A Vulnerability to Hack The World - CVE-2023-4863

  Рет қаралды 110,698

LiveOverflow

LiveOverflow

Күн бұрын

Пікірлер: 206
@DarmaniLink
@DarmaniLink Ай бұрын
Thank you so much for not being scared to get technical, and overexplaining minute details. I really appreciate that there's still content on this website intended for people who aren't idiots.
@psaini1999
@psaini1999 10 ай бұрын
More than the vulnerability, I really loved how the huffman tree is optimised.
@actuallynxiss
@actuallynxiss 10 ай бұрын
Never thought I'd ever actually use the huffman coding I learned during dsa. Good stuff
@emblemi6345
@emblemi6345 10 ай бұрын
Exactly this came to my mind seeing the chrome cve back then. I realised my information theory professor really taught something useful lol.
@cancername
@cancername 10 ай бұрын
Huffman coding is great! It's being replaced by arithmetic coding and asymmetrical number systems for entropy coding gains in newer codecs, but with diminishing returns :)
@kreuner11
@kreuner11 10 ай бұрын
​@@emblemi6345 why did you go to info theory without interest in it
@patfre
@patfre 10 ай бұрын
I feel like this is a classic moment of the developers not following the golden rule called “never trust user input” because it really is just someone putting impossible values into it and it just doing what it was told without any checking if it was valid or not
@WitherBossEntity
@WitherBossEntity 10 ай бұрын
Silver rule: Never trust C code. Firefox has a sandbox mechanism where it compiles libraries to wasm and then back to C, but I guess they hadn't gotten around to doing that for libwebp yet.
@elmo2you
@elmo2you 10 ай бұрын
My thoughts exactly. I consider it common knowledge, at least to anyone worthy calling themselves professionals, that any externally provided data to any system should be checked and sanitized. There just exists no excuse for omitting that. Even less for a prolific image compression library like this one. If this vulnerability really turns out to be about completely missing sanitation of the compressed image data, then it begs the question how/why this code was ever accepted to run practically everywhere (at least on the internet). If Google is the producer of this library, they should be deeply ashamed. Potentially even be held liable, by such a blatant transgression of a fundamental software engineering rule. While the bug itself might be interesting from a technical perspective, and illustrative of how dangerous unguarded edge conditions can be, omission of input sanitation is far from that. That is just unbelievably stupid, if not outright culpable negligence. I hardly can believe that a company like Google would produce code like that, especially not for a library that is used almost anywhere were modern image formats are processed. I am still hoping I'm just getting this all wrong. I'll happily retract all I just wrote and put an official apology up here instead (if I got it all wrong). However, if it does turn out that this library did not do any input sanitation of the compressed image data, then the producers of this library (I presume the fine folks at Google) have some serious explaining to do!
@sheesh236
@sheesh236 10 ай бұрын
@@elmo2you "Culpable negligence" LOL, is it not negligence to use other people's code without understanding it fully :)
@thewhitefalcon8539
@thewhitefalcon8539 10 ай бұрын
​@@sheesh236 Actually in the law it could be. THIS SOFTWARE IS PROVIDED WITHOUT WARRANTY, EVEN MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
@erikkonstas
@erikkonstas 10 ай бұрын
Yeah that's what I thought as well, it's actually surprising it took so long and was still a zero-day...
@TmOnlineMapper
@TmOnlineMapper 10 ай бұрын
The day I heared about that vulnerability I was hoping for coverage on the technical details. Thank you so much for that!
@danielgysi5729
@danielgysi5729 10 ай бұрын
Excellent video. Every other resource on this topic glosses over the details but this one dives right in. This series will be invaluable for new security researchers.
@mahfuzsobhan8184
@mahfuzsobhan8184 10 ай бұрын
"Why you should study computer science, pay attention to your data structure and algorithm classes". This dialogue made me revisit the CSLR Intro to algo book after a long time 😂
@k3dr1
@k3dr1 10 ай бұрын
Amazing book, filters me hard!
@0heinz0
@0heinz0 10 ай бұрын
Amazing! Rally like the format, the how to get the basic knowledge for the problem, finding the keywords and also the explanation of the thought process.
@vishalmishra7018
@vishalmishra7018 10 ай бұрын
I started following your channel when I was in university and remembered being amazed by technical depth of your videos. Few years later, I am happy that I am able to follow along! Thanks a lot for making this series.
