Like everyone else i am also hoping you will get the chance to create more videos for the Google VRP, LiveOverflow! Best wishes, @wtm_offensi
@hugo4it4 жыл бұрын
wtm to google: “G E K O L O N I S E E R D”
@XDRosenheim5 жыл бұрын
Google: Sponsors a KZbin video. KZbin, a Google company: Wait, can we demonetize this?
@user-tm3fz7qx3s5 жыл бұрын
HAHA! That's funny!
@StefanReich5 жыл бұрын
LOL
@isnichtsogut26125 жыл бұрын
Is that a money stack-overflow?
@shis105 жыл бұрын
Lol
@TheoParis5 жыл бұрын
XD
@karl26735 жыл бұрын
Google is like Italy, it switches sides when you least expect it.
@samueleproiettimicozzi81345 жыл бұрын
Karlo Bistrički lol...
@Emaxoso5 жыл бұрын
As Italian I can confirm, no wait I can't
@fabiopinciroli49625 жыл бұрын
Laughs in Mussolinian
@Timsturbs5 жыл бұрын
mi scusi mi scusi 👌
@MorbidEel5 жыл бұрын
Switch? Isn't it more like they are on all sides at the same time?
@renanlopes62205 жыл бұрын
I can't think of anyone better than you for this job! Glad to see you getting rewarded after all these years of effort here on KZbin. Congratulations !
@cipherundoer5 жыл бұрын
u know the vibes
@TheHermitHacker5 жыл бұрын
Other companies, pay attention. This is the right way to talk about things like this. The more open we are about bugs and problems, the more secure these companies become. I love this model.
@WebSecurityful5 жыл бұрын
@Adolf Hitler They just invest money to keep their income alive, if their systems would fail or be compromised this could cause more harm then the few millions they pay for these bug bounties. These millions compared to the billions that they would risk are like nothing, especially for a company with such size and importancy in our world.
@WebSecurityful5 жыл бұрын
@Adolf Hitler There is just nothing more important than money and growth
@georgplaz3 жыл бұрын
@will triumph i think it was sarcasm. in any case, you are way overblowing it.
@kobiassvilli5 жыл бұрын
LiveOverflow to be the official bug reporter for Google? you got my vote!
@dgramop5 жыл бұрын
I really enjoy how you also explained his thought process and how he was able to do the legwork to find the vulnerability. I know people in the cyber world that would just say "there was an issue where it would automatically execute gradle" and then call it a day, if I;m lucky, after giving more details about the vulnerability itself. People rarely talk about the thought process required.
@WikiPeoples5 жыл бұрын
I really appreciate you pausing to remind the viewer that this work is tedious, and takes time. The problem with KZbin educational videos these days, is that unless you remind yourself of this, they can make some people very discouraged... That's because their expectation is that when they sit down to code, or research, it will look similar to the video they watched... And instead of being smooth, and almost effortless, it's the complete opposite - difficult, slow, challenging.
@jmullentech5 жыл бұрын
That's one reason I respect guys like Ippsec so much. He leaves the majority of his "mistakes" and oversights in his videos, so you can get a taste of "why the hell isn't this working??" as a viewer. We need more people like that, for sure!
@kantnklaar5 жыл бұрын
I can relate to that; I watched too much Mr Robot 😂
@shadowinlight205 жыл бұрын
It's like this in every branch. Every time books and articles talk about an expert, be it scientist, athlete or artist, they make it sound like these people were simply born this way and that everything they touch turns into gold. In reality those experts failed more times than any "talentless" person.
@Mith075 жыл бұрын
This title sounds like clickbait but it's actually not.
@lukor-tech5 жыл бұрын
I am very happy that this type of sponsorship is happening ! Way to go and best of luck with next productions.
@tomasgemes43495 жыл бұрын
Bro this is completely EPIC! Google sponsoring. It could get even nicer though, just imagine google asking you to talk about critical historic bug reports on android, drive, youtube, search engine. IT COULD BE AWESOME!
