No video

Zoom - turning on someone's camera using SQL injection vulnerability - Bug Bounty Reports Explained

  Рет қаралды 223,431

Bug Bounty Reports Explained

Bug Bounty Reports Explained

Күн бұрын

Пікірлер: 437
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
Welcome to the comment section! First, thanks for watching! Make sure you are subscribed if you liked the video! kzbin.info Follow me on twitter: twitter.com/gregxsunday ✉️ Sign up for the mailing list ✉️ mailing.bugbountyexplained.com/ ☕️ Support my channel ☕️ www.buymeacoffee.com/bountyexplained 🖥 Get $100 in credits for Digital Ocean 🖥 m.do.co/c/cc700f81d215
@techchannel3107
@techchannel3107 3 жыл бұрын
hey bro are you from us? because your speaking is not same with us
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
@@techchannel3107 nope, Im from Poland
@techchannel3107
@techchannel3107 3 жыл бұрын
@@BugBountyReportsExplained ok my guess is right
@iplaynone1870
@iplaynone1870 2 жыл бұрын
thanks for welcoming me🤣
@MrREALball
@MrREALball 3 жыл бұрын
Imagine having SQL INJECTION vulnerability in 2020 in your app
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
There are many of those, but somehow undetected yet
@user-fd4pv2rb8u
@user-fd4pv2rb8u 3 жыл бұрын
The two main attacks on how things get hacked is SQL & XSS
@femmeNikita27
@femmeNikita27 3 жыл бұрын
@@asanokatana Well, Zoom can wait for its corporate clients to watch this video after using Zoom for internal meetings on sensitive corporate financial issues or partents and school directors who use it for education and the public outcry coming from this might be the end of Zoom. But yes, safety-wise it is interesting content. Although if this issue doesn't not get resolved asap and if such corner cutting wil become a common place within any provider of on-line conferencing platform it can bring entire companies down. In more than one way.
@teknastyk
@teknastyk 3 жыл бұрын
now imagine half a country using it professionally and semi professionally like schools, and the gov openly brags about it how they opnely support this... :D 2020 is just epic - never thought i'd live to see all this
@user-fd4pv2rb8u
@user-fd4pv2rb8u 3 жыл бұрын
@@teknastyk yeah that sucks and probably many more exploits out there just waiting to be found
@NeseComedy
@NeseComedy 3 жыл бұрын
"Why do you cover up your camera? Are you paranoid?" yes
@BenREDCZ
@BenREDCZ 3 жыл бұрын
better to watch my ugly face than my expensive files :)))))
@satansatan9993
@satansatan9993 3 жыл бұрын
@@BenREDCZ if they can turn ur camera on, trust me they are doing way more than just watching u lol
@abofhad4378
@abofhad4378 3 жыл бұрын
Thanks a lot Mister
@soham2106
@soham2106 3 жыл бұрын
Me who doesn't even plug in the usb that connects the webcam: interesting
@channelbtech6497
@channelbtech6497 3 жыл бұрын
Same here 😆
@StunXPlayz
@StunXPlayz 3 жыл бұрын
Same XD
@NStripleseven
@NStripleseven 3 жыл бұрын
Lol same
@fitmotheyap
@fitmotheyap 3 жыл бұрын
when i don't use webcam i always unplug it.
@soham2106
@soham2106 3 жыл бұрын
@@fitmotheyap same here. I just plug in for a few minutes when I am required to switch on the video
@yashithabanu7173
@yashithabanu7173 3 жыл бұрын
Hats off for the Researcher who found this !!!! Totally out of the box 🔥🔥
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
yeah, this is very cool indeed
@dargy
@dargy 3 жыл бұрын
these type of encoding mangling problems are p common when it comes to web app stuff, p cool to see it translating well in an actual desktop app
@narasimhaswamy5464
@narasimhaswamy5464 3 жыл бұрын
Never expected this type of vulnerability.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
yeah, that's a definitely a nice one
@kruemmelbande5078
@kruemmelbande5078 3 жыл бұрын
*laughs in virtual machine*
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
😂
@teknastyk
@teknastyk 3 жыл бұрын
i hope you run thru a decen hypervisor and not leave your ram exposed just like that. its 2020. vms are so 2009 xD
@kruemmelbande5078
@kruemmelbande5078 3 жыл бұрын
@@teknastyk Well, i dont think zoom is gonna jump a vm
@TheJinx64
@TheJinx64 3 жыл бұрын
@@teknastyk ok ms i love gen z lol ok boomer
@jofx4051
@jofx4051 3 жыл бұрын
Wait wat
@viczav
@viczav 3 жыл бұрын
That accent makes it x1000 better
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
As a non-native speaker Im very glad to hear that😎
@void8370
@void8370 3 жыл бұрын
@@BugBountyReportsExplained wiedziałem odrazu :d
@void8370
@void8370 3 жыл бұрын
@@user-yv6ed3io4d sprawdziłem w informacjach o kanale
@Michtar
@Michtar 3 жыл бұрын
@@void8370 w tym debuggerze bylo napisane gNIEDZIELA + akcent to się domyśliłem :D
@InfiniteLogins
@InfiniteLogins 3 жыл бұрын
This is the first video I've watched on your channel, you do an amazing job at breaking this down and making it easy to understand. I've read blog post that explain these type of write-ups, but the way you explain them make it so much easier to follow
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
Awesome mate! I believe that using videos it's possible to explain vulns better and quicker.
