Critical Thinking - Bug Bounty Podcast

Episode 143: New Cohost + Client-Side Gadgets, LHE Meta — Instant Global Admin in Entra!

Oct 9, 2025
A new co-host joins the discussion as they dive into the excitement of live hacking events and the strategic dynamics of report writing. Recent news highlights YesWeHack's major EU contract win. The hosts tackle tackling deep pentesting scopes and the advantages of non-chained gadgets. They explore the intricacies of exploiting backend implementations and share clever techniques like client-side attribute smuggling. Insights on the Entra actor token flaw reveal critical vulnerabilities, while practical discussion on tools like Flareprox enhances the technical insights.
Ask episode
AI Snips
Chapters
Books
Transcript
Episode notes
ADVICE

Use Blind Gadgets For Intel

  • Use blind SSRFs or blind XSS as gadgets to infer internal routing and WAF presence.
  • Probe internal-accessible assets via the gadget and observe responses or status codes to deduce protections.
INSIGHT

Secondary Contexts Break RBAC

  • Secondary-context bugs can bypass RBAC when front-end proxies implement access checks that don't extend to backend services.
  • Supplying different org/account IDs in secondary contexts may let you escalate privileges inside the same org.
INSIGHT

Think Like Backend Engineers

  • Thinking like backend engineers reveals logical deductions you can make from black-box observations.
  • Flex those backend-architecture muscles to turn odd app behavior into exploitable leads.
Get the Snipd Podcast app to discover more snips from this episode
Get the app