@mpwsh5 жыл бұрын
Great video! I would love to see more vulnerability disclosures explained like this in the channel. This also says a lot about what KZbin/Google was saying about demonetize hacking related videos. Even tho this is hacking related, it's clearly more educational than a step by step on how to damage someone by hacking their wifi or creating social engineering sites.
@Milamber-pg3ju5 жыл бұрын
I really enjoyed the format of this video. I liked getting the explanation from the source as well as LiveOverview’s explanation. I would watch more like this in the future.
@CZghost3 жыл бұрын
This is hands down the best security vulnerability related video in general I've ever watched. Talk with a full-time bug hunter and very professionally put together. Hard to believe that this is actually an advertisement, and as I can see, it's an advertisement for Google's bug bounty program. Google is rather unusual company. They propose open-source projects, they are very open about their products, even when it comes into the vulnerability of these products, and they actually care about people's opinions. Kind of like Discord as it seems.
@bjornroesbeke5 жыл бұрын
Finding hacks is always the result of someone saying "What if...", playing around a bit and then getting an understanding of how things work. A potential question: Would you have invested the time and effort if Google didn't have a bug bounty program, just to learn something?
@LiEnby5 жыл бұрын
im sure someone on the darkweb would pay for it if google didnt
@TheWootify5 жыл бұрын
Good question Bjorn. The truth is that I could not have afforded to spent the time i did, without the existence of bounties. If bug bounties did not exist i would have to spent time on offering penetration testing services to clients (or get a job in engineering like i used to have, and practice hacking for fun in my spare time). Best wishes!
@AlexBMJ015 жыл бұрын
Awesome video! It's always cool to get the story behind a vulnerability. Would love to see more content like this!
@Mith075 жыл бұрын
You can really see how much work you put into this video compared to your usual videos. It's one of your best videos imo, keep it up!
@omerfeyyazselcuk73255 жыл бұрын
That glorious man's hair flied away in around 19.00
@Fractal2275 жыл бұрын
Luckily it came back again
@x3ICEx5 жыл бұрын
19:00
@georgplaz3 жыл бұрын
a bug! maybe you'll get a bounty by liveoverflow
@maciej-365 жыл бұрын
Actually YES! This is the best sponsored video I have ever seen!
@ev.c65 жыл бұрын
It is amazing that you show the effort this guy had to find this bug. I know people who think success is a one time try-get thing based on someone's "talents". This line of thought can lead to many disappoints in life. Your channel is amazing :)
@Fritzendugan5 жыл бұрын
Congratulations! I've been watching your videos for some time and it warms my heart to see secure these types of partnerships and grow your channel. Well deserved! And not to mention definitely an interesting video. Kudos for keeping everyone grounded and reminding that videos don't capture everything (on purpose, of course) :)
@k1ngjulien_5 жыл бұрын
19:08 magically disapprearing hair? :D Very nice video
@WhosOverpowered5 жыл бұрын
Love the new format! I think it is great for the largest developers like Google to be able to facilitate knowledge like this. It could mean that some smaller companies or freelance developers dont end up losing clients or getting into legal trouble over something that a company like Google can fix before it is used as an attack vector. Things like these need to be shared, and I am glad that you are the person sharing it with us!
@alexhuang76815 жыл бұрын
Hope someday we'll see LiveOverflow talking about bugs on LastPass/Dashlane/NordVPN/PIA/Audible/etc. :3
@TealJosh5 жыл бұрын
Well, nordvpn is relevant now lol.
@arnonymous72115 жыл бұрын
15:03 did i just see the famous merkel raute?
@hexdreams5 жыл бұрын
Nice catch xD
@Rebouz5 жыл бұрын
this concludes there has to be a section about bratwurst in this video aswell.
@Nadox155 жыл бұрын
@@Rebouz Damit hat er unsere Mutti mit Stolz erfüllt
@hiabst5 жыл бұрын
@@Nadox15 stimmt , hab grad meine mutti gefragt
@xenon59935 жыл бұрын
Also referred to as "Merkeldach" ("Merkel's roof") or "Raute der Macht" ("Rhombus of power").