@mr.kn0w1t4ll2
@mr.kn0w1t4ll2 3 жыл бұрын
Your channel is so educative and amazing!! You should definitely upload more!
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
thanks mate, but I put a lot of work into each video and uploading them more often would be hard
@RatherPleasent
@RatherPleasent 3 жыл бұрын
Lol I used to think the SQL injection portion of OWASP was irrelevant. Good to see Zoom is keeping it alive.
@naimas8120
@naimas8120 2 жыл бұрын
Lmao this comment 😭
@GalacticTG
@GalacticTG 3 жыл бұрын
all the proffesors on my school will now use this xD
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
keep your zoom updated and they will not 😏
@MrREALball
@MrREALball 3 жыл бұрын
@@BugBountyReportsExplained who cares, chineese ai will still see and hear everything
@rizkyadiyanto7922
@rizkyadiyanto7922 3 жыл бұрын
@@MrREALball american ai can read your mind
@willinton06
@willinton06 3 жыл бұрын
5:50 beautiful, simply beautiful
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
oh yes it is!
@xii1
@xii1 3 жыл бұрын
these are the kinds of clever exploits that i live for
@greatguy8029
@greatguy8029 3 жыл бұрын
U saying this reminds me of people looking at a painting 🖼 in a museum and discussing it for hours, and I come shouting “Wtf it’s a tree”?
@NogCube
@NogCube 3 жыл бұрын
$2000 is not much. Honestly, I would not report this problem for such a small amount of money. I'm sorry Zoom. 😅
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
well, if the researcher just wanted to make sure that his zoom calls are secure, then $2000 is a good bonus
@FireWyvern870
@FireWyvern870 3 жыл бұрын
@@BugBountyReportsExplained looking at all the past vulnerabilities, I wouldn't use zoom at all
@kamilo1175
@kamilo1175 3 жыл бұрын
@@FireWyvern870 Hahah well guess what. My college and my parents' firm both use Zoom as their main medium for video conferences. I love this country.
@SamehMustafa007
@SamehMustafa007 3 жыл бұрын
@@BugBountyReportsExplained really it is should more than 2000$ 😠 them are stingy
@hariesch_8015
@hariesch_8015 3 жыл бұрын
You might spend time learning and do efforts that worth more than $2000 dollars, I agree.
@khire5433
@khire5433 3 жыл бұрын
Hacker : I can see you. Le me : I don't even have a cam.😏
@andreymx
@andreymx 3 жыл бұрын
Wow. Thank you for the video! I thought UTF-8 does protect you in case of this kind of mistreatment of multibyte-encoded strings, exactly because all the bytes in extended characters MUST have top bit set, so it makes it impossible to hide an ASCII character in an extended UTF-8 character. Some other older multibyte encodings (like GBK) actually allow ASCII to be part of extended character set. But what do you know, turns out some extremely popular databases do help attackers in this regard...
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
Yeah, it seems that UTF-8 was well-designed with that in mind, but the same can't be said about UTF8 implementation in Sqlite.
