More software companies should act like this, you need to get these people on your side.
@pvic69593 жыл бұрын
google has a lot of pros and a lot of cons. but from my view point, it has way more pros than cons. Google likes to remember they were built by engineers and the only way to win is to get engineers on your side
@TheOrganicartist3 жыл бұрын
@@pvic6959 i agree with your comment, especially google's policy of the 80/20 rule where 1/5th of the time employees can pursue their own ideas and self organize. However, I was severely disappointed when they officially changed their company moto away from "Don't be evil" [The original motto was retained in Google's code of conduct, now a subsidiary of Alphabet. In April 2018, the motto was removed from the code of conduct's preface and retained in its last sentence.] If that wasn't a warning sign I am a platypus.
@pvic69593 жыл бұрын
@@TheOrganicartist I agree with you as well and am deeply disappointed too. i personally know a few googlers and they were very upset by that as well and there was internal uproar. but from what they say, their teams and leads carry on as if that is still the motto. of course, i cant say for sure but i have no reason to distrust them I think its not part of Alphabets moto but it is still part of googles or something
@nightking46153 жыл бұрын
Nah, they are too busy with their heads up their asses asking for "how to reverse a linked list" lol
@Fadexpl3 жыл бұрын
@@nightking4615 someone's salty because they didn't pass the interviews :D
@wlockuz44673 жыл бұрын
Ezequiel: "I'm not an expert on this" Also Ezequiel: *Proceeds to hack Google*
@mrZeeeee3 жыл бұрын
He should go after Fusion and thorium-LFTR nuclear discussion
@kilianschnitzer17913 жыл бұрын
lmaooo 😁 truee-😂
@banni42913 жыл бұрын
@@subverter1.188 there is a theory about that, dumb people thought they were smarter than they were and smarter people thought they were dumber than they actually we're
@eadawdawdad57373 жыл бұрын
@@banni4291 dunning kruger effect and imposter syndrome?
@Rhidayah3 жыл бұрын
Google: am I joke to you?
@brendnbrendn3 жыл бұрын
i’ve never seen someone look so chill about winning 160k
@pvic69593 жыл бұрын
probably shock lol
@TechnicalHeavenSM3 жыл бұрын
It's because hacking it got him far more pleasure
@gidedin3 жыл бұрын
I am so deep in debt, receiving that news would make me cry, A LOT.
@TechnicalHeavenSM3 жыл бұрын
@@gidedin Feel sorry for you ☹️☹️
@d.s.82273 жыл бұрын
Is he from Brazil? Might be afraid he'll get kidnapped or some shit after this video releases lol
@anzeblagus95133 жыл бұрын
I love how he's like "I'm not an expert on this"
@hi_im_angelatrainor3 жыл бұрын
The humble ones are the wisest
@onmc47543 жыл бұрын
Neither is google I guess
@Andre-ih1yg3 жыл бұрын
the more you learn the more you know you are not an expert. It is a weird feeling. You start something new and be like: I will be an expert in this. Then you dig deeper and realize that you are a total noob. And then comes a moment when you can answer somebody else a question to that topic and you feel like: Hey i am not a total noob anymore. It is such a good feeling to help others with something you achieved with hard work. And maybe some day they can help you too.
@circuit103 жыл бұрын
@@Andre-ih1yg Dunning Kruger effect?
@Zack_Taylor3 жыл бұрын
He's got some impostor syndrome
@GPlayerHD3 жыл бұрын
"Now you can maybe see where all of this is going". I have absolutely NO idea my friend.
@JuSoGu3 жыл бұрын
Well, I could see where it could go, but would have thought it wasn’t viable at 3 or 4 points where Ezequiel managed to find a way to progress...
@AlbyTheMovieCreator3 жыл бұрын
Welcome to the club, dude 😎
@AlbyTheMovieCreator3 жыл бұрын
@@M______M isnt GLSB the pro gay-lesbian movement thing
@haaland11033 жыл бұрын
😂😂me too
@haaland11033 жыл бұрын
@@empnadajhhh9469 😂😂
@olfmombach2603 жыл бұрын
How can this dude hold his head up with so much knowledge in it
@nasirjac3 жыл бұрын
😂Lol
@pugboi80173 жыл бұрын
abahahahahaha
@alifellahi3 жыл бұрын
he is not an EXPERT
@vaisakh_km3 жыл бұрын
@@alifellahi the more you know....