@u0000-u2x5 жыл бұрын
If only all ads taught me this much. ps: Google, you should pay more for your bug bounty hunters...
@gabrielraphaelgarciamontoy12694 жыл бұрын
The captions helped a lot because my speakers got water damage today! Thanks :)
@bitcode_5 жыл бұрын
you deserve it! all the sacrifice you've made for learning and working on your skills, keep up the good work!
@小张同学-v6i5 жыл бұрын
nice for making this video, i know that finding bug can be frustrating unless you happen to find it accidentally, but this video showed me how even more frustrating it is. thanks!
@CySnowdrop5 жыл бұрын
Well done mate! I've been following you for a while now and you totally deserve the sponsorship!! Keep up the good work mate!
@RamtheCowy5 жыл бұрын
Man I love your videos even as a newb who knows nothing about programming or cybersecurity, you have a way in structuring and presenting and always make them so fascinating! :)
@glorytoarstotzka3305 жыл бұрын
I am really happy for live overflow geting asked by google themselves to make a regular video with a bug they had. feelsgoodman
@retry517765 жыл бұрын
Only $5k for this? That is way underpay for his skill set
@sky-persuitofwonder5 жыл бұрын
Terry Wu I’ll appreciate 5k, cuz that’s a lot for a kid :)
@makitard5 жыл бұрын
@@sky-persuitofwonder nobody asked you
@michaeljones56814 жыл бұрын
@@makitard nobody asked you to make this negitive comment but yet here we are
@makitard4 жыл бұрын
@@michaeljones5681 necro
@michaeljones56814 жыл бұрын
@@makitard what does that mean sorry I'm fairly new to this stuff
@kalexander7775 жыл бұрын
"We connect you with Hackers, just make a simple video.. blah blah" -Google Hmm.. does this mean you think i'm a Hacker, Google?!
@dwietr5 жыл бұрын
Whoa, you've expanded my view on a lot of services I'm using in my professional life. I'm using docker on a daily base and I was not aware you can control the container (moreover, other containers) in such way using the docker socket file. Okay, everything isn't exactly the same with comparing GCP(Google Cloud Platform) vs OCP(Openshift Cloud Platform) but technically it seems pretty similar. Anyway, thanks for the video.
@ibrahimkahfie34675 жыл бұрын
Wow.Michael cera really is knowledgeable in cyber security.
@bale-qb7jv5 жыл бұрын
You need to do a video on the new iOS bootrom exploit!
@Sleezgaming5 жыл бұрын
Schönes Video! Echt cool, dass du solche Kooperationen realisieren kannst. Sehr sympathisch auch der Bounty hunter :)
@vypxl5 жыл бұрын
I would say: Ehre an Google!
@treppi5 жыл бұрын
@@effiti2905 huhu xD
@treppi5 жыл бұрын
@@effiti2905 ich weiß, denkst du er ist dieses Jahr wieder auf dem C3? Will unbedingt ein Autogramm oder so
@Simrasil_5 жыл бұрын
woah.. I kinda lost sight of this channel for some time (shifting interests and such) and now I come back and he has 374k subscribers? When and how did that happen?! I mean congratulations I'm really happy for him but damn ^^
@felipe51lugo15 жыл бұрын
I appreciated both efforts: describing and explaining. thumbs up.
@oldbootz5 жыл бұрын
Great video! I love the interview format.
@PolyRocketMatt5 жыл бұрын
19:08 he's having a bad hair day xD
@xellaosu5 жыл бұрын
Yeah I noticed the change in hair style as well. I thought it was a brilliant easter egg! Wonder if the Dutch guy suggested it xD
@tortotifa52875 жыл бұрын
Thumbs up if LiveOverflow should again make a live video recording!
@gregaluise57275 жыл бұрын
Thank you Live Overflow and Google! Cool look into container technology and how the "bug" can be the result of bringing several technologies together.
