Script Gadgets! Google Docs XSS Vulnerability Walkthrough

  Рет қаралды 141,759

LiveOverflow

LiveOverflow

Күн бұрын

Пікірлер: 244
@reydion1648
@reydion1648 4 жыл бұрын
other youtubers: "this video is sponsored by Raid Shadow Legends" LiveOverflow: "This video is sponsored by freaking google, showing bugs on their products!" what a legend
@sharkbeats1397
@sharkbeats1397 4 жыл бұрын
true legend indeed
@rakeshchowdhury202
@rakeshchowdhury202 4 жыл бұрын
He's a true legend, just like our today's sponsor Google. Privacy? With Google you can have no privacy. Forget it. You don't care us taking your nudes from your android do you? Why are we asking anyway. 😂😂😂😂😂😂
@_vsnwprintf_s_l
@_vsnwprintf_s_l 4 жыл бұрын
I got a RAID ad on this, so...
@rakeshchowdhury202
@rakeshchowdhury202 4 жыл бұрын
@@sabaundefined Just like our todays sponsor Raycon Shadow Legends. Use code Linus to get a discount
@bryces8017
@bryces8017 4 жыл бұрын
WHAT, google paid you, to talk about some guy who they paid to find bugs in their system, who they paid even more when he found a bug?
@dandogamer
@dandogamer 4 жыл бұрын
Who paid a developer to introduce a bug and who paid another developer to fix said bug 😉
@misaalanshori
@misaalanshori 4 жыл бұрын
Its also an advertisement for Google even thought its technically talking about google negatively. Its kinda weird but i think google is trying to show that they listen to people reporting bugs and fix them, and also promoting their bug bounty system.
@3N18AKPzmGOsBgWKH
@3N18AKPzmGOsBgWKH 4 жыл бұрын
Just because he is sponsored, doesn't it mean that he is getting payed ^^
@phagesuffersatgaming.3797
@phagesuffersatgaming.3797 4 жыл бұрын
@@3N18AKPzmGOsBgWKH sponsor= paid to advertise. Are you for real dude?
@couch9416
@couch9416 4 жыл бұрын
@@3N18AKPzmGOsBgWKH sponsored literally means to get paid for it. Get a dictionary
@soggybaguette8457
@soggybaguette8457 4 жыл бұрын
You know you've made it as a dev/techie when you get *google* themselves to sponsor a video
@arthurg5966
@arthurg5966 4 жыл бұрын
Watching normal KZbin videos : Chill and Relax Watching LiveOverflow videos : Concentrate and Take notes. Watch again to check if flow of thoughts was correct. Watch again to see if you understood everything properly.
@cwmd7651
@cwmd7651 4 жыл бұрын
Yeah I need to watch like 2 more times to understand everything lol
@fahmiirfan6923
@fahmiirfan6923 4 жыл бұрын
So, true 😂
@anakinskywalkerrr
@anakinskywalkerrr 4 жыл бұрын
Sponsored by Google, "It's all Google security fault" video end. What a mad lad
@metalpachuramon
@metalpachuramon 4 жыл бұрын
This is very interesting! These vulnerabilities arise from a common pattern: factory pattern. In factory pattern, you address the problem of creation, where basically you use unchecked types like strings and use unchecked data like strings, or in this case json, and then use polymorphism to polymorphically continue the object life cycle, this allows you to have object type related if statements in a centralized manner. So, by not having a whitelist, you can call arbitrary constructors like hlc. The interesting part, is that implementing a whitelist falls into another pattern: abstract factory pattern, where you define an includes method that uses a string list. Because of how convoluted abstract factory pattern seems, programmers often choose the concrete factory pattern, because they rarely see a benefit over using abstract factory. The most interesting thing is, that you could even exploit other kinds of systems, like java-based systems, because they also use this string gadget for loading classes during execution time.
@lefteriseleftheriades7381
@lefteriseleftheriades7381 4 жыл бұрын
I could never understand the difference between a regular factory and an abstract factory, please help!
@wtwt8714
@wtwt8714 4 жыл бұрын
@@lefteriseleftheriades7381 Regular factory: create an object directly. Abstract factory: provide an abstract method to create IThing and let SomeConcreteFactory (inheriting the abstract factory) create ThingThatInheritsFromIThing. Using the abstract factory pattern you get one more indirection between code using IThing and code creating a concrete IThing.