@constan-anaconda7493 жыл бұрын
800th like
@scfog903 жыл бұрын
Pretty cheap way for Google to find major flaws that would cost them millions to fix
@TehIdiotOne3 жыл бұрын
Yup. Significantly cheaper to fix issues like this proactively rather than reactively.
@SP1KEY3 жыл бұрын
Yep they can hire hundreds of ppl for 133k or a pentester would cost like 500k-1m for how many’s servers google has
@aryashetty39243 жыл бұрын
@@SP1KEY But not all hundred people can find the bug that this guy found. That's why they hold such competitions.
@M4X13 жыл бұрын
Google are very clever
@bsdetector8373 жыл бұрын
Many companies do this
@oliver11213 жыл бұрын
I thought hackers just typed at the keyboard for 5seconds and then say "I'm in"?
@Krullfath3 жыл бұрын
No lmfao that's just in movies
@press_5803 жыл бұрын
@@tonkatruckgaming5724 wow really?
@acsiata3 жыл бұрын
Only when the password is 1234 :)
@tanned_cosines_3 жыл бұрын
@@tonkatruckgaming5724 main bhi shaamil , lol ic
@vicvaporyuc13353 жыл бұрын
password its literally 8 stars... *******, mind games :^)
@seesaw34063 жыл бұрын
meanwhile im struggling to center a div in css
@rykehuss34353 жыл бұрын
Thats okay, hard problems like that take atleast a week to solve. Atleast if someone is paying you for it
Im from Uruguay, as soon as a heard my country's name i was shocked. Most people dont even know where Uruguay is, but we got this boy killing it rn hahahaha
@bobiCHECK3 жыл бұрын
Yo también ,vamo arriba la celeste
@bread902103 жыл бұрын
me fui a uruguay una vez y lo amo
@biggSHNDO3 жыл бұрын
jajajajajajjajajajahahah
@stianaslaksen57993 жыл бұрын
If we leave the US out of it, I think most people know where Uruguay is!
@theyoutubeaccount84993 жыл бұрын
I think a lot of people know about Uruguay and know where it is. Especially football fans because of Suarez, Cavani, Forlan, Godin, etc.
@skyracer-mk8hg3 жыл бұрын
Having the PR team on standby was great
@wlockuz44673 жыл бұрын
Imagine he used the issue tracker API and created an issue that described this exact bug for the internal team, That would've been scary.
@vishnuprasanth47253 жыл бұрын
Wasn't that a GET request? I might be wrong
@infiniti20112 жыл бұрын
@@vishnuprasanth4725 yeah it only performed get requests.
@Wertercat2 жыл бұрын
New priority issue: “I made this issue via SSRF.”
@dandymcgee2 жыл бұрын
lmfao. genius.
@BarriDuty3 жыл бұрын
In Uruguay with 1K/month you can be 'ok'. Im so glad for him
@bandosbandos3 жыл бұрын
That protobuf enum trick was really cool, props to him.
@YoungGrizzly3 жыл бұрын
What I love about this is that it looks like he was just having fun while learning something. I love it!
@diegocastillo64702 жыл бұрын
I've seen this video a thousand times and everytime I get so happy seeing him smile upon learning he won the GCP Prize. Awesome job.
@coppolator60663 жыл бұрын
Being from Mexico, seeing a fellow Latin American be so smart in coding really makes me proud
@morlarav6022 жыл бұрын
you people expert at that white flour thing that sometimes sneak into nose
@billyusher49072 жыл бұрын
@@morlarav602 Completely unprovoked
@MrRobotUy3 жыл бұрын
I'm from Uruguay and I'm proud of Ezequiel 🇺🇾
@aschmitt893 жыл бұрын
I LOVE how the prize amount is literally “LEEEET”! Lol
@Blentux3 жыл бұрын
This is the way :D
@bellabear6533 жыл бұрын
You do understand that bug he found would be worth a 100s of millions of dollars to them. It's not good money this kid deserved much much more.
@displacegamer13793 жыл бұрын
The first winning is also leet, it is e-leet.