@fouzaialaa7962
@fouzaialaa7962 10 ай бұрын
they call it the Huffman's algorithm becoz the guy who came up with the algorithm was definitely huffing glue when he came up with this method to compress stuff !!!!
@will_i_craft5555
@will_i_craft5555 10 ай бұрын
I look three times at the webp source code to underst their huffman table implementation and you just clarified all my questions in three seconds
@boomknuffelaar
@boomknuffelaar 10 ай бұрын
Ah! I've spotted an incorrect thing in your videos, finally! 😋 At 7:08 you say that color values range from 0 - 255 and that a table would thus always have 255 entries. But 0 - 255 are 256 values :O
@kwzu
@kwzu 10 ай бұрын
buffer overflow!
@konstantinub
@konstantinub 10 ай бұрын
He misspoke. The correct number 256 was still written on the screen (“This table always holds 256 possible Symbols”).
@free_user
@free_user 10 ай бұрын
I found myself that I like hacking and cyber security in general and in some days I ask my self: *)- "how the photo or image are transmitted and we see it in the phone or computer... or even how it is captured from the beginning"? And today I found this awesome video with awesome vulnerability with awesome channel. Thank you so much
@oneofpro
@oneofpro 10 ай бұрын
It's interesting to note how much money was spent to roll out this update to final platforms and how it correlates with the funds that need to be invested to create a more secure version of the app.
@n1rus
@n1rus 10 ай бұрын
Wow 🤩 amazing work in explaining this.
@cinderwolf32
@cinderwolf32 10 ай бұрын
File formats and compression are specific interests of mine, the Tom Scott video and the two Reducible videos are all ones that I've watched before 😁
@dfsrow
@dfsrow 10 ай бұрын
I hit like on his videos first and then watch it! Always learn so much from him. Thanks liveoverflow
@ВиталийОвчаренко-и1н
@ВиталийОвчаренко-и1н 7 ай бұрын
The stages involved in resolving issues related to CVE-2023-4863 include identification of the vulnerability, vendor acknowledgment, patch release, and updating affected products.
@mrfincher
@mrfincher 10 ай бұрын
Maybe the exploits discussed in the 37C3 talk "Operation Triangulation" could be interesting for video? They went over a lot of stuff in that talk that you could probably break down and explain pretty well
@ru31k32
@ru31k32 10 ай бұрын
I hope there will be more series like this one. :)
@Nunya58294
@Nunya58294 10 ай бұрын
Damn script kiddies.
@ru31k32
@ru31k32 10 ай бұрын
@@Nunya58294 I mean for the knowledge part, not for the scripting thing. Also, at some part people needs to start.
@Umbreedon
@Umbreedon 9 ай бұрын
@@Nunya58294 bro be saying this and acting like he wasn't a skid at some point
@dragonminz602
@dragonminz602 10 ай бұрын
Amazingly explained. Thank you!
@kipchickensout
@kipchickensout 10 ай бұрын
you reminded me of club mate in one of the previous videos and i bought two in the supermarket, every time i drank a bottle of it i had such a schiss
@k0ns0l
@k0ns0l 10 ай бұрын
Top-notch, as always!
@SoreBrain
@SoreBrain 10 ай бұрын
04:58 the red tshirt overlay is too perfect 😂 Edit: I'm hyped for the fuzzing video!
@TheRobinrosenberg
@TheRobinrosenberg 10 ай бұрын
Really good video
@teogorqui7061
@teogorqui7061 10 ай бұрын
FINALLY SOMEONE TALKING ABOUT THIS IN KZbin! 🙏👏👏
@wareya
@wareya 10 ай бұрын
PNG doesn't actually compress each color independently; the color-independence comes into play on the filtering level. The lossless compression step in PNG is a single giant Deflate (i.e. zip) stream.
@thegooddalek04
@thegooddalek04 10 ай бұрын
Brilliant video! So well explained and what a curious topic. Shame you didn't take the opportunity to say "impossibilitree" though, that would have been good!!
@zyansheep
@zyansheep 10 ай бұрын
Fun fact: if you also know about things like b-trees (binary trees that have multiple entries on a given level) the same reasoning applies to why huffman tables are used... cache locality!
@mrdzha9519
@mrdzha9519 10 ай бұрын
thank you for the job you are doing!!!!!!