@metalpachuramon
@metalpachuramon 4 жыл бұрын
@@lefteriseleftheriades7381 look for "Uncle Bob factory pattern", he explains it in depth. The problem with factories is that statically you cannot know an object type beforehand, it's in runtime that through conditions you decide which object to use. When you add many seemingly related factories, as a dev it becomes difficult to know exactly which classes are being used on each of those factories, therefore in the abstract factory pattern you provide an abstract base class that the other factories have to derive from, this base class usually includes an abstract method called includes (or similar), by doing this you force derivative classes to implement it, which obligates them to use a list of strings to enumerate which classes are valid. This way, you provide some sort of type safety stated by lists of strings, that way whenever a factory receives an unexpected value, the includes method prevent you from creating an unexpected object by throwing an exception or something. In other words, this pattern is for devs to understand and for runtime guards, since the compiler can't statically figure this out and prompt an error. I hope this helps.
@k3daevin
@k3daevin 4 жыл бұрын
The vulnerability comes from JavaScript.
@karserasl
@karserasl 4 жыл бұрын
@@k3daevin No, the vulnerability comes correctly as said, from the implementation of the factory pattern, using JS (but JS has nothing to do with this)
@blackblather
@blackblather 4 жыл бұрын
Uses google ads: no one bats an eye Google actually sponsors the video: Holy shit
@jbmagination2
@jbmagination2 4 жыл бұрын
"It's all the Google security team's fault"
@兽Arufisu
@兽Arufisu 4 жыл бұрын
bruh moment edit: how the table have turned(what i said in the live chat at the end)
@Vaaaaadim
@Vaaaaadim 4 жыл бұрын
Trust nobody(with security) not even yourself.
@keineahnung1919
@keineahnung1919 4 жыл бұрын
didn't want to ruin the perfect 69 likes
@__________________________177
@__________________________177 4 жыл бұрын
but you did it... you just did it... ;(
@4n1eu
@4n1eu 4 жыл бұрын
Google paid him to say "f you" to their own security team
@LostInAutism
@LostInAutism 4 жыл бұрын
When dynamic programming becomes too dynamic
@LugnutsK
@LugnutsK 4 жыл бұрын
“Dynamic programming” doesnt mean what you think it means
@andreidicu2882
@andreidicu2882 3 жыл бұрын
@@chyza2012 like cpp with dynamic programming? u ok bro?
@DominicNweze
@DominicNweze Жыл бұрын
@@LugnutsK what's dynamic programming 🤔
@DominicNweze
@DominicNweze Жыл бұрын
@@andreidicu2882 what's dynamic programming
@LugnutsK
@LugnutsK Жыл бұрын
@@DominicNweze Dynamic programming is a misleading name for algorithms which break a problem into small recursive sub-problems and solves all the sub-problems in order to solve the overall problem.
@0x-SHx
@0x-SHx 3 жыл бұрын
I just found this channel few hour ago and I'm already in love with your work... You're feeding all my curiosities... Love your approach how you explain things...
@humanflybzzz4568
@humanflybzzz4568 4 жыл бұрын
Wow, your channel has grown. I've been away from watching your vids for a while, so it's kinda amazing to see almost 500k subs on a tech channel that's not only about gaming rigs :) Love it , good work LiveOverflow
@iamskidrow
@iamskidrow 4 жыл бұрын
I'll pretend I understood Everything
@pietrosanchez7484
@pietrosanchez7484 4 жыл бұрын
This is some incredibly dense content for people learning development and cybersecurity. This helps us learn more about what more we could still learn about. I will always be grateful for all your inspiring and insightful content!
@jacobcollins934
@jacobcollins934 4 жыл бұрын
Far out, imagine getting sponsored by google, that’s absolutely awesome. You know, sometimes I just binge watch this channel, and it never gets old. I’m super proud dude!
@cannuhlar8229
@cannuhlar8229 4 жыл бұрын
This is actually awesome content. Both listening from the implementers and the pentester is an amazing oppurtunity.
@G0NZA11
@G0NZA11 4 жыл бұрын
I love these insights, it shows you that they are experts but not perfects, everybody needs a team
@dontaskme1625
@dontaskme1625 4 жыл бұрын
awesome video, awesome that you did so detailed chapter markings and great that you're talking about how this bug got introduced in the first place (that part could have been even more detailed)
@RN-kl4kp
@RN-kl4kp 4 жыл бұрын
I always thought wait for ur videos .. They are fun and very much self explanatory 😊 Thanks mate for all this contribution you are doing towards the community .
