon
81 MIN
Episode 151: Client-side Advanced Topics
DEC 4, 2025
Episode 151: Client-side Advanced Topics
<p>Episode 151: In this episode of Critical Thinking - Bug Bounty Podcast we’re covering Client-side advanced topics. Justin talks Joseph (and us) through Third-Party Cookie Nuances, Iframe Tricks, URL Parsing, and more.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:[email protected]">[email protected]</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Elevation Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/tl-ec">https://ctbb.show/tl-ec</a></p><p>====== Resources ======</p><p>Nowasky's Tweet #1</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nowaskyjr/status/1993421017381744974">https://x.com/nowaskyjr/status/1993421017381744974</a></p><p>Nowasky's Tweet #2</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/nowaskyjr/status/1992717862398800081">https://x.com/nowaskyjr/status/1992717862398800081</a></p><p>rep+ in Chrome DevTools</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/BourAbdelhadi/status/1992622964077179229">https://x.com/BourAbdelhadi/status/1992622964077179229</a></p><p>Terjanq Post from 2021</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/terjanq/status/1421093136022048775">https://x.com/terjanq/status/1421093136022048775</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:58) Client-side news &amp; AI Updates</p><p>(00:12:02) Third-Party Cookie Nuances &amp; PostMessages</p><p>(00:30:09) Iframe Tricks</p><p>(00:47:43) URL Parsing, CSPTS, and Client-side Routes</p>
play-circle icon
67 MIN
Episode 150: ASP.NET MVC Patterns, Popping Oracle Identity, and Esoteric Subdomain Enumeration
NOV 27, 2025
Episode 150: ASP.NET MVC Patterns, Popping Oracle Identity, and Esoteric Subdomain Enumeration
<p>Episode 150: In this episode of Critical Thinking - Bug Bounty Podcast we're highlighting some cool news and research, but not before expressing our gratitude to the Hacker community. We are so thankful for you all!</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:[email protected]">[email protected]</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>Today's Sponsor: ThreatLocker. Check out ThreatLocker Elevation Control</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/tl-ec">https://ctbb.show/tl-ec</a></p><p>====== This Week in Bug Bounty ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hackerone.com/reports/3027461">Cache Overflow on Cloudflare</a></p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://slcyber.io/research-center/breaking-oracles-identity-manager-pre-auth-rce/">Breaking Oracle’s Identity Manager</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://hx01.me/hailcsv.htm">Who Needs a Blind XSS?</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/research/asp-net-mvc-view-engine-search-patterns">ASP.NET MVC View Engine Search Patterns</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/p-e-w/heretic">Heretic</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.google.com/presentation/d/1UOcryh9c7zJ0UnnLwqRLFIyfU5LxSRRRt10c17dV8tI/edit?slide=id.g2d6dd8819b6_0_20#slide=id.g2d6dd8819b6_0_20">Lesser known techniques for large-scale subdomain enum</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bughunters.google.com/learn/invalid-reports/google-products/4655949258227712/antigravity-known-issues#known-issues">Antigravity – Known Issues</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://bugbountydaily.com/">Bug Bounty Daily</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/caido-community/surf">Caido version of AssetNote Surf</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:09:47) Breaking Oracle’s Identity Manager &amp; Who Needs a Blind XSS?</p><p>(00:20:37) <a target="_blank" rel="noopener noreferrer nofollow" href="http://ASP.NET">ASP.NET</a> MVC View Engine Search Patterns &amp; Heretic</p><p>(00:29:04) Lesser known techniques for large-scale subdomain enum</p><p>(00:35:29) Gemini 3 &amp; Antigravity.</p><p>(00:45:57) Bug Bounty Daily </p><p>(00:52:42) Surf for Caido</p>
play-circle icon
57 MIN
Episode 149: DEFCON Debrief: AI Vulns, Unicode Weirdness, and Wild Vulnerability Chains
NOV 20, 2025
Episode 149: DEFCON Debrief: AI Vulns, Unicode Weirdness, and Wild Vulnerability Chains
<p>Episode 149: In this episode of Critical Thinking - Bug Bounty Podcast The DEFCON videos are up, and Justin and Joseph talk through some of their favorites.</p><p>Follow us on <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">X</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:[email protected]">[email protected]</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">Rhynorater</a>, <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">rez0</a> and <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">gr3pme</a> on X: </p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">Discord!</a></p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Resources ======</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lab.ctbb.show/research/unicode-surrogates-to-replacement-characters">Unicode surrogates conversion</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=y_aQQmDMaY4">Prompt. Scan. Exploit</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=RNXCnJvE1Zg&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk">Breaking into thousands of cloud based VPNs with 1 bug</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=mPo-an8BUXc">Examining Access Control Vulnerabilities in GraphQL</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=AOp0QtUORBc&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=6">Smart Bus Smart Hacking</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=LCGm5-ZjKK0">Passkeys Pwned</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=kSJBEZkJ4vM&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=3">Bypassing Intent Destination Checks</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=CUxbDRR0A8I">Gemini Agents in Google Calendar</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=JL2PT1Dac3g">Exploitation of DOM Clobbering Vuln at Scale</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/jackfromeast/TheHulk">TheHulk</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=rLnlLLKISyY&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=4">Smart Devices, Dumb Resets</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=T13YfM8z0lE&amp;list=PL6rDwEAPMIRSsWupDGpV4bMf7CiLTF0wk&amp;index=7">Mac PRT Cookie Theft</a></p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:10:10) Prompt. Scan. Exploit</p><p>(00:23:52) Breaking into thousands of cloud based VPNs with 1 bug</p><p>(00:33:25) Access Control Vulns in GraphQL, Smart Bus Hacking, &amp; Passkeys Pwned</p><p>(00:44:10) Bypassing Intent Destination Checks &amp; Invoking Gemini Agents</p><p>(00:57:08) DOM Clobbering, Mac PRT Cookie Theft, &amp; Smart Devices, Dumb Resets</p>
play-circle icon
62 MIN
Episode 148: MCP Hacking Guide
NOV 13, 2025
Episode 148: MCP Hacking Guide
<p>Episode 148: In this episode of Critical Thinking - Bug Bounty Podcast Justin gives us a crash course on Model Context Protocol.</p><p>Follow us on twitter at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/ctbbpodcast">https://x.com/ctbbpodcast</a></p><p>Got any ideas and suggestions? Feel free to send us any feedback here: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:[email protected]">[email protected]</a></p><p>Shoutout to<a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/realytcracker"> YTCracker</a> for the awesome intro music!</p><p>====== Links ======</p><p>Follow your hosts Rhynorater, rez0 and gr3pme on X: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Rhynorater">https://x.com/Rhynorater</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/rez0__">https://x.com/rez0__</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/gr3pme">https://x.com/gr3pme</a></p><p>====== Ways to Support CTBBPodcast ======</p><p>Hop on the CTBB Discord at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/discord">https://ctbb.show/discord</a>!</p><p>We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</p><p>You can also find some hacker swag at <a target="_blank" rel="noopener noreferrer nofollow" href="https://ctbb.show/merch">https://ctbb.show/merch</a>!</p><p>====== Timestamps ======</p><p>(00:00:00) Introduction</p><p>(00:02:51) MCP Architecture &amp; Authentication</p><p>(00:13:08) Roots, Sampling, &amp; Elicitation</p><p>(00:19:15) Tools and Resources</p>
play-circle icon
32 MIN