@wChris_
@wChris_ 10 ай бұрын
If this vulnerability could have been found by a fuzzer, then why did no one bother to check? And if it cannot, why? What makes this vulnerability elusive to fuzzing? I hope to see an answer to this in part 2!
@hung8969
@hung8969 10 ай бұрын
my thoughts as well, first thing id think of when it comes to the wallet feature.
@dealloc
@dealloc 10 ай бұрын
I recommend reading "Advanced Fuzzing Unmasks Elusive Vulnerabilities" post by Marc Heuse of Security Research Labs. It goes in depth about the possibility of finding vulnerabilities with advanced fuzzing techniques and whether those techniques could've surfaced this specific vulnerability in libwebp earlier.
@philipegoulet448
@philipegoulet448 10 ай бұрын
The fuzzer would eventually enter the correct inputs to trigger this, but it might take forever! In theory no exploit is elusive to a fuzzer if it can be triggered by a user, but we don't have infinite time or computing power
@nicholasvinen
@nicholasvinen 10 ай бұрын
If someone was asked to read through the code and check for buffer vulnerabilities I bet they would have found it within a few hours. Obviously nobody performed a security audit on the code (or they were incompetent). This might be a good application for an AI.
@JamEngulfer
@JamEngulfer 10 ай бұрын
@@hung8969 It’s probably too complex of a chain to easily fuzz start to finish. You might as well put the effort into fuzzing the webp library directly.
@eliluong
@eliluong 10 ай бұрын
amazing content, as always.
@pognar
@pognar 10 ай бұрын
8:22 was the exact moment I said “oh shit”. Great video
@hamzahajjaj4106
@hamzahajjaj4106 10 ай бұрын
the best IT tutor on the internet
@0xGRIDRUNR
@0xGRIDRUNR 10 ай бұрын
im interested in the upcoming videos because this seems like an incredibly niche bug to find without deliberately looking for it, unlike many other bugs Super cool video!
@LongBean7
@LongBean7 10 ай бұрын
What a cliffhanger!
@psaini1999
@psaini1999 10 ай бұрын
This vulnerability sounds so obvious in hindsight. It's parsing the image assuming that a correct program generated it. There must be some checks for it but clearly not enough.
@nicholasvinen
@nicholasvinen 10 ай бұрын
There is a simple and common way to avoid this kind of problem. Any time a pointer is passed for data to be written to, always pass the maximum number of bytes that can be written and the function never writes more than that (or pass a buffer end pointer, same basic effect). Not doing that shows a serious lack of discipline on the part of the programmer(s).
@MisterQuacker
@MisterQuacker 10 ай бұрын
ty for your videos good soul! Party Hearty 💜
@lootclan5842
@lootclan5842 10 ай бұрын
FBI backdoor my beloved
@forestrf
@forestrf 10 ай бұрын
All the hands at 5:00 xdd
@mystmuffin3600
@mystmuffin3600 10 ай бұрын
Looking forward to the next videos and maybe even an ios exploit chain demonstration in a simulator?!
@MoiJsuisTropBeauPourToi
@MoiJsuisTropBeauPourToi 10 ай бұрын
LETS GO CITIZEN LAB LOVE JSR
@skylo706
@skylo706 8 ай бұрын
@LiveOverflow Could you make a video about the security risks of C if programmers don't know all the intricacies of it? What comes to mind is the recent Project64 Emulator exploit and stuff like scanf for example. It would be really interesting in my opionion as there are a lot of pitfalls when it comes to C programming
@bigmistqke
@bigmistqke 10 ай бұрын
5:00 lol love that edit where u superimpose over tom scott. Red shirt gang.
@BlackHermit
@BlackHermit 10 ай бұрын
Strong hacking world.
@kevinwydler7305
@kevinwydler7305 10 ай бұрын
YESSS !!! This is right down my hacking ally
@KangJangkrik
@KangJangkrik 10 ай бұрын
Even simple task like counting battery percentage accurately isn't easy. Coulomb counting, kalman filter, exponential fitting, and least square algorithm are mixed well into one .c file, crazy! If you think that's hard, compression algorithm is a lot more crazier than that
@williamdrum9899
@williamdrum9899 10 ай бұрын
Game Boy: "F that, I'll just run out of battery without warning"
@KangJangkrik
@KangJangkrik 10 ай бұрын
@@williamdrum9899 lol reminds me chinese phone that has fluctuating battery percentage
@tobixnator9314
@tobixnator9314 10 ай бұрын
Cool Video. I love your content.
