Like everyone else i am also hoping you will get the chance to create more videos for the Google VRP, LiveOverflow! Best wishes, @wtm_offensi
@hugo4it5 жыл бұрын
wtm to google: “G E K O L O N I S E E R D”
@XDRosenheim5 жыл бұрын
Google: Sponsors a KZbin video. KZbin, a Google company: Wait, can we demonetize this?
@user-tm3fz7qx3s5 жыл бұрын
HAHA! That's funny!
@StefanReich5 жыл бұрын
LOL
@isnichtsogut26125 жыл бұрын
Is that a money stack-overflow?
@shis105 жыл бұрын
Lol
@TheoParis5 жыл бұрын
XD
@karl26735 жыл бұрын
Google is like Italy, it switches sides when you least expect it.
@samueleproiettimicozzi81345 жыл бұрын
Karlo Bistrički lol...
@Emaxoso5 жыл бұрын
As Italian I can confirm, no wait I can't
@fabiopinciroli49625 жыл бұрын
Laughs in Mussolinian
@Timsturbs5 жыл бұрын
mi scusi mi scusi 👌
@MorbidEel5 жыл бұрын
Switch? Isn't it more like they are on all sides at the same time?
@renanlopes62205 жыл бұрын
I can't think of anyone better than you for this job! Glad to see you getting rewarded after all these years of effort here on KZbin. Congratulations !
@cipherundoer5 жыл бұрын
u know the vibes
@TheHermitHacker5 жыл бұрын
Other companies, pay attention. This is the right way to talk about things like this. The more open we are about bugs and problems, the more secure these companies become. I love this model.
@WebSecurityful5 жыл бұрын
@Adolf Hitler They just invest money to keep their income alive, if their systems would fail or be compromised this could cause more harm then the few millions they pay for these bug bounties. These millions compared to the billions that they would risk are like nothing, especially for a company with such size and importancy in our world.
@WebSecurityful5 жыл бұрын
@Adolf Hitler There is just nothing more important than money and growth
@georgplaz4 жыл бұрын
@will triumph i think it was sarcasm. in any case, you are way overblowing it.
@kobiassvilli5 жыл бұрын
LiveOverflow to be the official bug reporter for Google? you got my vote!
@dgramop5 жыл бұрын
I really enjoy how you also explained his thought process and how he was able to do the legwork to find the vulnerability. I know people in the cyber world that would just say "there was an issue where it would automatically execute gradle" and then call it a day, if I;m lucky, after giving more details about the vulnerability itself. People rarely talk about the thought process required.
@WikiPeoples5 жыл бұрын
I really appreciate you pausing to remind the viewer that this work is tedious, and takes time. The problem with KZbin educational videos these days, is that unless you remind yourself of this, they can make some people very discouraged... That's because their expectation is that when they sit down to code, or research, it will look similar to the video they watched... And instead of being smooth, and almost effortless, it's the complete opposite - difficult, slow, challenging.
@jmullentech5 жыл бұрын
That's one reason I respect guys like Ippsec so much. He leaves the majority of his "mistakes" and oversights in his videos, so you can get a taste of "why the hell isn't this working??" as a viewer. We need more people like that, for sure!
@kantnklaar5 жыл бұрын
I can relate to that; I watched too much Mr Robot 😂
@shadowinlight205 жыл бұрын
It's like this in every branch. Every time books and articles talk about an expert, be it scientist, athlete or artist, they make it sound like these people were simply born this way and that everything they touch turns into gold. In reality those experts failed more times than any "talentless" person.
@lukor-tech5 жыл бұрын
I am very happy that this type of sponsorship is happening ! Way to go and best of luck with next productions.
@mpwsh5 жыл бұрын
Great video! I would love to see more vulnerability disclosures explained like this in the channel. This also says a lot about what KZbin/Google was saying about demonetize hacking related videos. Even tho this is hacking related, it's clearly more educational than a step by step on how to damage someone by hacking their wifi or creating social engineering sites.
@Milamber-pg3ju5 жыл бұрын
I really enjoyed the format of this video. I liked getting the explanation from the source as well as LiveOverview’s explanation. I would watch more like this in the future.