@hexadecimalhexadecimal52413 жыл бұрын
@@bellabear653 I know rigth like what the fuck...give him a mil or something, i wouldnt even submit that sht...but then again i only know pc power button on and off
@bellabear6533 жыл бұрын
@@hexadecimalhexadecimal5241 Well google zero days can be very dangerous and since most of the world uses it makes it worth a lot of money. I am surprised people bother helping Google find these exploits for that kind of money. This company earns billions.
@hammer0823 жыл бұрын
I didn't understand half of what Ezequiel explained ... but I swear to god, when they got to the enum, the first thing that came to my mind was the value 'GSLB' :D great job, though
@arduing95893 жыл бұрын
I'm noob, but would by any chance just calling INT numbers work on a Enum system? like a small bruteforce from 0 to 100 eventually, get something?
@stylishskater923 жыл бұрын
@@arduing9589 No it wouldnt work, thats exactly why its an enum. And for more readability ofc.
@timarbatis6403 жыл бұрын
@@stylishskater92 was wondering too. thanks for explaining
@gauravhksharma57603 жыл бұрын
Wow, this is amazing. Shows it pays to RTFM and sticking to a particular target. Nothing comes easy. Thank you for this amazing walkthrough video ❤️.
@petersuvara3 жыл бұрын
Shows the reality of what it takes and the amount of work to find just on vulnerability. Also shows how dangerous these exploits are the companies vulnerable to it. 👍
@diamondmcpro3 жыл бұрын
You know what would have been funny, is if he figured out how to make a issue on the internal issue tracker for this bug
@SkandiaAUS3 жыл бұрын
Yah that's not within terms of the hackathon, to manipulate data. You'd lose the prize money and probably your reputation in the field!
@infiniti20112 жыл бұрын
@@DIANA-1337 also, it sent get requests
@Psanyi423 жыл бұрын
Exploiting this bug I would have created a new issue in the google issue tracker :)
@ash.mystic3 жыл бұрын
That would be funny 😆
@mactalk28713 жыл бұрын
Im planning to do that on my schools web server for us students. I found a LPE so I can overwrite other ppls websites or even the index of the whole website. I cant wait to see everyone‘s reaction :P
@Psanyi423 жыл бұрын
@@mactalk2871 One of my classmates back in school also tried something, and I think he got in, but the schools system noticed him because he was doing it during IT class, in the school so they called the police on him :D but fortunately for him he school dropped the case againist him. And I also remember that the IT teacher said the he knows the grading system is vulneratble to SQL injection :) (but I don't think my classmate was doing this)
@vinno973 жыл бұрын
@@Psanyi42 a first-year student tried to use SQL injection on our uni's main website and was able to break the database. Admins were furious and I believe demanded his expulsion. My teachers' response was along the lines of "how dare you be blame a freshman, who only just learned what SQL is, for this. Every one of our students knows this is dumb and you shouldn't even have your job of you don't know that"
@xq_nemesis3 жыл бұрын
@@vinno97 Your teacher has a brain
@ChrisNoHandle3 жыл бұрын
Holy Moly, Ezequiel is freaking master mind. This was very interesting, very educational and I wish I just had 1/3 of that knowledge and be able to assemble pieces of puzzle like this. Congratz, you deserved!!!!
@mapleint9973 жыл бұрын
this is a whole documentary :D
@Trash_Night3 жыл бұрын
It would be nice if more companies would act like google. One more nice thing would be to hire guys who have such a talent
@pvic69593 жыл бұрын
lol i would not be surprised if that option was given to him. also if he just applies regularly, Im sure this looks great on his resume
@sudhanshurajbhar96353 жыл бұрын
He worked for some time at Google as an intern, then he got an offer from Facebook as a Security Analyst(just few months back).
@oasdfe16913 жыл бұрын
this guy is amazing! Really good detective work.
@89derpaderp3 жыл бұрын
Maybe it's just me, but I would love it if you could possibly make a video detailing bug bounties, such as basics, legality issues, where to begin etc. Again maybe it's just me but I think this could be a hot topic edit: I should also mention, I understand this information is out there, but was thinking it could be useful as kind of a one-stop-all video
@ДеанДонков3 жыл бұрын
I agree.
@itsRAWRtime0073 жыл бұрын
backing this up
@gavintantleff3 жыл бұрын
Didn’t he make a video about that a while ago? Or am I going crazy?
@itsRAWRtime0073 жыл бұрын
@@gavintantleff maybe, pls do send ?watch if you know it
@jimmanico69743 жыл бұрын
Orange is absolutely my favorite broadcaster in the world of Application Security. What an amazing intellect!
