Episodes

  • Episode 130: Minecraft Hacks to Google Hacking Star - Valentino
    Jul 10 2025

    Episode 130: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Valentino, who shares his journey from hacking Minecraft to becoming a Google hunter. He talks us through several bugs, including an HTML Sanitizer bypass and .NET deserialization, and highlights the hyper creative approaches he tends to employ.

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    Today's Sponsor: ThreatLocker - Patch Management

    https://www.criticalthinkingpodcast.io/TL-patch-management

    Today’s Guest: Valentino - https://blog.3133700.xyz/

    ====== Resources ======

    JMX Manager

    Stored XSS in reclamos

    Command Injection in Vertex AI

    whitepaper-net-deser.pdf

    free-after-use.go

    A Journey Into Finding Vulnerabilities in the PMB Library Management System

    emulated-register_globals.php

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:02:38) JMXProxy Bug Story

    (00:09:46) Intro to Valentino

    (00:29:08) HTML Sanitizer bypass on MercadoLibre

    (00:37:16) Command injection in Vertex AI

    (00:44:10) .NET deserialization, & Argument injection to LFR, & Free after use

    (00:51:33) Luck, creativity, and evolution as Hacker

    (00:59:31) Issues in file extension validation components, Emulated register_globals, & AI Hacking

    Show more Show less
    1 hr and 8 mins
  • Episode 129: Is this how Bug Bounty Ends?
    Jul 3 2025

    Episode 129: In this episode of Critical Thinking - Bug Bounty Podcast we chat about the future of hack bots and human-AI collaboration, the challenges posed by tokenization, and the need for cybersecurity professionals to adapt to the evolving landscape of hacking in the age of AI

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    ====== This Week in Bug Bounty ======

    Improper error handling in async cryptographic operations crashes process

    https://hackerone.com/reports/2817648

    Recon Series #6: Excavating hidden artifacts with Wayback Machine

    https://www.yeswehack.com/learn-bug-bounty/recon-wayback-machine-web-archive

    ====== Resources ======

    This is How They Tell Me Bug Bounty Ends

    https://josephthacker.com/hacking/2025/06/09/this-is-how-they-tell-me-bug-bounty-ends.html

    Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discovery

    https://www.hackerone.com/blog/welcome-hackbots-how-ai-shaping-future-vulnerability-discovery

    Glitch Token

    https://www.youtube.com/watch?v=WO2X3oZEJOA

    Conducting smarter intelligences than me: new orchestras

    https://southbridge-research.notion.site/conducting-smarter-intelligences-than-me

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:04:05) Is this how Bug Bounty Ends?

    (00:11:14) Hackbots and handling leads

    (00:20:50) Hacker chain of thought & Tokenization

    (00:32:54) Context Engineering

    Show more Show less
    36 mins
  • Episode 128: New Research in Blind SSRF and Self-XSS, and How to Architect Source-code Review AI Bots
    Jun 26 2025

    Episode 128: In this episode of Critical Thinking - Bug Bounty Podcast we talking Blind SSRF and Self-XSS, as well as Reversing massive minified JS with AI and a wild Google Logo Ligature Bug

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    Today's Sponsor: ThreatLocker - Patch Management

    ====== This Week in Bug Bounty ======

    BitK's "Payload plz" challenge at LeHack

    ====== Resources ======

    Make Self-XSS Great Again

    Novel SSRF Technique Involving HTTP Redirect Loops

    Surf - Escalate your SSRF vulnerabilities on Modern Cloud Environments

    Gecko: Intent to prototype: Framebusting Intervention

    Conducting smarter intelligences than me: new orchestras

    Mandark

    Lumentis

    jscollab

    Google Logo Ligature Bug

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:03:55) Self-XSS and credentialless iframe

    (00:16:50) Novel SSRF Technique Involving HTTP Redirect Loops

    (00:25:02) Framebusting

    (00:29:13) Reversing massive minified JS with AI

    (00:53:12) Google Logo Ligature Bug

    Show more Show less
    58 mins
  • Episode 127: Drama, PDF as JS Chaos, Bounty Profile Apps, And More
    Jun 19 2025
    Episode 127: In this episode of Critical Thinking - Bug Bounty Podcast we address some recent bug bounty controversy before jumping into a slew of news itemsFollow us on XShoutout to YTCracker for the awesome intro music!Today's Sponsor: Adobe====== This Week In Bug Bounty ======Hackers Guide to Google dorkingYesWeCaidoNew Dojo ChallengeSmart Contract BB tipsRed Team AAS====== Resources ======DisclosedPDF csp bypassBypassing File Upload Restrictions To Exploit Client-Side Path TraversalOBS WebSocket to RCETime in a bottle (or knapsack)How to Differentiate Yourself as a Bug Bounty HunterDisclosed. Onlinehacked-in‘EchoLeak’Piloting Edge CopilotNewtownerTips for agent promptingFirefox XSS vectorsTweet from Masato KinugawaChrome debug() function
    Show more Show less
    1 hr and 7 mins
  • Episode 126: Hacking AI Series: Vulnus ex Machina - Part 3
    Jun 12 2025

    Episode 126: In this episode of Critical Thinking - Bug Bounty Podcast we wrap up Rez0’s AI miniseries ‘Vulnus Ex Machina’. Part 3 includes a showcase of AI Vulns that Rez0 himself has found, and how much they paid out.