@Mith075 жыл бұрын
You can really see how much work you put into this video compared to your usual videos. It's one of your best videos imo, keep it up!
@AlexBMJ015 жыл бұрын
Awesome video! It's always cool to get the story behind a vulnerability. Would love to see more content like this!
@CZghost3 жыл бұрын
This is hands down the best security vulnerability related video in general I've ever watched. Talk with a full-time bug hunter and very professionally put together. Hard to believe that this is actually an advertisement, and as I can see, it's an advertisement for Google's bug bounty program. Google is rather unusual company. They propose open-source projects, they are very open about their products, even when it comes into the vulnerability of these products, and they actually care about people's opinions. Kind of like Discord as it seems.
@Fritzendugan5 жыл бұрын
Congratulations! I've been watching your videos for some time and it warms my heart to see secure these types of partnerships and grow your channel. Well deserved! And not to mention definitely an interesting video. Kudos for keeping everyone grounded and reminding that videos don't capture everything (on purpose, of course) :)
@k1ngjulien_5 жыл бұрын
19:08 magically disapprearing hair? :D Very nice video
@tomasgemes43495 жыл бұрын
Bro this is completely EPIC! Google sponsoring. It could get even nicer though, just imagine google asking you to talk about critical historic bug reports on android, drive, youtube, search engine. IT COULD BE AWESOME!
@omerfeyyazselcuk73255 жыл бұрын
That glorious man's hair flied away in around 19.00
@Fractal2275 жыл бұрын
Luckily it came back again
@x3ICEx5 жыл бұрын
19:00
@georgplaz4 жыл бұрын
a bug! maybe you'll get a bounty by liveoverflow
@ev.c65 жыл бұрын
It is amazing that you show the effort this guy had to find this bug. I know people who think success is a one time try-get thing based on someone's "talents". This line of thought can lead to many disappoints in life. Your channel is amazing :)
@WhosOverpowered5 жыл бұрын
Love the new format! I think it is great for the largest developers like Google to be able to facilitate knowledge like this. It could mean that some smaller companies or freelance developers dont end up losing clients or getting into legal trouble over something that a company like Google can fix before it is used as an attack vector. Things like these need to be shared, and I am glad that you are the person sharing it with us!
@Mith075 жыл бұрын
This title sounds like clickbait but it's actually not.
@maciej-365 жыл бұрын
Actually YES! This is the best sponsored video I have ever seen!
@bjornroesbeke5 жыл бұрын
Finding hacks is always the result of someone saying "What if...", playing around a bit and then getting an understanding of how things work. A potential question: Would you have invested the time and effort if Google didn't have a bug bounty program, just to learn something?
@LiEnby5 жыл бұрын
im sure someone on the darkweb would pay for it if google didnt
@TheWootify5 жыл бұрын
Good question Bjorn. The truth is that I could not have afforded to spent the time i did, without the existence of bounties. If bug bounties did not exist i would have to spent time on offering penetration testing services to clients (or get a job in engineering like i used to have, and practice hacking for fun in my spare time). Best wishes!
@gabrielraphaelgarciamontoy12695 жыл бұрын
The captions helped a lot because my speakers got water damage today! Thanks :)
@小张同学-v6i5 жыл бұрын
nice for making this video, i know that finding bug can be frustrating unless you happen to find it accidentally, but this video showed me how even more frustrating it is. thanks!
@RamtheCowy5 жыл бұрын
Man I love your videos even as a newb who knows nothing about programming or cybersecurity, you have a way in structuring and presenting and always make them so fascinating! :)
@bitcode_5 жыл бұрын
you deserve it! all the sacrifice you've made for learning and working on your skills, keep up the good work!
@CySnowdrop5 жыл бұрын
Well done mate! I've been following you for a while now and you totally deserve the sponsorship!! Keep up the good work mate!
@dwietr5 жыл бұрын
Whoa, you've expanded my view on a lot of services I'm using in my professional life. I'm using docker on a daily base and I was not aware you can control the container (moreover, other containers) in such way using the docker socket file. Okay, everything isn't exactly the same with comparing GCP(Google Cloud Platform) vs OCP(Openshift Cloud Platform) but technically it seems pretty similar. Anyway, thanks for the video.