@alexchomiak3 жыл бұрын
The prize is a years salary of the engineer that got fired for leaving this bug in their deployment service
@billigerfusel3 жыл бұрын
Google would end up without engineers then.
@SuperGenericUser3 жыл бұрын
I can guarantee nobody got fired for this.
@mactalk28713 жыл бұрын
By the rate google is fixing CVE‘s in Chrome, there would now be 5 ppl left working at Google
@vinno973 жыл бұрын
I know you're joking, but just in case: such a bug is never the fault of one person. This is a chain of oversights across multiple teams; devs, system architects, and system security, to name a few.
@AshleyM1203 жыл бұрын
When interacting with services to the scale of Google. They will be vulnerabilities particularly in configuration (here the staging dogfood API routed by the GSLB and the GSLB from deployment manager). He is impersonating one major GCP service then one major google internal engine through the SSRF.
@lesleybw3 жыл бұрын
Anyone who's hacked a machine called Quick on HTB will know how cool this is because the machine involved compromise of HTTP/2. I learnt a lot about protobuf and gRPC on that box but unfortunately that was the last time I ever heard or dealt with it again,pretty cool to see a real world implementation of this. Shout out to HTB for the dope hacks.. Excellent work Ezequiel👌🏾💯
@JJ-dz2ne3 жыл бұрын
Grande Ezequiel representando Latinoamérica :)
@alexitoyt11303 жыл бұрын
Sólo urguguay😎
@internetdoggo48393 жыл бұрын
@@alexitoyt1130 shhhh
@jvminhell3 жыл бұрын
@@alexitoyt1130 solo a el 😎
@MONDAUNG3 жыл бұрын
my head hurts by looking at the gibberish codes but somehow he just make sense of it :) Congrats on Winning the Big Prize and you deserve it Ez!
@DrDoctopus3 жыл бұрын
"I'm not an expert on this" Yeah, nor Google 😂
@Adityarm.083 жыл бұрын
Experts blunder too. Slipping up on one endpoint out of hundreds you build doesn't imply lack of expertise.
@amunak_ Жыл бұрын
I'm glad I managed to guess the "transport" right! What a shame would it be if he gave up at that point, especially since the answer is so obvious. But people like him just don't seem to give up. Amazing job.
@cwmd76513 жыл бұрын
That was so cool and informative, I learned a ton about behind the scenes server stuff, great video!
@jmlemmi3 жыл бұрын
Thank you for these Videos! Its always amazing hearing about those exploits. Having them presented in such a great format really helps with accessibility.
@cezarycerekwicki44653 жыл бұрын
I love that the price tag for this bug is a long LEEEEET :-)
@maurolimaok Жыл бұрын
Second time I watch this video, and I still find it awesome! As I understand, besides the prizes, Google should offer him a proposal for hiring, now or soon. He proved to be a great asset.
@yuvraj62798 ай бұрын
He was hired my google
@allaboutvids13 жыл бұрын
“Do you see where this is going?” Me: Absolutely not
@FlySoloG3 жыл бұрын
My heart just get enlightened by these type of findings
@tgrcode3 жыл бұрын
I'm a high school student and I'm honestly seriously considering going into security vulnerability research rather than computer programming, this field is insane
@swagm89193 жыл бұрын
dont you have to be good at programming to understand computer vulnerability?
@tgrcode3 жыл бұрын
@@swagm8919 You really think I'm considering computer science without having experience programming?
@amp41053 жыл бұрын
@@tgrcode wdym alot of people get into CS from college
@HoloDaWisewolf3 жыл бұрын
Most CS students' only experience before college is programming their calculator in math classes. Plus having experience doesn't necessarily mean being good. And being good at coding isn't such a huge advantage either, since CS isn't about programming. Being somewhat proficient in C, JS and Python for instance won't help much with your calculability and complexity theory classes for instance, beside perhaps having heard of the P=NP problem, Turing machines, halting problem, and the Big O notation before. Unless you also have experience with using the pumping lemma to prove that a particular formal language is non-regular.