@realENGY
@realENGY 4 жыл бұрын
I love that google is sponsoring you! Really cool to see your channel grow. :)
@kryvxde6950
@kryvxde6950 4 жыл бұрын
google sponsoring, dammn youve gone long way. gg
@alexanderdell2623
@alexanderdell2623 4 жыл бұрын
Thats cool,but wheres referral link to google?
@rakeshchowdhury202
@rakeshchowdhury202 4 жыл бұрын
Next Video sponsored by Raycon Earbuds
@bernardosulzbach
@bernardosulzbach 4 жыл бұрын
What a grade video. Oddly good for a sponsored one!
@user-rn8wp9vy4b
@user-rn8wp9vy4b 3 жыл бұрын
Wow... that's amazing... And that was a perfect explanation. Thank you for your video!
@smithwillnot
@smithwillnot 4 жыл бұрын
I love this because it shows how complex development is. Basically this is main reason why I'm reluctant to change anything on complex project if it's not critical bug, and every change made feels like it'd require whole project to be tested again.
@ThatGamerBlue
@ThatGamerBlue 4 жыл бұрын
Just enrolled in the college of XSS, wish me luck as a brand new copy paste machine :)
@sonofmars1337
@sonofmars1337 4 жыл бұрын
i wish you luck and hope you ctrl-c ctrl-v your way to a bug bounty
@parabolicpanorama
@parabolicpanorama 4 жыл бұрын
Where did you start from? Which resources would you recommend?
@dingusbrule5756
@dingusbrule5756 4 жыл бұрын
@@parabolicpanorama Look into Burp Suite
@Folsets
@Folsets 4 жыл бұрын
God bless your fingers!
@vincent-thomas
@vincent-thomas 2 жыл бұрын
Youre fcked if your v key doesnt work
@squirrel1620
@squirrel1620 4 жыл бұрын
Awesome! Love the in depth.. and that's my world, ECMAScript. In this world we rely on the closures and scope for security 😏
@TechTips-zf4pj
@TechTips-zf4pj 4 жыл бұрын
thanks to this video, it cleared up some of my doubts about cybersecurity being replaced by AI in the near future.
@cheaterman49
@cheaterman49 4 жыл бұрын
You know what this kind of intricate multi-step process reminds me of? Pokémon exploits. But you started covering that already so I'm sure there'll be more coming :-) Also, congrats in advance for your 500k subs, very much keeping the hacking spirit alive!
@missingno6618
@missingno6618 4 жыл бұрын
Great video man! Also, can you do a video with Ezequiel Pereira? His vulns are super awesome.
@heisenberg5168
@heisenberg5168 4 жыл бұрын
Absolutely great content! Super interesting video!!!
@iyxan2340
@iyxan2340 4 жыл бұрын
I've never seen someone sponsored by Google before
@DragonStoneCreations
@DragonStoneCreations 4 жыл бұрын
U r one of the best teachers out there ❤️
@blenderpanzi
@blenderpanzi 4 жыл бұрын
That's a huge list of best practice violations: * Don't let a parameter specify an arbitrary function, use known values from an hashtable/switch statement instead * Don't let a postMessage pass a script url, just tell the page "do thing A" and it then knows what to do * Don't accept postMessages from arbitrary origins * Dissalow arbitrary script sources using CSP If any of these would have been done the vulnerability would not exist. There might be reasons why you want 2 and 4, but at least 1 and 3 should definitely be done. Edit: Hadn't finished watching the video. Why there even is a function that executes an arbitrary JavaScript from an URL was explained.
@secureitmania
@secureitmania 4 жыл бұрын
Eagerly waiting to see😍
@soksamnang2150
@soksamnang2150 4 жыл бұрын
I like the way he flamed Google's security team even though he is sponsored by Google :D
@steefant
@steefant 4 жыл бұрын
rest assured that they will get roasted for this internally as long as they are employed there ;)
@pvic6959
@pvic6959 4 жыл бұрын
knowing google, they would be flaming them too. Lets point out that this issue was SUPER buried .He explained it and i didnt understand so its very likely know one even saw it happening until this guy somehow found this bug. google takes security super seriously so im more surprised the bug was fixed and CAME BACK. the engineers who let that happen are going ot be in trouble lol
@LiveOverflow
@LiveOverflow 4 жыл бұрын
The engineers are not at all in trouble. They interviewed with me :) this is totally normal and shouldn’t be shamed.
@pvic6959
@pvic6959 4 жыл бұрын
@@LiveOverflow learning from mistakes is the best thing we can do!
