У нас вы можете посмотреть бесплатно Drama, PDF as JS Chaos, Bounty Profile Apps, And More (Ep. 127) или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Episode 127: In this episode of Critical Thinking - Bug Bounty Podcast we address some recent bug bounty controversy before jumping into a slew of news items, as well as talking about how to hack efficiently and Hackedin vs. Disclosed Online. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: [email protected] Shoutout to / realytcracker for the awesome intro music! ====== Links ====== Follow your hosts Rhynorater and Rez0 on Twitter: https://x.com/Rhynorater https://x.com/rez0__ ====== Ways to Support CTBBPodcast ====== Hop on the CTBB Discord at https://ctbb.show/discord! We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc. You can also find some hacker swag at https://ctbb.show/merch! Today’s Sponsor: Adobe: hackerone.com/adobe ====== This Week In Bug Bounty ====== Hackers Guide to Google dorking https://www.yeswehack.com/learn-bug-b... YesWeCaido https://www.yeswehack.com/learn-bug-b... New Dojo challenge https://dojo-yeswehack.com/challenge-... Smart Contract BB tips: https://www.hackerone.com/blog/smart-... Red Team AAS Good addition to the pentest AAS and another chance for hacker to work with/for BC https://www.bugcrowd.com/blog/introdu... ====== Resources ====== Disclosed https://getdisclosed.com/ PDF csp bypass https://x.com/xssdoctor/status/193295... Bypassing File Upload Restrictions To Exploit Client-Side Path Traversal https://blog.doyensec.com/2025/01/09/... OBS WebSocket to RCE https://jorianwoltjer.com/blog/p/rese... Time in a bottle (or knapsack) https://www.sensecurity.io/time-in-a-... How to Differentiate Yourself as a Bug Bounty Hunter • How to Differentiate Yourself as a Bug Bou... Disclosed. Online https://www.disclosedonline.com/ hacked-in https://hackedin.net/ ‘EchoLeak’ https://www.aim.security/lp/aim-labs-... Piloting Edge Copilot https://archive.codeblue.jp/2024/file... Newtowner https://github.com/assetnote/newtowner Tips for agent prompting https://x.com/Jhaddix/status/19318347... Firefox XSS vectors https://x.com/garethheyes/status/1932... Tweet from Masato Kinugawa https://x.com/kinugawamasato/status/1... Chrome debug() function https://x.com/J0R1AN/status/193346315... ====== Timestamps ====== (00:00:00) Introduction (00:07:40) Disclosed (00:10:57) PDF CSP and OBS Websocket to RCE (00:17:54) Time in a bottle & and hacking efficiently (00:27:03) Hackedin vs. Disclosed Online (00:35:39) ‘EchoLeak’ & Piloting Edge Copilot (00:46:03) Newtowner & tips for agent prompting (00:53:57) Firefox XSS trick & AI Training Data (01:02:23) Chrome debug() function