@HoloDaWisewolf3 жыл бұрын
Or your math, physics, networking, security, operating systems, programming language theories, and compiler ones (and so on). Even for an algorithm course: do you have experience with dynamic programming to solve problems like the Tower of Hanoi puzzle, shortest path in a graph (Dijkstra, Floyd), or obtaining the maximum a posteriori probability estimate of the most likely sequence of hidden states that results in a sequence of observed events in the context of hidden Markov models (Viterbi algorithm)? I'm not showing off, I'm simply trying to show you that CS is about as much about programming as math is about numbers. Which is to say, it's about much much more than that. Not to mention that a functional programming language like Scheme is taught first in lots of university. While you can use the functionnal paradigm in some modern multi-paradigm languages like JS and Rust, it's not what most people do before college. Unfortunately so, since ML is amazing and arguably one of the most important language ever created. Anyway, good luck in your studies!
@alfos.1923 жыл бұрын
I love it when the i banner covers up the very small advertisement text in the top-right corner.
@lagigangoding3 жыл бұрын
this gives me alot of confidence when not understanding something the first time lol
@luckynumbersevuuun3 жыл бұрын
probably one of the better breakdowns on yt, at least for now
@TheWootify3 жыл бұрын
Truly amazing work by Ezequiel, awesome video as well! Congrats!
@raymondsabee3 жыл бұрын
This was extremely well figured out and i learnt a lot by watching this video. Well deserved bugbounty (and great writeup / filmup
@florinsimion64663 жыл бұрын
And yes soo humble. This guy cannot have a price on his head.
@brianbitange66503 жыл бұрын
Feel like re-liking this video every time I watch it. That's an intriguing thought flow Ezekiel has!!
@vladisergeiev72783 жыл бұрын
I love how they threw the 1337 in there. True nerds.
@badraldeensheksalim30982 жыл бұрын
Ezequiel: "I'm not an expert on this" 2 week later Ezequiel: I'm in 🤣
@fenilshah92213 жыл бұрын
This Video actually says: "Never Give Up" & " Believe in Yourself"
@mphelakgaphola65373 жыл бұрын
Fenil: I needed a message like this. Thank. I'll keep that in my mind all the time.
@xsolaris422 жыл бұрын
Don't understand a single thing. Just here to sleep. Soothing & calming voice.
@NicolasDumazet3 жыл бұрын
The caption at 20:50 should be "GSLB addresses". The SRE book publicly documents BNS addresses as /bns//// . Keep up the good work :-)
@unsafecast36363 жыл бұрын
i read the article earlier and i was really happy to see the first line mentioning your video
@pvic69593 жыл бұрын
I work at one of these big companies and he knows more than I know about our own systems lol. I wish I had his ability to read documentation. My eyes just glaze over when I have to read docs :/ to be clear, what I meant is that I havent spent time trying to learn our systems as deeply as he has learned google systems. but to do that you need to read docs :P I didn't mean google systems but my company's internal systems in general lol
@Lamb6663 жыл бұрын
TheOrganicartist this feels out of place, but I'm genuinely curious since you're sharing information like that. Interesting to see the diverse group of people who watch these kinds of videos.
@SoferPeOZN3 жыл бұрын
@@TheOrganicartist I'm definitely going to do the egg + vinegar thing ❤
@Antaquelas3 жыл бұрын
@@TheOrganicartist This might be the most informative comment I have ever read on KZbin. Thank you man
@user-fp6dt1os1l3 жыл бұрын
He says he had to read it 4-5 times and he still didn't fully understand what it does. Don't worry, you're normal :)
@TheOrganicartist3 жыл бұрын
@@Antaquelas I think this is the best compliment I have ever received on the internet! \o/ I'm happy to help.
@maxgomes923 жыл бұрын
Your channel only gets better! I'm a huge fan!
@calvinkrist56723 жыл бұрын
I think gRPC is so cool and I love the creative use of it to enumerate values for fields. Really really awesome work!!!!
@YogeshKumar-qs6te3 жыл бұрын
I have no idea about what's going on here, but still interested in watching this video
@semitangent3 жыл бұрын
I am looking at the blurred pics of the Google team and trying to find a long-haired polish guy :D
@TheOrganicartist3 жыл бұрын
do they work at the seattle branch, i might know them.
@TechnicalHeavenSM3 жыл бұрын
Who???