@Wowthatsfail
@Wowthatsfail 4 жыл бұрын
Seeing since WE are googles security team, I don't think they care.
4 жыл бұрын
another google sponsored google product bug video. man, they're in the right direction. Love LiveOverflow!
@mrappu2884
@mrappu2884 4 жыл бұрын
going to be 500k ..congrats @LiveOverflow
@myhackertech
@myhackertech 3 жыл бұрын
It is interesting to know that Google sponsored it ! I wonder if this XSS was exploited in the wild
@alice-smith
@alice-smith 4 жыл бұрын
Congrats for the sponsor!
@Janos0206
@Janos0206 4 жыл бұрын
Awesome! Very inspiring
@amaan5676
@amaan5676 4 жыл бұрын
hi i learn a lot from u
@OMorningStar
@OMorningStar 4 жыл бұрын
Paused at 3:13 to see if I understand the code, I think hlc creates an object that captures a port, url, and data as an array. Then it creates a function inside that object to stringify the message. Finally it creates a script tag and appends it along with a url.
@barefeg
@barefeg 3 жыл бұрын
Cool content keep it coming
@Thmyris
@Thmyris 4 жыл бұрын
Congratz on 500k subs, any time now
@whistletoe
@whistletoe 3 жыл бұрын
dude this is so cool
@Konstantin-qk6hv
@Konstantin-qk6hv 4 жыл бұрын
Nice interview
@HarryBallsOnYa345
@HarryBallsOnYa345 4 жыл бұрын
Whenever i hear the word i just shiver, ugwha.
@cryptonative
@cryptonative 4 жыл бұрын
lvl1: paid to secure google source lvl2: paid to look at google source lvl3: paid for finding bugs while paid to look at google source lvl100: paid to make a video about google source bugs lvl10000: paid to make a video about google source bugs by freaking google :p
@innocentroot7517
@innocentroot7517 4 жыл бұрын
Very interesting
@ostanin_vadym
@ostanin_vadym 4 жыл бұрын
Thank you for content
@bls7879
@bls7879 4 жыл бұрын
6:16 Subtitle: "He knows that Jesus is a Javascript library". Okey
@bitrr3482
@bitrr3482 3 жыл бұрын
CarbonCopy yeah! Just use Jesus.convert(water, wine)
@bitrr3482
@bitrr3482 3 жыл бұрын
CarbonCopy That returns the now wine
@ZombieBrine1309
@ZombieBrine1309 3 жыл бұрын
Damn. Google sponsored a video on their own platform. That's a rare one!
@FurriousFox
@FurriousFox 4 жыл бұрын
amazing video's! can you add a link to the bug report in the description?
@driziiD
@driziiD 4 жыл бұрын
pretty sophisticated programming concepts discussed here. would be impressed if civilians could grok this one.
@jeromej.1992
@jeromej.1992 4 жыл бұрын
So, if a method is executing sensitive actions, it should embed the security check call? Does it really only apply to languages or should it be considered in other languages as well? (say c#)
@1008OH
@1008OH 4 жыл бұрын
So you got sponsored by google? Damn that's some serious drip
@threeMetreJim
@threeMetreJim 4 жыл бұрын
You can use Google chrome browser to read minified code, just click the {} for pretty print... All of the hacking I've done, I've used this. First in the Opera browser, and then using Chrome dev tools. I found several vulnerabilities in sites that way. With a bit of practice it's not very difficult to follow obfuscated code, especially when you can set breakpoints and skip through it. Everything I've reported got fixed, with nothing but a 'thanks' and not a bounty in sight (apart from Facebook's $500)... Now I can't be bothered reporting bugs or vulnerabilities, sometimes they'll be exploited for fun, but that is it.
@ASHStudios
@ASHStudios 4 жыл бұрын
so its all google security team's fault xD
@irok1
@irok1 4 жыл бұрын
I was wondering whether anything like this would happen after looking into the scripting features about a year ago.
@berndeckenfels
@berndeckenfels 4 жыл бұрын
Btw I think recognizing the usafe Gadget function would be in the realm of automated tools
@chadsoftwarefreedom65
@chadsoftwarefreedom65 4 жыл бұрын
awesome
@Sky_Shaymin
@Sky_Shaymin 4 жыл бұрын
At first I was gonna say this feels like one of the many advantages of strongly typed languages. You would have to be explicit about what types of classes can be instantiated there. In the end, it was a lack of regression testing! They had strict checks but accidentally removed them. Really great video!