@rigoligorlc47953 жыл бұрын
Now I finally know why new JetBrains IDEs asks whether you trust the build system used by a project.
@HritikV5 жыл бұрын
Awesome video ! I had a question though, why would google put host's docker daemon socket in the shell container ? One possible explanation would be, because the shell needs to communicate to the thea IDE, but I'm not sure because if that's the case then why not put thea and the shell in the same container ?
@osamazaid255 жыл бұрын
Beautiful idea 💡 thanks to everyone who was involved in this.
@GarthHumphreys5 жыл бұрын
Wow, thanks for sharing this content and the interview. It was very insightful!
@josephwong28324 жыл бұрын
love how you emphasized how hard it was
@Rubafix9895 жыл бұрын
5000$ seems pretty ridiculous for the amount of work achieved to report this bug. It's Google I doubt it would crumble for a 20k€ bounty
@OmarChida5 жыл бұрын
Great job LiveOverflow just one question what software do you use to make these cool paintings and writings ?
@LiveOverflow5 жыл бұрын
you can find making of videos on my channel ;)
@OmarChida5 жыл бұрын
@@LiveOverflow Definitely will check it out. Your my Number 1 KZbinr when it comes to learning security and reversing. Thanks so much for the content
@Celastrous5 жыл бұрын
This is an awesome video. Loved the real life video shots, really made the vid easily digestible
@kcm6245 жыл бұрын
$5000 seems little for such awesome and very high skilled work. He could easily get a senior position at Google and get paid much more in cash plus equity.
@ashleybyrd20155 жыл бұрын
I don't usually like google, But paying you to make a video is probably one of their greatest ideas.
@4400marko5 жыл бұрын
Nicely done, both of you! Congrats! And please keep reminding us how tedious work it is - I forget. Very good video!
@BGroothedde5 жыл бұрын
Nice video! I would love more of this type of content. Let's hope Google sponsors you more often!
@TheSkepticSkwerl5 жыл бұрын
It was probably 20-40 hours of work. But his training and experience is 100's in this area.
@Reth_Hard5 жыл бұрын
Very, very interesting video. You guys are real genius. I wish I had half your talent.
@velho62985 жыл бұрын
Love it
@TheSkepticSkwerl4 жыл бұрын
Having earned an OSCP, I fully understand the long time and tedious work these things can take.
@yonatandar5 жыл бұрын
google sure took the best person to make this video, way to go pal !!!!
@dynfo5 жыл бұрын
I had found a bug on KZbin allowing you to delete likes/dislikes one by one using their api. Nothing urgent, nothing fancy, so I contacted their VRP with how to reproduce it. They told me that they couldn't reproduce it, adding that if the bug was indeed live, their systems would have detected it. Less than 2 days after their response, it was fixed and never heard from them again.
@LiveOverflow5 жыл бұрын
It might have just been a caching/display thing. For example caching used to affect subscribers. And when people unsub and resub the counter would constantly decrement. Making it look like sb lost a lot of subs. But actually it was just a way how the caching was set up. Once the cache was properly synced with the real data, the number was correct again. Maybe that also happened with likes/dislikes?
@srlorch4065 жыл бұрын
wow i was like "i can barley understand that" and the subtitle hint comes up. perfect!
@ThePC0075 жыл бұрын
I understood it perfectly fine, but then again, my own accent is probably just as bad.
@tythedev95825 жыл бұрын
Ahh nice. So, I only need to be familiar with: -Docker, -Web protocols, -Kubernetes, -Git, - and TypeScript (for Theia) to help fight bugs for Google. EZ PZ (sarcasm) Entertaining video tho. Thumbs up.
