Client-side desync vulnerabilities - a breakthrough in request smuggling techniques

  Рет қаралды 17,457

Bug Bounty Reports Explained

Bug Bounty Reports Explained

Күн бұрын

Пікірлер: 27
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
This video took a lot of work to create but I hope it helped you in understanding the CL.0 variant of client-side desync. If it did, share it among friends to help both me and them ;)
@heyserge
@heyserge 2 жыл бұрын
Amazing explanation, I can tell you did a lot of work with the request response highlighting- it’s appreciated.
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
Thanks for appreciating that. I did put in extra time for this video because I know that CSD is confusing and the proper highlighting can really help.
@e.donker7787
@e.donker7787 2 жыл бұрын
Thanks! Love your content.
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
Thank you! I appreciate that☺
@lilnix
@lilnix 2 жыл бұрын
It's not an easy vulnerability but you explained it really great🔥
@josephvelasquez2677
@josephvelasquez2677 2 жыл бұрын
Loving the email newsletter and this channel! Thanks!
@НиколайНиколай-к2ю
@НиколайНиколай-к2ю 2 жыл бұрын
6:02 і тут я зрозумів шо перестав розуміти Але ти дуже круто все розбираєш! Дякую !
@EduardPodvoiskyi
@EduardPodvoiskyi Жыл бұрын
Я зараз передивляюсь,нічого не зрозуміло,але дуже цікаво Що найменьш щось я не дуже розумію сам proof of consept і як же воно експлойтиться в дикій природі
@dennismunyaka6537
@dennismunyaka6537 2 жыл бұрын
wow just saw your entire video well explained. will need to rewatch it a few times as it seems complex
@bdsgameing9789
@bdsgameing9789 2 жыл бұрын
Great explained
@StellarExplorationsTV6
@StellarExplorationsTV6 Жыл бұрын
Hey there, I found same bug but there is a problem that redirect url parameter is secured but it have same vulnerability like sending 2 or 3 responce in one request. I want to know how to craft this report so h1 give me nice bounty.
@StellarExplorationsTV6
@StellarExplorationsTV6 Жыл бұрын
hey bro i really need your help
@jub0bs
@jub0bs 2 жыл бұрын
Great explanation! Very helpful.
@monKeman495
@monKeman495 2 жыл бұрын
thanks for explanation appreciate it! i wonder how much time and knowledge he invested for such a intricate loop hole i highly praise james kettle you both r doin so much for community ty.
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
Thank you! Imagine that it's only a part of his whole research
@allgasfullsend4724
@allgasfullsend4724 2 жыл бұрын
Damn, that was one good video!
@InfoSecIntel
@InfoSecIntel 2 жыл бұрын
You're a legend
@_bergee_
@_bergee_ 2 жыл бұрын
Mind blown 🤯
@neiltsakatsa
@neiltsakatsa 2 жыл бұрын
Greetings!
@徐诚信-p2w
@徐诚信-p2w 2 жыл бұрын
thx a lot!
@rohitjadhav5203
@rohitjadhav5203 2 жыл бұрын
Can you please explain how can this vulnerability patched
@smartcontract647
@smartcontract647 2 жыл бұрын
Great video, Will you please create a video with other different endpoints? like static and error.
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
I think if you understand this example with a redirect, you will have no problem with exploiting other scenarios. So I don't plan on doing a video about CL.0 variant but with another endpoint but I may cover other variations of client-side desync bugs in the future and I will try to use a different entrypoint.
@saurabhbhardwaj3427
@saurabhbhardwaj3427 2 жыл бұрын
Amezing content
@gpjager4090
@gpjager4090 2 жыл бұрын
Very Well explained 👏👏👏 thanks for very well created video.. appreciate your efforts.. Is it possible to share the video editor used
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
Thank you, I use After Effects for the main part of the video and then Premiere Pro for the intro+outro
HTTP Desync Attack Explained With Paper
13:00
LiveUnderflow
Рет қаралды 14 М.
What functionalities are vulnerable to SSRFs? Case study of 124 bug bounty reports
19:58
Bug Bounty Reports Explained
Рет қаралды 16 М.
The evil clown plays a prank on the angel
00:39
超人夫妇
Рет қаралды 53 МЛН
“Don’t stop the chances.”
00:44
ISSEI / いっせい
Рет қаралды 62 МЛН
黑天使只对C罗有感觉#short #angel #clown
00:39
Super Beauty team
Рет қаралды 36 МЛН
Каха и дочка
00:28
К-Media
Рет қаралды 3,4 МЛН
Lab: Client-Side Desync
17:55
Jarno Timmermans
Рет қаралды 5 М.
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix
32:30
DEFCONConference
Рет қаралды 54 М.
Missing HTTP Security Headers - Bug Bounty Tips
15:48
LiveOverflow
Рет қаралды 143 М.
Top privilege escalation techniques - bug bounty case study
22:41
Bug Bounty Reports Explained
Рет қаралды 6 М.
$6,5k + $5k HTTP Request Smuggling mass account takeover - Slack + Zomato
7:26
Bug Bounty Reports Explained
Рет қаралды 37 М.
The evil clown plays a prank on the angel
00:39
超人夫妇
Рет қаралды 53 МЛН