@Sleezgaming5 жыл бұрын
Schönes Video! Echt cool, dass du solche Kooperationen realisieren kannst. Sehr sympathisch auch der Bounty hunter :)
@oldbootz5 жыл бұрын
Great video! I love the interview format.
@arnonymous72115 жыл бұрын
15:03 did i just see the famous merkel raute?
@hexdreams5 жыл бұрын
Nice catch xD
@Rebouz5 жыл бұрын
this concludes there has to be a section about bratwurst in this video aswell.
@Nadox155 жыл бұрын
@@Rebouz Damit hat er unsere Mutti mit Stolz erfüllt
@hiabst5 жыл бұрын
@@Nadox15 stimmt , hab grad meine mutti gefragt
@xenon59935 жыл бұрын
Also referred to as "Merkeldach" ("Merkel's roof") or "Raute der Macht" ("Rhombus of power").
@gregaluise57275 жыл бұрын
Thank you Live Overflow and Google! Cool look into container technology and how the "bug" can be the result of bringing several technologies together.
@alexhuang76815 жыл бұрын
Hope someday we'll see LiveOverflow talking about bugs on LastPass/Dashlane/NordVPN/PIA/Audible/etc. :3
@TealJosh5 жыл бұрын
Well, nordvpn is relevant now lol.
@felipe51lugo15 жыл бұрын
I appreciated both efforts: describing and explaining. thumbs up.
@PolyRocketMatt5 жыл бұрын
19:08 he's having a bad hair day xD
@xellaosu5 жыл бұрын
Yeah I noticed the change in hair style as well. I thought it was a brilliant easter egg! Wonder if the Dutch guy suggested it xD
@Celastrous5 жыл бұрын
This is an awesome video. Loved the real life video shots, really made the vid easily digestible
@GarthHumphreys5 жыл бұрын
Wow, thanks for sharing this content and the interview. It was very insightful!
@kalexander7775 жыл бұрын
"We connect you with Hackers, just make a simple video.. blah blah" -Google Hmm.. does this mean you think i'm a Hacker, Google?!
@glorytoarstotzka3305 жыл бұрын
I am really happy for live overflow geting asked by google themselves to make a regular video with a bug they had. feelsgoodman
@4400marko5 жыл бұрын
Nicely done, both of you! Congrats! And please keep reminding us how tedious work it is - I forget. Very good video!
@u0000-u2x5 жыл бұрын
If only all ads taught me this much. ps: Google, you should pay more for your bug bounty hunters...
@osamazaid255 жыл бұрын
Beautiful idea 💡 thanks to everyone who was involved in this.
@ibrahimkahfie34675 жыл бұрын
Wow.Michael cera really is knowledgeable in cyber security.
@bale-qb7jv5 жыл бұрын
You need to do a video on the new iOS bootrom exploit!
@josephwong28324 жыл бұрын
love how you emphasized how hard it was
@BGroothedde5 жыл бұрын
Nice video! I would love more of this type of content. Let's hope Google sponsors you more often!
@HritikV5 жыл бұрын
Awesome video ! I had a question though, why would google put host's docker daemon socket in the shell container ? One possible explanation would be, because the shell needs to communicate to the thea IDE, but I'm not sure because if that's the case then why not put thea and the shell in the same container ?
@nsns79935 жыл бұрын
Great video! Learned a lot from the explanation, especially the docker escape trick.
@dynfo5 жыл бұрын
I had found a bug on KZbin allowing you to delete likes/dislikes one by one using their api. Nothing urgent, nothing fancy, so I contacted their VRP with how to reproduce it. They told me that they couldn't reproduce it, adding that if the bug was indeed live, their systems would have detected it. Less than 2 days after their response, it was fixed and never heard from them again.
@LiveOverflow5 жыл бұрын
It might have just been a caching/display thing. For example caching used to affect subscribers. And when people unsub and resub the counter would constantly decrement. Making it look like sb lost a lot of subs. But actually it was just a way how the caching was set up. Once the cache was properly synced with the real data, the number was correct again. Maybe that also happened with likes/dislikes?