@wellsilver3972
@wellsilver3972 3 жыл бұрын
UTF-8 is literally just a version of text for example, unicode, or acci
@jmsanchez5631
@jmsanchez5631 3 жыл бұрын
$2000 is not enough for this bug. Very well done
@relaehtube1225
@relaehtube1225 3 жыл бұрын
Finally I found something intresting in attending zoom classes (opening others camera😁)
@mrdavidrees
@mrdavidrees 3 жыл бұрын
Great video. Makes me a little concerned about my code bases.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
yeah mate, check if you use prepared statements
@epicindiancomments9438
@epicindiancomments9438 3 жыл бұрын
This is great, please create a full course, on KZbin or Udemy.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
maybe one day
@joshuabudiarto5036
@joshuabudiarto5036 3 жыл бұрын
zoom employee: Write that down, Write that down!!!
@HK-sw3vi
@HK-sw3vi 3 жыл бұрын
I'm glad my laptop came with an inbuilt physical shutter for the cam.
@k42p3r
@k42p3r 3 жыл бұрын
Great walk through. That is worth testing for when writing integration tests. Thanks for sharing.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
Good idea, but I think SQLi is easiest to detect using SAST tool or even a linter, because it's very easy spottable in the source code. The tool just looks at how did you execute the sql query.
@penguin2251
@penguin2251 3 жыл бұрын
Thank you for your video, it was very informative and well done! Seems like Zoom developer team has made some bad decisions while on development. I assume they've tried to make their own SQL string escape function. That problem has been solved before many times, not sure why they didn't use a library.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
Yes, writing your own security instead of using well-tested frameworks proves being a bad idea over and over again.
@hammer2302
@hammer2302 3 жыл бұрын
Just studied sql injection in my last semester. Never thought it was used nowadays.
@kahirankarasinghe7930
@kahirankarasinghe7930 3 жыл бұрын
dude, u no longer need to imagine a russian hacker, the legend is already here
@diegogomes7179
@diegogomes7179 2 жыл бұрын
first time here and yet to learn bb in depth... but you did an amazing job explaining!
@user15121lIlIIll
@user15121lIlIIll 3 жыл бұрын
jokes on you, i dont have a webcam on my monitor
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
BULLETPROOF
@Nerwesta
@Nerwesta 3 жыл бұрын
Me reading that video while my professor introduced me to Zoom and taught me about SQL vulnerabilities on my app years ago : I see why you're telling me that now 🤔
@user-kc2eb1ib7e
@user-kc2eb1ib7e 3 жыл бұрын
Mr author, that's very cool!!! How long and what type of programming an ordinary person need to study to do such things? I will be very grateful for the answer.
@Zawadmunshi
@Zawadmunshi 3 жыл бұрын
C, ASM
@dominicgraham6101
@dominicgraham6101 3 жыл бұрын
Understanding the basics of hacking/cybersecurity is a good start, and from there I'd just try and learn as many vulnerabilities as you can, or learn about the systems you use, like Windows, iOS, etc.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
There are a lot of areas in cybersecurity: web security, mobile security (iOS, Android), desktop client security (Windows, Mac, Linux). You need to choose one and then you can ask about languages. I reckon after about 1000 hours of learning you can get a job if have no experience right now.
@SulavParajuli
@SulavParajuli 3 жыл бұрын
Good presentation 😊 Subscribed
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
awesome!
@t3xtm0d3
@t3xtm0d3 3 жыл бұрын
Single quote bypass is superb!
@RAZREXE
@RAZREXE 3 жыл бұрын
This is a great video! Loved it man❤️
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
Glad you enjoyed it!!
@vikaskumar-pc1xd
@vikaskumar-pc1xd 3 жыл бұрын
Thanks this video is so knowledgeable. Waiting more videos like this.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
😊
@jq10
@jq10 3 жыл бұрын
me who never actually been away from the keyboard waiting for the attacker to spy on me: *interesting*
@aakarshanraj1176
@aakarshanraj1176 3 жыл бұрын
you explained it great, i am shocked they don't have any function to filter the sql query
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
they relied on doubling quotes as a protection against SQLi
@MrDjluis95
@MrDjluis95 3 жыл бұрын
Dope info thanks Bre
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
thanks for watching bre
@MrDjluis95
@MrDjluis95 3 жыл бұрын
🔥
@ludologian
@ludologian 3 жыл бұрын
Only 2K .. I know it needs offline exploit but he deserves more
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
it does
@AurelianoTorquatoBrandao
@AurelianoTorquatoBrandao 6 ай бұрын
Much complexity and receive only 2,000 is very insane
@vinceontheweb
@vinceontheweb 3 жыл бұрын
What size needle do you use for an SQL injection?
