<p><span style="background-color: transparent;">Episode 163: In this episode of Critical Thinking - Bug Bounty Podcast It’s that time of year again! We’re looking at the Portswigger Research list of top 10 web hacking techniques of 2025.</span></p><p><br></p><p><span style="background-color: transparent;">Follow us on twitter at: </span><a href="https://x.com/ctbbpodcast" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/ctbbpodcast</a></p><p><span style="background-color: transparent;">Got any ideas and suggestions? Feel free to send us any feedback here: </span><a href="mailto:info@criticalthinkingpodcast.io" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">info@criticalthinkingpodcast.io</a></p><p><span style="background-color: transparent;">Shoutout to</span><a href="https://twitter.com/realytcracker" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);"> YTCracker</a><span style="background-color: transparent;"> for the awesome intro music!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Links ======</span></p><p><span style="background-color: transparent;">Follow your hosts Rhynorater, rez0 and gr3pme on X:&nbsp;</span></p><p><a href="https://x.com/Rhynorater" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/Rhynorater</a></p><p><a href="https://x.com/rez0__" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/rez0__</a></p><p><a href="https://x.com/gr3pme" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://x.com/gr3pme</a></p><p><br></p><p><span style="background-color: transparent;">Critical Research Lab:</span></p><p><a href="https://lab.ctbb.show/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://lab.ctbb.show/</a><span style="background-color: transparent;">&nbsp;</span></p><p><br></p><p><span style="background-color: transparent;">====== Ways to Support CTBBPodcast ======</span></p><p><span style="background-color: transparent;">Hop on the CTBB Discord at </span><a href="https://ctbb.show/discord" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/discord</a><span style="background-color: transparent;">!</span></p><p><br></p><p><span style="background-color: transparent;">We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.</span></p><p><br></p><p><span style="background-color: transparent;">You can also find some hacker swag at </span><a href="https://ctbb.show/merch" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://ctbb.show/merch</a><span style="background-color: transparent;">!</span></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Resources ======</span></p><p><br></p><p><span style="background-color: transparent;">Parser Differentials: When Interpretation Becomes a Vulnerability</span></p><p><a href="https://www.youtube.com/watch?v=Dq_KVLXzxH8" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/watch?v=Dq_KVLXzxH8</a></p><p><br></p><p><span style="background-color: transparent;">XSS-Leak: Leaking Cross-Origin Redirects</span></p><p><a href="https://blog.babelo.xyz/posts/cross-site-subdomain-leak/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.babelo.xyz/posts/cross-site-subdomain-leak/</a></p><p><br></p><p><span style="background-color: transparent;">Playing with HTTP/2 CONNECT</span></p><p><a href="https://blog.flomb.net/posts/http2connect/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.flomb.net/posts/http2connect/</a></p><p><br></p><p><span style="background-color: transparent;">Next.js, cache, and chains: the stale elixir</span></p><p><a href="https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir</a></p><p><br></p><p><span style="background-color: transparent;">SOAPwn: Pwning .NET Framework Apps Through HTTP Client Proxies And WSDL</span></p><p><a href="https://watchtowr.com/wp-content/uploads/SOAPwnwatchtowr_soappwn-research-whitepaper_10-12-2025.pdf" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://watchtowr.com/wp-content/uploads/SOAPwnwatchtowr_soappwn-research-whitepaper_10-12-2025.pdf</a></p><p><br></p><p><span style="background-color: transparent;">Cross-Site ETag Length Leak</span></p><p><a href="https://blog.arkark.dev/2025/12/26/etag-length-leak" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://blog.arkark.dev/2025/12/26/etag-length-leak</a></p><p><br></p><p><span style="background-color: transparent;">Lost in Translation: Exploiting Unicode Normalization</span></p><p><a href="https://www.youtube.com/watch?v=ETB2w-f3pM4" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.youtube.com/watch?v=ETB2w-f3pM4</a></p><p><br></p><p><span style="background-color: transparent;">ORM Leaking More Than You Joined For</span></p><p><a href="https://www.elttam.com/blog/leaking-more-than-you-joined-for/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://www.elttam.com/blog/leaking-more-than-you-joined-for/</a></p><p><br></p><p><span style="background-color: transparent;">Novel SSRF Technique Involving HTTP Redirect Loops</span></p><p><a href="https://slcyber.io/research-center/novel-ssrf-technique-involving-http-redirect-loops/" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://slcyber.io/research-center/novel-ssrf-technique-involving-http-redirect-loops/</a></p><p><br></p><p><span style="background-color: transparent;">Successful Errors: New Code Injection and SSTI Techniques</span></p><p><a href="https://github.com/vladko312/Research_Successful_Errors" target="_blank" style="background-color: transparent; color: rgb(17, 85, 204);">https://github.com/vladko312/Research_Successful_Errors</a></p><p><br></p><p><br></p><p><br></p><p><span style="background-color: transparent;">====== Timestamps ======</span></p><p><span style="background-color: transparent;">(00:00:00) Introduction</span></p><p><span style="background-color: transparent;">(00:02:33) Parser Differentials: When Interpretation Becomes a Vulnerability</span></p><p><span style="background-color: transparent;">(00:11:02) XSS-Leak: Leaking Cross-Origin Redirects</span></p><p><span style="background-color: transparent;">(00:18:25) Playing with HTTP/2 CONNECT</span></p><p><span style="background-color: transparent;">(00:22:10) Next.js, cache, and chains: the stale elixir</span></p><p><span style="background-color: transparent;">(00:29:15) SOAPwn: Pwning .NET Framework Apps Through HTTP Client Proxies And WSDL</span></p><p><span style="background-color: transparent;">(00:34:27) Cross-Site ETag Length Leak</span></p><p><span style="background-color: transparent;">(00:41:47) Lost in Translation: Exploiting Unicode Normalization</span></p><p><span style="background-color: transparent;">(00:47:27) ORM Leaking More Than You Joined For</span></p><p><span style="background-color: transparent;">(00:54:07) Novel SSRF Technique Involving HTTP Redirect Loops</span></p><p><span style="background-color: transparent;">(00:58:40) Successful Errors: New Code Injection and SSTI Techniques</span></p>