@Reth_Hard5 жыл бұрын
Very, very interesting video. You guys are real genius. I wish I had half your talent.
@sevm77925 жыл бұрын
19:19 why does the hair suddenly disappear?
@rigoligorlc47953 жыл бұрын
Now I finally know why new JetBrains IDEs asks whether you trust the build system used by a project.
@MannyLama5 жыл бұрын
Love this video! Great work.
@FloWoelki5 жыл бұрын
This is such an awesome video. Thank you!! :)
@threeMetreJim5 жыл бұрын
I find the easiest vulnerabilities to work on are client/server web apps with the logic carried out by some script on a server with the client side in Javascript. Found a few bugs in commercial products, the companies involved were happy to receive the bug reports for fixing, but no reward unfortunately (but I did receive a thank you). Only reward was from Facebook for quite a trivial privacy issue ($500 lowest tier bug bounty reward). I find live chat apps are usually the ones with flaws - best was a complete deletion of an app from a web page without admin privilege (with permission of the owners of the site it was hosted on), and a moderation bypass (done on the providers demo page). Another one is trying to insert HTML markup in a page when you shouldn't be able to (not enough user input sanitation that can lead to cross site scripting vulnerabilities), had a laugh on a Facebook game with that one (before letting the game developers know about the bug). While this is probably not legal to do, as long as you don't cause any damage and notify the providers so that the 'bug' can be fixed, I've never had anyone be upset about it - better than someone malicious coming along and causing untold havoc for anyone using whatever service has the bugs.
@velho62985 жыл бұрын
Love it
@Ariana-dn4mm5 жыл бұрын
Which piece is that on the piano i kinda want to know
@simone94855 жыл бұрын
I would really enjoy a video of him playing the piano
@Pichelinou5 жыл бұрын
18:14 what i'm more curious about is how much *you* got paid :P
@lufycz.5 жыл бұрын
Probably not as much as the researcher did
@stammyy20915 жыл бұрын
I guess about 3000€
@heroslippy66665 жыл бұрын
Usually this detail can't be shared to make bargaining with sponsors easier. But definitely not as much as the researcher.
@yashgandhi61285 жыл бұрын
Maybe 500 bucks?
@NeutronJimmy425 жыл бұрын
Jean-Jacques Lacouille they gave him 2 years free membership for google+
@jon-anthoneydeboer43835 жыл бұрын
Excellent find, love the concept of this video too.
@deskoner5 жыл бұрын
Really awesome, interesting and well presented video.I truly appreciate it :)
@Simrasil_5 жыл бұрын
woah.. I kinda lost sight of this channel for some time (shifting interests and such) and now I come back and he has 374k subscribers? When and how did that happen?! I mean congratulations I'm really happy for him but damn ^^
@retry517765 жыл бұрын
Only $5k for this? That is way underpay for his skill set
@sky-persuitofwonder5 жыл бұрын
Terry Wu I’ll appreciate 5k, cuz that’s a lot for a kid :)
@makitard5 жыл бұрын
@@sky-persuitofwonder nobody asked you
@michaeljones56814 жыл бұрын
@@makitard nobody asked you to make this negitive comment but yet here we are
@makitard4 жыл бұрын
@@michaeljones5681 necro
@michaeljones56814 жыл бұрын
@@makitard what does that mean sorry I'm fairly new to this stuff
@tootalldan57025 жыл бұрын
Cool content and research. Thanks for sharing. BTW, I hope you get paid twice because there were 2 commercials in this video also.
@smtmssmtms5 жыл бұрын
Love your content, love the knowledge, love the way you transmit it :)
@RickyMau15 жыл бұрын
another great video. Great pace, great explanation.
@chillyvanilly63525 жыл бұрын
What an eye opener this is... Boy ou boy
@xenialxerous24415 жыл бұрын
Hey there #liveoverflow!! This was an awesome awesome video, loved it thoroughly!
@Welteam5 жыл бұрын
One of your best video imo. Thank you
@TheHakTor5 жыл бұрын
Thanks Google for being progressive and forthcoming. You sponsoring this kind of video was totally amazing. Other companies need to take a look at your efforts. Also, great video mate!
@JakeHillion5 жыл бұрын
Loved it. Thank you.