@Antaquelas3 жыл бұрын
He is making a reference to Gynvael :)
@TechnicalHeavenSM3 жыл бұрын
@@Antaquelas who is he?🤨
@TheOrganicartist3 жыл бұрын
@@Antaquelas Well more than one Seattle google person fits that description, so forgive my mistake of not recognizing the reference ;D rofl
@Heatico3 жыл бұрын
Imo the most important vulnerability in this bug in their cloud API is that most probably other google cloud clients that had an app deployd were exposed also.
@imuser0073 жыл бұрын
Google should give a job for this talented person 🔥
@StefanReich3 жыл бұрын
You lose your freedom when you work at Google
@imuser0073 жыл бұрын
@@StefanReich I don't think so, still most people in google have a lot of freedom
@andrasfogarasi50143 жыл бұрын
@@imuser007 Yeah they have good PR. That happens when you have good PR people.
@shinkiro694203 жыл бұрын
Imagine wanting to work at Google . ewww
@a95031283 жыл бұрын
It’s the reason he found the bug, you always want outside eyes with no bias or policy etc
@conchitafukunaga26073 жыл бұрын
Thanks a lot. This is fun and unremarkable. Congrats to Eziquiel
@tommyhetrick3 жыл бұрын
Live overflow the actor: “oh!”
@ParkerGreen_sh3 жыл бұрын
This was a fantastic video. Thanks for the attention to detail :) and congratulations Ezequiel
@PN-dr1qk3 жыл бұрын
25:04 coming up with that idea is ingenious!!!
@khannamahir3 жыл бұрын
not anywhere close to being the first or closest, just here for the enjoyment :)
@cbanow2 жыл бұрын
Excellent video.!!! .. and remarkable the reasoning that used Ezequiel Pereira !!!.. Congratulations
@__grant3 жыл бұрын
this bug/video was super interesting, this is why i love liveoverflow lmao
@XF3DeX3 жыл бұрын
Vamos Sudamérica carajo! Felicitaciones Ezequiel!
@domemvs3 жыл бұрын
Plot twist: the prize is paid in the form of GCP Credit.
@hariranormal55843 жыл бұрын
ROFL.
@jimjuma79163 жыл бұрын
Haha no way
@rykehuss34353 жыл бұрын
That would be hilarious, but since they use $ sign it kinda means its paid in USD
@pnuema16186 ай бұрын
Insane, Well Done Ezequiel! Looks like I need to understand APIs way more.
@DM-qm5sc3 жыл бұрын
This is a fraction of what a employee would make and they dont have to give any other benefits. They get to crowd source their security and not pay an employee
@Maric183 жыл бұрын
the thing is google has people trying to check those issues. But noone of those found the issue, so the tactic is to make it easier, more legal and still pretty lucrative to tell google when you find stuff like this, instead of risking your own head and google risking big biiiig trouble if they wouldn't pay for stuff like this. Imagine someone finding rce and going for the biggest payday they could. Imagine how much the hacker would earn (probably 10x what google pays, but they risk it not working at all and them going to prison) and imagine what it would cost google... probably billions.
@mzaki85033 жыл бұрын
Yea right poor employees. Google's employee TC is the highest in Silicon Valley and probably the entire world
@borgir63683 жыл бұрын
@@mzaki8503 ikr ..i have seen some commie cuck lords on twitter saying google, amazon pay less to their employees while per capita of their employees is highest in the world
@ggg-ox3hr3 жыл бұрын
Negative Nancy
@erwinheitzman98543 жыл бұрын
Holy cow, this is so interesting and awesome to watch! Thank you for sharing this with us
@MisterSchnubbl3 жыл бұрын
164k Dollars is such a small amount considering the damage that could be done with this vulnerability ... It's a very smart move from companies doint those competitions for their own security measures but I think in this case they could have been a bit more gracious with the amount of money :D
@BossMovesOfficial3 жыл бұрын
Nice work buddy 👊 And smart move Google... easiest way to find your flaws
@sammo78773 жыл бұрын
@14:51 what what program was he using to capture requests and responses? .... great video btw and congrats @Ezequiel Pereira
@bradleywalton9703 жыл бұрын
I believe it was Burpsuite
@dopetext57093 жыл бұрын
same question,
@SouvikHaldarmustang3 жыл бұрын
I love the commentary and the way he is surprised on learning such cool stuffs.
@nicholaslunarodriguez15153 жыл бұрын
Aye! Good job love the expression on his face🏆👍🏾
@Abraham18K3 жыл бұрын
Uruguay Uruguay, proud of you !!!