@L_a_p_s_k_y
@L_a_p_s_k_y 3 жыл бұрын
2000$ is a joke for such a big vulnerability
@jonathanhoyos8191
@jonathanhoyos8191 3 жыл бұрын
Very nice explanation, keep up buddy !!!! 👨🏻‍💻
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
thanks mate!
@SrRunsis
@SrRunsis 3 жыл бұрын
Definitely subscribed and Adblock disabled for your channel man! Keep up the great work 😁😁
@SrRunsis
@SrRunsis 3 жыл бұрын
Also, maybe you should add more ads to your videos, like perhaps one at the beginning, one in the middle depending on the length and content of the video and the last ad at the end!
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
Thanks a lot mate, but so far Im not even eligible to join YT's partner progam. But I appreciate your attitude 😉
@dennismunyaka6537
@dennismunyaka6537 2 жыл бұрын
well articulated man you going to be a million dollarhacker soon haha
@puppalaanusha1333
@puppalaanusha1333 2 жыл бұрын
Loved the video ,Loved to hear in your accent bro
@connected.
@connected. 3 жыл бұрын
There is a LED next to my camera which lights on with the camera.....Such a cool security feature
@MARTIN-101
@MARTIN-101 3 жыл бұрын
it can be turned off 🤣🤣
@connected.
@connected. 3 жыл бұрын
@@MARTIN-101 no it cant be turned off
@andrewm4835
@andrewm4835 3 жыл бұрын
Me who always unplugs my camera after using it: Ah yes, very interesting
@demb0096
@demb0096 3 жыл бұрын
Dobrze byczku!
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
dzięki byniu!
@NOoBGamer-yq1yk
@NOoBGamer-yq1yk 3 жыл бұрын
Me Chilling with my Pop up Camera :)
@DeltaTony
@DeltaTony 3 жыл бұрын
*laughs in cover camera with tape*
@inevitablecatto8090
@inevitablecatto8090 3 жыл бұрын
So, earlier last month my science computer class teach me pretty much what SQL does, that is to create or manage or some stuff with database. But they never told me that SQL could be used to hack?! Btw I just understand like 20% of the video but I actually enjoyed it. Thx.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
On my university, they taught me doing SQL queries from Java by just string concatenation, so it was vulnerable to SQL injection. When I talked about it with the teacher, he told me it's not security class🙃 The security class never came in my syllabus😂
@daniulchowdhury7110
@daniulchowdhury7110 3 жыл бұрын
BROOOOO Thank you for illuminating videos!
@vexxafk
@vexxafk 3 жыл бұрын
I have tape stuck on my webcam....so goodluck spying one me 😂
@RYANTHORNTONCALL
@RYANTHORNTONCALL 3 жыл бұрын
This is just another reason why you don't need SQL for storing data. Why isn't this stored in json?
@AjayKumar-xl4jc
@AjayKumar-xl4jc 3 жыл бұрын
Great work bro 😉
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
thanks bro
@rainonedavid3564
@rainonedavid3564 3 жыл бұрын
My camera doesn't show video until I type sudo killall VDCAssistant in terminal. Kind of glad that exists now.
@markjimenez6354
@markjimenez6354 3 жыл бұрын
can understand some of it but not all of it.. what are the resources that i can see and study to understand this? lol ty
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
First of all, Id like to tell you that I really think that you have a great attitude to learning, based on how did you ask the question. About resources, rather than "what's X". For basics of SQL injection, go to: portswigger.net/web-security/sql-injection For the things about binaries, it's not advanced knowledge, just general stuff. I find it hard to find and give you one link.
@shubhamshah8415
@shubhamshah8415 3 жыл бұрын
please add captions too . It would make understanding more better
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
I thing there are english automatically generated subtitles
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
Ive added subtitles, so you can now translate them into whatever language you want.
@timothybelton9604
@timothybelton9604 3 жыл бұрын
Wow that's awesome! Great video bru
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
thanks bru
@ariad7452
@ariad7452 3 жыл бұрын
*So that physical shutter that I stick on my camera wasn't such a waste of money after all*
@yareyaredaze9450
@yareyaredaze9450 3 жыл бұрын
Just found your channel. Notifications immediately on! I am trying to learn sql and php through w3schools website. I think you explain things very well and with the important details, the vulnerability becomes easy to understand. Thank you!
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
Best of luck!
@saimkhalifa
@saimkhalifa 3 жыл бұрын
I don't know why but I need to subscribe this channel.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
Everyone needs to😏
@mat_name_whatever
@mat_name_whatever 3 жыл бұрын
Why not do \' straight away to escape the first quote, using the added second quote to close the string?