Critical Thinking - Bug Bounty Podcast

[email protected] (Justin Gardner (Rhynorater), Joseph Thacker (Rez0), & Brandyn Murtagh (gr3pme))

Episode 163: Best Technical Takeaways from Portswigger Top 10 2025

FEB 26, 202668 MIN
Critical Thinking - Bug Bounty Podcast

Episode 163: Best Technical Takeaways from Portswigger Top 10 2025

FEB 26, 202668 MIN

Description

Episode 163: In this episode of Critical Thinking - Bug Bounty Podcast It’s that time of year again! We’re looking at the Portswigger Research list of top 10 web hacking techniques of 2025.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here: [email protected] to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater, rez0 and gr3pme on X: https://x.com/Rhynoraterhttps://x.com/rez0__https://x.com/gr3pmeCritical Research Lab:https://lab.ctbb.show/ ====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!====== Resources ======Parser Differentials: When Interpretation Becomes a Vulnerabilityhttps://www.youtube.com/watch?v=Dq_KVLXzxH8XSS-Leak: Leaking Cross-Origin Redirectshttps://blog.babelo.xyz/posts/cross-site-subdomain-leak/Playing with HTTP/2 CONNECThttps://blog.flomb.net/posts/http2connect/Next.js, cache, and chains: the stale elixirhttps://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixirSOAPwn: Pwning .NET Framework Apps Through HTTP Client Proxies And WSDLhttps://watchtowr.com/wp-content/uploads/SOAPwnwatchtowr_soappwn-research-whitepaper_10-12-2025.pdfCross-Site ETag Length Leakhttps://blog.arkark.dev/2025/12/26/etag-length-leakLost in Translation: Exploiting Unicode Normalizationhttps://www.youtube.com/watch?v=ETB2w-f3pM4ORM Leaking More Than You Joined Forhttps://www.elttam.com/blog/leaking-more-than-you-joined-for/Novel SSRF Technique Involving HTTP Redirect Loopshttps://slcyber.io/research-center/novel-ssrf-technique-involving-http-redirect-loops/Successful Errors: New Code Injection and SSTI Techniqueshttps://github.com/vladko312/Research_Successful_Errors====== Timestamps ======(00:00:00) Introduction(00:02:33) Parser Differentials: When Interpretation Becomes a Vulnerability(00:11:02) XSS-Leak: Leaking Cross-Origin Redirects(00:18:25) Playing with HTTP/2 CONNECT(00:22:10) Next.js, cache, and chains: the stale elixir(00:29:15) SOAPwn: Pwning .NET Framework Apps Through HTTP Client Proxies And WSDL(00:34:27) Cross-Site ETag Length Leak(00:41:47) Lost in Translation: Exploiting Unicode Normalization(00:47:27) ORM Leaking More Than You Joined For(00:54:07) Novel SSRF Technique Involving HTTP Redirect Loops(00:58:40) Successful Errors: New Code Injection and SSTI Techniques