@Durronko3 жыл бұрын
29:35 "GSLB" was actually my first guess, since he wants to use gslb, i thought that was the obvious choice lol
@rykehuss34353 жыл бұрын
Yeah sometimes even the gurus can miss 'obvious' stuff like this
@wmcphail3 жыл бұрын
Thank you so much Live for the amazing content! I got some stuff I want to show you that I've been working on too!
@xyfurion3 жыл бұрын
"uploaded 10 seconds ago" damn I'm early
@falxie_3 жыл бұрын
This makes me want to get into this, I already liked finding security vulnerabilities at my company as a SWE
@coc0a_mst2 жыл бұрын
why not just get into it then? sounds like you already have the fundamental skills down, just read the terms of a public bug bounty program like Google's one and happy hacking!
@SiaarZH3 жыл бұрын
"What's your name?!" "Ezekiel"
@franchufranchu1193 жыл бұрын
Indeed it is.
@danox47553 жыл бұрын
I'm uruguayan and i didn't was expecting this.
@JuanPablodelaTorre3 жыл бұрын
Every time Ezequiel throws a rock, he hits a private Google server. What kind of luck is that? I guess perseverance does pay.
@galahad92923 жыл бұрын
what kind of Luck ?
@MrNuganteng3 жыл бұрын
How a person could learn such complex things in his lifetime is beyond me.
@BlackOps783213 жыл бұрын
Exploits like this are always caused by lack of someone doing something they should do. Something simple overlooked and/or not checked, at some crucial spot. Still impressive because I'm not sure how he could just find that out somehow externally.
@systemofapwne3 жыл бұрын
Easy to follow, yet I would not have come to his method on my own. Kudos to him!
@jonathan-._.-3 жыл бұрын
jsut to brag a little : my first thought was : "its probably glsb"
@eformance3 жыл бұрын
Too bad it was gslb ;-)
@jonathan-._.-3 жыл бұрын
@@andrewtaye gbsl ?
@lavacrush12343 жыл бұрын
Im just learning what packet sniffing/editing is so I think this is way over my head, but good video. I will rewatch after my training arc and see how much I understand then.
@elliotalderson67693 жыл бұрын
"The Google SRE book he mentions is really cool. It's been on my reading list for many, man years.... But I cannot read books, so I never did." XD I'm DED lol
@aloufin3 жыл бұрын
does he have a learning disability? I don't get the joke lol
@chrislang21183 жыл бұрын
Same I don't understand
@peppigue3 жыл бұрын
@@chrislang2118 @aloufin I suspect he doesn't have the ability/experience/motivation to focus in that particular way. It's my experience that reading books is something I can get into, but the thought of it always seems difficult if it's been a while since I read several books consecutively. I've been planning for a while to get some quality tech books, finally will have the money for shortly. Looking forward to learn subjects in depth while simultaneously getting some sorely needed break from too much screen time...
@kuroodo_3 жыл бұрын
There are a lot of books I want to read, but I just lose interest or focus a few minutes in. I have a better time listening to audio or watching a video/presentation than reading a book. Books aren't for everyone. Might be the case for him too.
@xternl_3 жыл бұрын
wonderful video as always. congrats Ezequiel! hugs
@jamescollier33 жыл бұрын
Plot twist: he has a friend that works at Google
@snooks56073 жыл бұрын
29:29 hah! the second he talked about "what else could it be" at 22:45 I asked out loud "did you try GSLB?" could've saved several weeks, as they say better to be lucky than good :)
@humblelad6813 жыл бұрын
"we concluded that you won the prize","we wanted to surprise you in person", that is definitely eduardo vela's voice.. well blurring doesn't help in this case :P
@appio43453 жыл бұрын
Not cool to expose him like that, respect their privacy
@CZghost3 жыл бұрын
@@appio4345 I don't know who that guy is, I don't know how he looks like, never heard of that guy before. What privacy are you talking about? Just a name doesn't say anything and if his name (alongside with a photo or a voice) has been published in press before, then I guess their privacy has been already invaded, don't you think?
@humblelad6813 жыл бұрын
@@appio4345 Its all in Good faith. Who doesn't know him. He leads GOOGLE'S VRP program and a very cool guy. They are also not talking anything sensitive there ok.