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
quote from the article: Common sanitization bypasses, like including a backslash character, also fail.
@mat_name_whatever
@mat_name_whatever 3 жыл бұрын
@@BugBountyReportsExplained ah I see, guess that was to be expected if they handle quotes like that. Thanks! :)
@faruky9197
@faruky9197 3 жыл бұрын
lucky my country is using the old version of zoom :))))))))))
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
what does it mean? they block the updates?
@GuRuGeorge03
@GuRuGeorge03 3 жыл бұрын
Basically all webapps have SQLi (and other) invulnerabilities. But of course people only go to the length of detecting them when it is a big company like zoom.
@KokoroKatsura
@KokoroKatsura 3 жыл бұрын
zoom is directly developed by chinese military (PLA)
@TheDiscusserOriginal
@TheDiscusserOriginal 3 жыл бұрын
At the end of the day, a few simple rules to follow by solves these issues. Firstly, never click a link unless trusted (and not just trusted as in from a trusted person cause they could be hacked) Secondly, never give your information to people who ask, regardless if they say their employees for the company of the software. Thirdly, always have your laptop/computer camera away, or with tape, over it unless you're using it.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
I fully agree, but also remember, that clicking does not always mean that the hacker sends you it via chat or an email. Clicking link might also mean that you visit a malicious website (eg. cause it popped up in Google search) and this website opens a link using JavaScript.
@seyedalihashemi2330
@seyedalihashemi2330 3 жыл бұрын
Thanks, dude. keep up!
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
👌
@adityagupta7881
@adityagupta7881 3 жыл бұрын
You got a new subscriber bro... Congo......
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
welcome!
@myth__un
@myth__un 3 жыл бұрын
Hi , In the Next video , Can you explain how we can report a bug bounty in a correct way ? Thanks in Advance
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
not really, as I focus more on the technical aspect, but there are a few of my videos where I show how well the report is written. See this for example: kzbin.info/www/bejne/n3OymXxjjZufeas
@ahmetsaric5364
@ahmetsaric5364 5 ай бұрын
Hello, thank You for Your work.
@pastel_dreams8172
@pastel_dreams8172 3 жыл бұрын
The teacher is proud
@princepatwari365
@princepatwari365 3 жыл бұрын
Great explanation and POC.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
thanks, the credit for POC goes to Keegan
@ManpreetRiar
@ManpreetRiar 3 жыл бұрын
Hello Bug Bounty Hunters !
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
Hello!
@xE92vD
@xE92vD 3 жыл бұрын
Zooms ceo comes and kills this man after he posted this video
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
zoom security team must have agreed to disclose the writeup in a blogpost
@xE92vD
@xE92vD 3 жыл бұрын
@@BugBountyReportsExplained Do you even get this is a joke no need to explain it bro.
3 жыл бұрын
Awesome! 👏👏
@rbt-0007
@rbt-0007 3 жыл бұрын
I expected such vulnerability
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
nice!
@sipinthatbub
@sipinthatbub 3 жыл бұрын
This is why I cover my camera with electrical tape.
@ripplerxeon
@ripplerxeon 3 жыл бұрын
lol stop spreading my idea ... i was about to get Nobel prize for it
@rikkasatrio2285
@rikkasatrio2285 3 жыл бұрын
Ok don't let my teacher see this
@Stone_624
@Stone_624 3 жыл бұрын
I'll never understand how/why Zoom became the pandemic's go to software over Skype, A 15+ year old, professional and legitimate software maintained by Microsoft (That I grew up with) . All of the sudden Zoom comes along and "Hey everyone, Lets use this brand new untested software riddled with cybersecurity issues instead." What's wrong with people?
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
Unfortunately, people in general don't give a shit about security, they just want the nicest software. But I think Zoom was banned in US at the beginning of the pandemic, so someone made a good decision there
@abofhad4378
@abofhad4378 3 жыл бұрын
Thank you
@fredhair
@fredhair 3 жыл бұрын
When people ask me why I wont use Zoom. I ask them why they don't use a secure matrix client.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
I hope Zoom is better now
@awekeningbro1207
@awekeningbro1207 3 жыл бұрын
This. This is why i put duct tapes on my laptops cam.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
I once had a Lenovo or Dell laptop that had built-in, swippable camera cover
@Kitulous
@Kitulous 3 жыл бұрын
lol i have an Asus Rog Strix G which does not have a webcam at all😂
@baadrqaaba9529
@baadrqaaba9529 3 жыл бұрын
Oh , my chat-app that i have developed is vulnerable then .