@iamjoris
@iamjoris 4 жыл бұрын
As always, nice explanation! Why would you say this problem could never be found by an automated check? I'd argue that instantiating an object from a string is always a bad idea. It may be quite normal to do in Javascript, but that does not make it a good idea. It feels comparable to manually changing the instruction pointer based on some input. Yes, this can be powerful, but why the heck would you? I'd say creating a static mapping between strings and classes is definitely worth the effort. For example, Google's own language Go does not allow you to do anything like this without getting into the (literally called) unsafe package (if it's even possible with that). So to conclude: why not just disallow using a string for instantiating an object altogether. I use Javascript only limited professionally, so I'd love someone to tell me why this is not feasible/not applied in practice :-]
@raqha4575
@raqha4575 4 жыл бұрын
WOT THE FUCK, ich dachte mir so ok wird schon interessant, nein einfach gesponsort by google und ein absolut informatives video
@LemonChieff
@LemonChieff 4 жыл бұрын
Sponsored by Google? You officially won the internet. Also:
@prashantsharma4846
@prashantsharma4846 4 жыл бұрын
How can i analyse obfuscated javascript code ? Any suggestions. it’s difficult to analyse a.b b.this like these codes
@madghostek3026
@madghostek3026 4 жыл бұрын
You can try downloading the page and run it offline, but that usually breaks the page, or you can use some kind of proxy to load your modified js file instead. Then you can add debug prints or dump objects for information easily
@ijwarren170
@ijwarren170 4 жыл бұрын
This is why companies like Google, Apple, Microsoft and many others stay in business. They acknowledge that everything is vulnerable and are open to fixing them. Vice, many startups who try and punish those who exploit them, or Twitter, who makes no effort in securing their systems. Things could be better, but getting better starts with this mentality.
@ariseyhun2085
@ariseyhun2085 4 жыл бұрын
Congratulations on another sponsor by Google. This video was great too, but the midroll ads really ruined it for me and I could not get through it enjoyably. Would be great if you can make these videos without midroll ads when you get a sponsor.
@LiveOverflow
@LiveOverflow 4 жыл бұрын
Use adblock. Also pls read the latest news on midroll ad changes by KZbin
@VerifyBot
@VerifyBot 4 жыл бұрын
Interesting!
@ariss3304
@ariss3304 4 жыл бұрын
Google: I see this is a win win.
@sheikhrishad9233
@sheikhrishad9233 4 жыл бұрын
Awesome
@ameisee4
@ameisee4 4 жыл бұрын
+1 for "allowlist"
@roxrosa
@roxrosa 4 жыл бұрын
I think we could automate this using Selenium. We could test it but it might we might have a lot of time developing the framework the google project. I might be wrong thou haha
@HZStudio
@HZStudio 4 жыл бұрын
Great ending
@TheNitroPython
@TheNitroPython 4 жыл бұрын
Where did you find the step by step instructions originally for this cross site script vulnerability?
@LiveOverflow
@LiveOverflow 4 жыл бұрын
If you understand how XSS works it’s just creativity to come up with it
@TheMrKeksLp
@TheMrKeksLp 4 жыл бұрын
Oh boy, taking a user specified string without any validation and calling a function with that name really wasn't the finest implementation tbh. How did they NOT expect someone to exploit that?
@Sezdik
@Sezdik 4 жыл бұрын
Are we sure that was a fault? maybe it was sitting there for some selected people to use..
@Mitsunee_
@Mitsunee_ 4 жыл бұрын
Why does this video end up feeling like TOP 5 TIMES the Google SECURITY Team Got GIT BLAMED
@some1purple
@some1purple 4 жыл бұрын
I had a dream about a script execution exploit in Google sheets a few months ago.
@ziakader7530
@ziakader7530 4 жыл бұрын
How long did it take him to find
@keanu_
@keanu_ 4 жыл бұрын
❤️
@sccp1997
@sccp1997 4 жыл бұрын
*Sponsered by Google to talk about Google Security's team fault.*
@arisweedler4703
@arisweedler4703 3 жыл бұрын
The malicious spreadsheet attack... this is why it's unsafe for even clients to be able to attack themselves!! The attacker gets to be the client sometimes.
@bren.r
@bren.r 4 жыл бұрын
Idk why they’d think it would ever be a good idea to rely on a string to construct things. Shouldn’t you have an inherent hesitation to do such a things? It’s like using eval. Same with accessing arrays of methods in obfuscated code by string properties. It’s actually crazy how many JS exploits you can take advantage of on most websites.