@PiotrekR-aka-Szpadel5 жыл бұрын
Actually this isn't much
@tythedev95825 жыл бұрын
@@PiotrekR-aka-Szpadel for u, big guy
@PiotrekR-aka-Szpadel5 жыл бұрын
@@tythedev9582 those things that you mentioned are kinda related to each other
@Gottii925 жыл бұрын
what about java and gradle :o
@Dkbay5 жыл бұрын
@@Gottii92 Technically he'd just need to know Gradle since he could use some hello world code for Java all it was needed for was to auto execute the gradle file
@TheHakTor5 жыл бұрын
Thanks Google for being progressive and forthcoming. You sponsoring this kind of video was totally amazing. Other companies need to take a look at your efforts. Also, great video mate!
@BlackHermit5 жыл бұрын
The beginning of Google is the ray. I've already heard about this vulnerability, but your explanations are.
@FloWoelki5 жыл бұрын
This is such an awesome video. Thank you!! :)
@Verrisin5 жыл бұрын
if you ask me, even seeing other containers you are not supposed to interact with *is a security vulnerability* - Even if nothing may come from it: They should stop the person as soon as possible, so they cannot even go deeper... - like this, they have to protect everything else behind it, rather than just that one gateway...
@MazzeruAcciacatore5 жыл бұрын
The automatic Java compilation is an issue, but no-one knew about it ; it's a legit mistake. However, giving the user permission to control docker is a grave mistake and they denied the issue. 5k? Really? That's not much to convince someone not to exploit the issue..
@foorack5 жыл бұрын
Giving the ability to control docker daemon on the "host" doesn't matter because the host itself is yet another container.
@ydrezende5 жыл бұрын
Congratulations, my friend! You are doing such a great job, I'm so glad Google recognized your work.
@nsns79935 жыл бұрын
Great video! Learned a lot from the explanation, especially the docker escape trick.
@settwi3 жыл бұрын
hey @LiveOverflow when were u first employed as a security expert? i'm studying for a physics phd right now but i have always been into security and systems programming, and your videos are inspiring me to maybe try out some penetration testing competitions or some things like that. anyone else feel free to answer too!
@Anon-tr2lq5 жыл бұрын
Why are you standing bro, I feel like I shouldn't be sitting down
@kantnklaar5 жыл бұрын
Yo how big is your screen that him standing intimidates you 😅
@Pichelinou5 жыл бұрын
18:14 what i'm more curious about is how much *you* got paid :P
@lufycz.5 жыл бұрын
Probably not as much as the researcher did
@stammyy20915 жыл бұрын
I guess about 3000€
@heroslippy66665 жыл бұрын
Usually this detail can't be shared to make bargaining with sponsors easier. But definitely not as much as the researcher.
@yashgandhi61285 жыл бұрын
Maybe 500 bucks?
@NeutronJimmy425 жыл бұрын
Jean-Jacques Lacouille they gave him 2 years free membership for google+
@cptpinecone5 жыл бұрын
Kudos dude. But I mean, with your content quality, it pretty much makes sense!
@tootalldan57025 жыл бұрын
Cool content and research. Thanks for sharing. BTW, I hope you get paid twice because there were 2 commercials in this video also.
@4franz45 жыл бұрын
Hallöchen Popöchen...
@threeMetreJim5 жыл бұрын
I find the easiest vulnerabilities to work on are client/server web apps with the logic carried out by some script on a server with the client side in Javascript. Found a few bugs in commercial products, the companies involved were happy to receive the bug reports for fixing, but no reward unfortunately (but I did receive a thank you). Only reward was from Facebook for quite a trivial privacy issue ($500 lowest tier bug bounty reward). I find live chat apps are usually the ones with flaws - best was a complete deletion of an app from a web page without admin privilege (with permission of the owners of the site it was hosted on), and a moderation bypass (done on the providers demo page). Another one is trying to insert HTML markup in a page when you shouldn't be able to (not enough user input sanitation that can lead to cross site scripting vulnerabilities), had a laugh on a Facebook game with that one (before letting the game developers know about the bug). While this is probably not legal to do, as long as you don't cause any damage and notify the providers so that the 'bug' can be fixed, I've never had anyone be upset about it - better than someone malicious coming along and causing untold havoc for anyone using whatever service has the bugs.