@vypxl5 жыл бұрын
I would say: Ehre an Google!
@treppi5 жыл бұрын
@@effiti2905 huhu xD
@treppi5 жыл бұрын
@@effiti2905 ich weiß, denkst du er ist dieses Jahr wieder auf dem C3? Will unbedingt ein Autogramm oder so
@rj-nj3uk5 жыл бұрын
That horse playing guitar, drum and [that blow horn thing] 😅
@sumitlahiri2095 жыл бұрын
Awesome. Keep up the great work.
@srlorch4065 жыл бұрын
wow i was like "i can barley understand that" and the subtitle hint comes up. perfect!
@ThePC0075 жыл бұрын
I understood it perfectly fine, but then again, my own accent is probably just as bad.
@aerodigital5 жыл бұрын
Implementation of a wrapper, nice stuff.
@TheSkepticSkwerl4 жыл бұрын
Having earned an OSCP, I fully understand the long time and tedious work these things can take.
@BlackHermit5 жыл бұрын
The beginning of Google is the ray. I've already heard about this vulnerability, but your explanations are.
@kcm6245 жыл бұрын
Reverse engineering the architecture is quite a large portion of the effort. Wonder if it would be faster and more reliable for Google to have in-house researchers who see the source code and design docs of the system?
@retpolanne5 жыл бұрын
Nice video, really inspiring for people who want to find bugs. I wonder if you can kubectl to this cluster. 13:33 hey, if you get access to the host, you can use strace to trace the container processes pid.
@cptpinecone5 жыл бұрын
Kudos dude. But I mean, with your content quality, it pretty much makes sense!
@joehollon3175 жыл бұрын
Awesome video I hope one day I can find some bugs I've been working on it really hard :)
@ydrezende5 жыл бұрын
Congratulations, my friend! You are doing such a great job, I'm so glad Google recognized your work.
@TimLF5 жыл бұрын
A video on securing containers and escaping them would be very interesting
@settwi4 жыл бұрын
hey @LiveOverflow when were u first employed as a security expert? i'm studying for a physics phd right now but i have always been into security and systems programming, and your videos are inspiring me to maybe try out some penetration testing competitions or some things like that. anyone else feel free to answer too!
@michael-gary-scott5 жыл бұрын
That’s awesome! Congrats man 😁
@rythm37565 жыл бұрын
Cool video man keep it up!
@airy_co5 жыл бұрын
really interesting, i hope you get to do more videos like this
@jeffsirkis25525 жыл бұрын
I really enjoyed this video and would love to watch more videos exactly like it.
@kcm6245 жыл бұрын
$5000 seems little for such awesome and very high skilled work. He could easily get a senior position at Google and get paid much more in cash plus equity.
@Rubafix9895 жыл бұрын
5000$ seems pretty ridiculous for the amount of work achieved to report this bug. It's Google I doubt it would crumble for a 20k€ bounty
@seditt51465 жыл бұрын
Christopher Domas showed that simply with root access we can control every part of x86_64 CPUs by accessing the MCU... is that not the case here if one can escape this container?
@TheBone20705 жыл бұрын
So now I wonder, how was this issue fixed in the end?
@dubcusb5 жыл бұрын
They probably just patched the java language server so it doesn't compile cloned stuff
@Verrisin5 жыл бұрын
if you ask me, even seeing other containers you are not supposed to interact with *is a security vulnerability* - Even if nothing may come from it: They should stop the person as soon as possible, so they cannot even go deeper... - like this, they have to protect everything else behind it, rather than just that one gateway...
@Foody-j4z5 жыл бұрын
Your contents are on another level.
@TrustedCreeper5 жыл бұрын
It looked way to easy. Nice collaboration👍🏻
@Lo-fiChillGuyMusic5 жыл бұрын
google sure took the best person to make this video, way to go pal !!!!
@marekunas5 жыл бұрын
Great video, thanks!
@neoXXquick5 жыл бұрын
Amazing video.. the only shame it's that hacker got low money reward...
@neoXXquick5 жыл бұрын
that person is smart like hell
@Rednesswahn5 жыл бұрын
This is awesome, @Google should sponsor more videos like this :D