@paxdriver
@paxdriver 3 жыл бұрын
It is so dope to see cooperation and capitalism working and outputting free educational videos afterwards. This is a shining example of how we should behave in society lol
@amyshaw893
@amyshaw893 4 жыл бұрын
Am I misunderstanding something? I don't see the issue here. you create a google doc, then modify it so that when you embed it, and tell it to run javascript, it runs javascript. Can't you just... run the javascript? If you have control over the embedding site like that, can't you just write your own javascript directly?
@KuromiAK
@KuromiAK 4 жыл бұрын
You are not supposed to be able to embed arbitrary JavaScript into embedded Google Doc. The embedded Google Doc has access to visitor's account which you shouldn't have access to. It is true that you can just embed any JavaScript. But it should only happen when the embedded content also comes from your website. XSS happens when you can embed code to other's website, which is accessed with a different set of credentials & cookies.
@NicmeisteR
@NicmeisteR 3 жыл бұрын
Please tell me what packet analyzer you're using??
@NicmeisteR
@NicmeisteR 3 жыл бұрын
Took a lot of cross referencing and searching but found it if anyone wants it, called burp: portswigger.net/burp/documentation/desktop/tools/proxy/using
@valrina
@valrina 3 жыл бұрын
Saying that this bug couldn't be found by any tool is not a statement I would make. I am pretty sure a GPT3 like transformer for this purpose could find not only this but much more bugs that we can't even possibly understand.
@aldobernaltvbernal8745
@aldobernaltvbernal8745 4 жыл бұрын
nice
@ekemark224
@ekemark224 4 жыл бұрын
this is good, but why would you add an hlc to the HTML???
@LiveOverflow
@LiveOverflow 4 жыл бұрын
JSONP sanbox
@raiwac
@raiwac 4 жыл бұрын
Please help me How to bypass speed hack detection in game ?? 🙏🙏🙏♥️♥️♥️🙏🙏♥️♥️
@tyuop
@tyuop 4 жыл бұрын
That's a way to type something here
@w1d3r75
@w1d3r75 4 жыл бұрын
Subscribed:)
@Nossody
@Nossody 4 жыл бұрын
SPONSORED BY GOOGLE? we're out here bois
@VamsiKrishna-yt5hi
@VamsiKrishna-yt5hi 4 жыл бұрын
wow...!!!
@liveon7400
@liveon7400 4 жыл бұрын
It's reasonable because those security engineers are following the "best practice" and forgot to consult the developer!
@dichvuseo
@dichvuseo 4 жыл бұрын
Bạn đang dùng những phần mềm nào trong video này?
@edukobaiashi6304
@edukobaiashi6304 4 жыл бұрын
I loved this video, too bad his website is broken and you can't really read more about him
@RapiBurrito
@RapiBurrito 4 жыл бұрын
wow, this bug has "you programmers were so preoccupied with wether or not they could, they didn't stop to think if they should" all over it.
@Dontfkwithme69
@Dontfkwithme69 4 жыл бұрын
I lost you after 0:01 ☹️
@leozendo3500
@leozendo3500 4 жыл бұрын
Google sponsors. Good your channel is less likely to be demonetized.
Generic HTML Sanitizer Bypass Investigation
14:05
LiveOverflow
Рет қаралды 140 М.
Hacking Google Cloud?
21:59
LiveOverflow
Рет қаралды 123 М.
Looks realistic #tiktok
00:22
Анастасия Тарасова
Рет қаралды 105 МЛН
Mom's Unique Approach to Teaching Kids Hygiene #shorts
00:16
Fabiosa Stories
Рет қаралды 28 МЛН
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Рет қаралды 2,5 МЛН
Greatest Moments in Hacking History: Samy Kamkar Takes Down Myspace
5:06
Cracking Websites with Cross Site Scripting - Computerphile
8:34
Computerphile
Рет қаралды 1,5 МЛН
Hacker Tweets Explained
13:47
LiveOverflow
Рет қаралды 158 М.
Local Root Exploit in HospitalRun Software
20:48
LiveOverflow
Рет қаралды 68 М.
HOW FRCKN' HARD IS IT TO UNDERSTAND A URL?! - uXSS CVE-2018-6128
15:47
The Circle of Unfixable Security Issues
22:13
LiveOverflow
Рет қаралды 113 М.
Formatting Transitions to Enhance Your Screenplay's Narrative Flow
8:29
The Age of Universal XSS
12:35
LiveOverflow
Рет қаралды 49 М.
Fuzzing XSS Sanitizers for Fun and Profit | Tom Anthony
29:19