@TimLF5 жыл бұрын
A video on securing containers and escaping them would be very interesting
@melkileo5 жыл бұрын
And now you get an OP from Google.. What a carrier!
@rj-nj3uk4 жыл бұрын
That horse playing guitar, drum and [that blow horn thing] 😅
@neoXXquick5 жыл бұрын
Amazing video.. the only shame it's that hacker got low money reward...
@neoXXquick5 жыл бұрын
that person is smart like hell
@jon-anthoneydeboer43835 жыл бұрын
Excellent find, love the concept of this video too.
@4franz45 жыл бұрын
Just $5000???
@-BANKAI-n15 жыл бұрын
Not sure where you live my friend, but 5k is something. Also, if he were to actively count the hours he spent finding the bug and divide the sum, he would still be in a position to earn more then a regular 9-5 job.
@deskoner5 жыл бұрын
Really awesome, interesting and well presented video.I truly appreciate it :)
@hpsmash773 жыл бұрын
1:52 the real bug is the light theme
@Shirolicious5 жыл бұрын
i really like it. liveOverflowxGoogle is a good combination. I also find the thoughts from the researcher very insightful.
@xenialxerous24415 жыл бұрын
Hey there #liveoverflow!! This was an awesome awesome video, loved it thoroughly!
@Nothy5 жыл бұрын
now this is podracing
@beastbum5 жыл бұрын
pod tracing
@ValentineC1375 жыл бұрын
pot lacing
@chillyvanilly63525 жыл бұрын
What an eye opener this is... Boy ou boy
@smtmssmtms5 жыл бұрын
Love your content, love the knowledge, love the way you transmit it :)
@groowy5 жыл бұрын
I have a question unrelated to this video but I've been thinking about this so much that I should ask you about it. How much time do you spend playing piano and what model of piano is behind you in this video?
@ushiocheng5 жыл бұрын
@LiveOverflow Is it ethical or legal to test a system? If a tester broke a google server, there must be some consequences? May you make a video about the ethics and laws about it? I have tried to research. Basically, it is fine as long as you get permission. However, it is not likely for every tester to contact google for a permission. So, how does this whole process work out?
@hopehowdoyoufeel5 жыл бұрын
You've made it! Congratulations
@TrustedCreeper5 жыл бұрын
It looked way to easy. Nice collaboration👍🏻
@GwnDennisHD5 жыл бұрын
KZbin has a built-in "Includes paid promotion" banner that you can turn on, and it will show up for 5 seconds at the beginning of the video in the bottom left. So next time you don't necessarily have to put "advertisement" in the top right for the entirety of the video
@LiveOverflow5 жыл бұрын
That might be okay for the US. But it’s bot enough for german regulations
@GwnDennisHD5 жыл бұрын
@@LiveOverflow Ah gotcha
@kcm6245 жыл бұрын
Reverse engineering the architecture is quite a large portion of the effort. Wonder if it would be faster and more reliable for Google to have in-house researchers who see the source code and design docs of the system?
@oxodao5 жыл бұрын
This vidéo was awesome. If you have the opportunity to do something like this again dont hésitate !
@AgentM1245 жыл бұрын
Assuming it took 250 hours. 5000 dollars is like 20 per hour. Which isn't bad wage. But if it took 500 hours it's only 10 per hour. So depending on how long it took. It's a decent wage. But you're not guaranteed to find a vulnerability. So it's gambling?
@LiveOverflow5 жыл бұрын
hundreds of hours was just my estimate :D but he also found multiple issues in this product. So you can multiply that bounty
@AgentM1245 жыл бұрын
@@LiveOverflow yeah, I can't conclude if it is a viable way to make money. But as a hobby. It's fun and profitable. (And pain and horror for all the research...)
@TheWootify5 жыл бұрын
@@AgentM124 Your math is correct and so is LiveOverflow. Ofcourse it all depends on where you live in the world and what you want from live. Bug hunting is probably not the most stable way to make a living, but it sure is fun and rewarding. As long as i can take care of my family i will continue the hunt :) best whishes to you