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    Today’s Sponsor - ThreatLocker Web Control

    https://www.criticalthinkingpodcast.io/tl-webcontrol

    ====== Resources ======

    Claude Code System Prompt

    Attacking AI Agents

    Probability of Hacks

    New Gemini for Workspace Vulnerability Enabling Phishing & Content Manipulation

    How to Hack AI Agents and Applications

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:02:53) NahamCon Recap, Claude news, and wunderwuzzi writeups

    (00:08:57) Probability of Hacks

    (00:11:27) First AI Vulnerabilities

    (00:18:57) AI Vulns on Google

    (00:25:11) Invisible prompt Injection

    Show more Show less
    39 mins
  • Episode 125: How to Win Live Hacking Events
    Jun 5 2025

    Episode 125: In this episode of Critical Thinking - Bug Bounty Podcast Justin shares insights on how to succeed at live hacking events. We cover pre-event preparations, challenges of collaboration, on-site strategies, and the importance of maintaining a healthy mindset throughout the entire process.

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    ====== This Week in Bug Bounty ======

    Decathlon Public Bug Bounty Program on YesWeHack

    ====== Resources ======

    The Ultimate Double-Clickjacking PoC

    Grafana Full read SSRF and Account Takeover: CVE-2025-4123

    Grafana CVE-2025-4123 Exploit

    What I learned from my first 100 HackerOne Reports

    Root for your friends

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:02:30) The Ultimate Double-Clickjacking PoC, Grafana CVE, & Evan Connelly's first 100 bugs

    (00:10:23) How to win at Live Hacking Events

    (00:11:53) Pre-event

    (00:11:45) Scope Call

    (00:33:11) Dupe window Ends

    (00:36:00) Onsite & and Day of Event

    (00:42:46) Don't define your identity on the outcome

    Show more Show less
    47 mins
  • Episode 124: Bug Bounty Lifestyle = Less Hacking Time?
    May 29 2025

    Episode 124: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph cover some news from around the community, hitting on Joseph’s Anthropic safety testing, Justin’s guest appearance on For Crying Out Cloud, and several fascinating tweets. Then they have a quick Full-time Bug Bounty check-in.

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    Today’s Sponsor - ThreatLocker Web Control

    https://www.criticalthinkingpodcast.io/tl-webcontrol

    ====== This Week in Bug Bounty ======

    Louis Vuitton Public Bug Bounty Program

    CVE-2025-47934 was discovered on one of our Bug Bounty program : OpenPGP.js

    Stored XSS in File Upload Leads to Privilege Escalation and Full Workspace Takeover

    ====== Resources ======

    Jorian tweet

    Clipjacking: Hacked by copying text - Clickjacking but better

    Crying out Cloud Appearance

    Wiz Research takes 1st place in Pwn2Own AI category

    New XSS vector with image tag

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:10:50) Supabase

    (00:13:47) Tweet-research from Jorian and Wyatt Walls.

    (00:20:24) Anthropic safety testing challenge & Wiz Podcast guest appearance

    (00:27:44) New XSS vector, Google i/o, and coding agents

    (00:35:48) Full Time Bug Bounty

    Show more Show less
    45 mins
  • Episode 123: Hacking AI Series: Vulnus ex Machina - Part 2
    May 22 2025

    Episode 123: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with part 2 of Rez0’s miniseries. Today we talk about mastering Prompt Injection, taxonomy of impact, and both triggering traditional Vulns and exploiting AI-specific features.

    Follow us on twitter at: https://x.com/ctbbpodcast

    Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io

    Shoutout to YTCracker for the awesome intro music!

    ====== Links ======

    Follow your hosts Rhynorater and Rez0 on Twitter:

    https://x.com/Rhynorater

    https://x.com/rez0__

    ====== Ways to Support CTBBPodcast ======

    Hop on the CTBB Discord at https://ctbb.show/discord!

    We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.

    You can also find some hacker swag at https://ctbb.show/merch!

    Today’s Sponsor - ThreatLocker User Store

    https://www.criticalthinkingpodcast.io

    /tl-userstore

    ====== This Week in Bug Bounty ======

    Earning a HackerOne 2025 Live Hacking Invite

    https://www.hackerone.com/blog/earning-hackerone-2025-live-hacking-invite

    HTTP header hacks: basic and advanced exploit techniques explored

    https://www.yeswehack.com/learn-bug-bounty/http-header-exploitation

    ====== Resources ======

    Grep.app

    https://vercel.com/blog/migrating-grep-from-create-react-app-to-next-js

    Gemini 2.5 Pro prompt leak

    https://x.com/elder_plinius/status/1913734789544214841

    Pliny's CL4R1T4S

    https://github.com/elder-plinius/CL4R1T4S

    O3

    https://x.com/pdstat/status/1913701997141803329

    ====== Timestamps ======

    (00:00:00) Introduction

    (00:05:25) Grep.app, O3, and Gemini 2.5 Pro prompt leak

    (00:11:09) Delivery and impactful action

    (00:20:44) Mastering Prompt Injection

    (00:30:36) Traditional vulns in Tool Calls, and AI Apps

    (00:37:32) Exploiting AI specific features

    Show more Show less
    44 mins