Cover image

Published in Security

How we hacked ourselves almost 200 liters of Red Bull?

Join us as we recount the adrenaline-pumping journey through Red Bull’s VDP — 46 actionable reports, 30 trays of energy drink, and a Top 64 on Intigriti.

By SyncodeMay 17, 2025 at 15:00 CEST
Share on Facebook
Share on Twitter
Copy Link

Igniting the Challenge

When Red Bull unveiled their Vulnerability Disclosure Program, the reward wasn’t cash — it was caffeine. Trays upon trays of the world’s favorite energy drink awaited hunters who could unearth security flaws.

For us, it was the perfect storm: a world-class target, a mouthwatering bounty, and prestige on Intigriti’s leaderboard.

One and a half week of active hunting resulted in 46 solid reports, and a lot of lessons, we emerged with ~ 30 trays—a staggering ~ 180 L of Red Bull and a spot among the Top 64 on Intigriti’s all-time list.

What Helped Us Most

There was no single tool or magic trick. What helped was having a clear plan, using what we knew well, and sticking to basic good practice. Here’s what actually made a difference:

Tried-and-Tested Tools

We used Nuclei, ffuf and similar tools often — nothing fancy, just custom templates and wordlists we already trusted. Most of our recon was built around those.

Clean Note-Taking

We kept a shared Markdown doc to track what we tried, what worked, and what didn’t. That made writing reports quicker and avoided re-checking the same stuff.

Deep Recon

Due to the open scope, and Red Bull being a giant company - we utilized Shodan, Censys and other awesome tools to help us map out Red Bull's attack surface

Early Reporting

We submitted reports early. Even for medium or unclear bugs, that got us feedback faster and let us focus on what was still open or in scope.

Severity Snapshot

We submitted 46 valid reports during Red Bull’s VDP. Here’s the severity breakdown:

  • High: 4 reports
  • Medium: 41 reports
  • Low: 1 report

Reward Breakdown

26× Medium (rewarded) → 1 tray each → 26 trays

High (rewarded) → 3 trays each → 9 trays

1 High and 15 Medium reports were duplicates sadly and not rewarded

🎯 Total Reward: ~ 35 trays of Red Bull

Total: 46 Reports

Achievement on Intigriti

Our work didn’t just earn us energy drinks — it earned us serious growth and respect. After weeks of fuzzing endpoints, chaining attack vectors, and writing crystal-clear reports, we cracked into Intigriti’s all-time Top 64 researchers list. For a relatively short campaign, that was a huge leap—and proof that consistency matters more than headcount.

But that wasn’t the end of it. Our effort caught the attention of the platform itself.

In their weekly write-up Bug Bytes #123 , they highlighted us as the “Community Pick of the Week.”

Recognition like that is priceless in the security world — it’s more than a badge. It’s validation from the very platform where the best hackers in the world compete.

It reminded us why we do what we do: to build safer systems, push boundaries, and have fun while doing it.

This hack marathon placed us at #14 on Red Bull Leaderboard of all time

Intigriti Community Pick of the Week

Let’s secure your software

Our expert pentesters simulate attacks to uncover real-world vulnerabilities.

Recent posts

Blog thumbnail

Behind the CVEs: How We Reported Eight Vulnerabilities

Reporting eight CVEs in Axiell Iguana CMS and Combodo iTop through detailed analysis and responsible disclosure.

Read in 10 min
Blog thumbnail

How we hacked ourselves almost 200 liters of Red Bull?

Join us as we recount the adrenaline-pumping journey through Red Bull’s VDP — 46 actionable reports, 30 trays of energy drink, and a Top 64 on Intigriti.

Read in 7 min
Blog thumbnail

Driver Tests — Journey to Bosnia’s #1 Education App

A deep-dive into Syncode’s product, engineering, and growth playbook that moved 100 000+ learners from paper manuals to a 4.8 ★ dual-store mobile experience.

Read in 10 min

Join the newsletter

Subscribe to our monthly newsletter for practical business tips.