
Episode 137: How We Do AI-Assisted Whitebox Review, New CSPT Gadgets, and Tools from SLCyber
Failed to add items
Add to basket failed.
Add to Wish List failed.
Remove from Wish List failed.
Follow podcast failed
Unfollow podcast failed
-
Narrated by:
-
By:
About this listen
Episode 137: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner and Joseph Thacker reunite to talk about AI Hacking Assistants, CSPT and cache deception, and a bunch of tools like ch.at, Slice, Ebka, and more.
Follow us on twitter at: https://x.com/ctbbpodcast
Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io
Shoutout to YTCracker for the awesome intro music!
====== Links ======
Follow your hosts Rhynorater and Rez0 on Twitter:
https://x.com/Rhynorater
https://x.com/rez0__
====== Ways to Support CTBBPodcast ======
Hop on the CTBB Discord at https://ctbb.show/discord!
We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.
You can also find some hacker swag at https://ctbb.show/merch!
Today’s Sponsor - ThreatLocker. Checkout ThreatLocker DAC!
https://www.criticalthinkingpodcast.io/tl-dac
====== This Week in Bug Bounty ======
Vulnerability vectors: SQL injection for Bug Bounty hunters
Mozilla VPN Clients: RCE via file write and path traversal
====== Resources ======
Cache Deception + CSPT:
dig @ch.at
Searchlight Cyber Tools
Slice
Ebka-Caido-AI
postMessage targetOrigin bypass
====== Timestamps ======
(00:00:00) Introduction
(00:01:26) Claude, Gemini, and Hacking Assistants
(00:11:08) AI Safety
(00:18:09) CSPT
(00:23:26) ch.at, Slice, Ebka, & Searchlight Cyber Tools
(00:45:19) postMessage targetOrigin bypass