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
fix it soon!
@xasmaniusvolk8416
@xasmaniusvolk8416 3 жыл бұрын
That's why every piece of sh*t program I don't trust is inside a vm - no way I'd let such pieces of sh* run on my main sys
@renganathanofficial
@renganathanofficial 3 жыл бұрын
what if the victim turned off his camera in the application ?
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
this setting would change the setting just after joining a new meeting. You could turn it off after you realised it's on
@renganathanofficial
@renganathanofficial 3 жыл бұрын
@@BugBountyReportsExplained oh okay got it 😀
@HowToEverything1
@HowToEverything1 3 жыл бұрын
Is it still possible to exploit this vulnerability or has it been patched?
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
it's been patched
@HowToEverything1
@HowToEverything1 3 жыл бұрын
@@BugBountyReportsExplained oh :(
@bluestonecreepr
@bluestonecreepr 3 жыл бұрын
looks at my none existent webcam. Huh.
@goodboy8833
@goodboy8833 3 жыл бұрын
Good Explaiation
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
😎
@videocommenter
@videocommenter 3 жыл бұрын
Have you tried this on Google Meet, Microsoft Teams and others that allow you to join via a link?
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
nope
@priyangshunath2910
@priyangshunath2910 3 жыл бұрын
Me before watching the video:- huh, this must be fake. *Listened Russian accent* Me:- This is real shit
@subtoitskiblu7684
@subtoitskiblu7684 3 жыл бұрын
Laughs in google meets
@advaymayank1410
@advaymayank1410 3 жыл бұрын
FBI AGENT INTENSIFIES
@stanleyguo7164
@stanleyguo7164 3 жыл бұрын
Laughs in virtual camera that’s turned off by default
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
👌
@99bits46
@99bits46 3 жыл бұрын
damn professors ya'll dirty
@ujjwaldeep5175
@ujjwaldeep5175 3 жыл бұрын
I don't understand what is all this! How to learn this thing 'sqli'?
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
just google it
@thekatyperrymemechannel2122
@thekatyperrymemechannel2122 3 жыл бұрын
Didn't know John Cena was into computers
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
haha you are not the first person in the comment section to tell me that😂
@krimmy8459
@krimmy8459 3 жыл бұрын
I don't understand anything but I have a feeling this is some kind of joke for people who do.
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
no, it's not
@AhmedAymanM
@AhmedAymanM 3 жыл бұрын
Okay Now please, As a programmer ,Someone tell me how to find out and do what that "researcher" did ?
@user-so3eg1rw8l
@user-so3eg1rw8l 3 жыл бұрын
Cool channel, just found it, thanks for the interesting vid
@BugBountyReportsExplained
@BugBountyReportsExplained 3 жыл бұрын
welcome!
How to turn SQL injection into an RCE or a file read? Case study of 128 bug bounty reports
20:49
When you discover a family secret
00:59
im_siowei
Рет қаралды 32 МЛН
PEDRO PEDRO INSIDEOUT
00:10
MOOMOO STUDIO [무무 스튜디오]
Рет қаралды 24 МЛН
This Dumbbell Is Impossible To Lift!
01:00
Stokes Twins
Рет қаралды 42 МЛН
The Hacker who could turn on ANYONE'S Zoom Camera [Zero-Day]
14:17
Daniel Boctor
Рет қаралды 79 М.
Hacking Websites with SQL Injection - Computerphile
8:59
Computerphile
Рет қаралды 2,4 МЛН
$XX,000 Airbnb impossible XSS with 4 bypasses
9:15
Bug Bounty Reports Explained
Рет қаралды 28 М.
$6,5k + $5k HTTP Request Smuggling mass account takeover - Slack + Zomato
7:26
Bug Bounty Reports Explained
Рет қаралды 36 М.
Bug Bounty | $1870 for blind command injection
10:15
Leet Cipher
Рет қаралды 8 М.
Easy $500 Vulnerabilities! // How To Bug Bounty
13:19
NahamSec
Рет қаралды 71 М.
$10k+5k Web cache poisoning - Github + Firefox - Bug Bounty Reports Explained
7:33
Bug Bounty Reports Explained
Рет қаралды 21 М.