@tg7943
@tg7943 9 ай бұрын
Push!
@PwnySlaystation01
@PwnySlaystation01 10 ай бұрын
Yay, webp. The format you can't right click and save without extra steps! I wish they'd just delete the format lol
@CyReVolt
@CyReVolt 10 ай бұрын
Good thing that webp isn't in UEFI based firmware yet. Only broken GIF, JPEG, PNG and BMP parsers. :D
@xspager
@xspager 10 ай бұрын
I was studying DEFLATE this days lol
@YandiBanyu
@YandiBanyu 10 ай бұрын
Huh, could that probably what was being used by pegasus?
@wildstorm74
@wildstorm74 10 ай бұрын
My brain hurts now after watching this video? I think, I see why this very problem...with that said though. I bearly understand any of that.😭😑 I didn't want to that job to begin with, and lucky don't because that seems like a not so fun time for me.😕 I don't even see the point of learning this.😅
@somiltyagi7127
@somiltyagi7127 10 ай бұрын
amazing
@netanelkomm5636
@netanelkomm5636 10 ай бұрын
Heya, I've got a question that might be related to your past videos, but I thought it's better to ask it in your recent video. In a read world scenario, suppose I successfully manage to perform some sort of attack, let's say exploit UAF or some shellcode injection, and I get a remote shell. What can I do with this shell? In every CTF all I have to do is cat the flag file. But what can I do with a shell in a real world scenario? Could you give me some thoughts about it? Thanks!
@davidchill79
@davidchill79 10 ай бұрын
Where’s the second video ? I feel like the only one not seeing it ;)
@kingshukcs
@kingshukcs 10 ай бұрын
When would hextree be available?
@williamdrum9899
@williamdrum9899 10 ай бұрын
What's the best way to protect ourselves until this is fixed?
@LiveOverflow
@LiveOverflow 10 ай бұрын
it's fixed
@nejuspesnejsi
@nejuspesnejsi 10 ай бұрын
Instead of fixing the bug we could abandon webp format all together. What a missed opportunity for a humanity.
@erikkonstas
@erikkonstas 10 ай бұрын
What you're saying is HERESY... "abandoning" the format is simply impossible (the cat is already out of the bag), so any security hole must be fixed ASAP. If you still think that "abandoning" the format is possible, go convince a few million people to up and take down every last .WEBP file out there!!!
@flipped_bit
@flipped_bit 10 ай бұрын
Where is part 2?
@Andi-pv3sj
@Andi-pv3sj 10 ай бұрын
Could you show us some pentesting against teamspeak server?
@user-allah_God
@user-allah_God 10 ай бұрын
I have a question about road map in Malverne analysis and learn exploitation I feel free with books can you introduce me some books for learned this field I want to know I continued true or false in this way
@jfb-
@jfb- 10 ай бұрын
but writing code in c is totally a good idea!!!!1!
@williamdrum9899
@williamdrum9899 10 ай бұрын
My hot take: Programmers who don't know assembly have no business writing C
@HinaraT
@HinaraT 10 ай бұрын
I don't know if i'm the only one but on my android tablet I cannot choose the quality of the video it is marked as unavailable in the options ... wtf and it choose a crappy one....
@imax9000
@imax9000 10 ай бұрын
I don't want to live on this planet anymore
@mrAjor
@mrAjor 10 ай бұрын
Kommentar für den Algorithmus ;)
@0xKilty
@0xKilty 10 ай бұрын
I bet Mark Adler is laughing at this one
@codieefranchise4637
@codieefranchise4637 10 ай бұрын
Can anyone explain the part 15:38, I couldn't get why is the tree invalid.
@hamburgerfatso
@hamburgerfatso 10 ай бұрын
There are only two possible codes of length 1 - 0 or 1. So you cant assign 4 symbols with a code of length 1, only 2 symbols at most.
@Sandeep-c3c4j
@Sandeep-c3c4j 9 ай бұрын
Some malware, spy app and virus is difficult to remove even after factory reset phone they came automatically don't know how I am in problem please help me . Not possible to change phone hard-disk
@rambo6573
@rambo6573 10 ай бұрын
Does it means that this can be exploited currently on ios under a certain version ?
@tony5226
@tony5226 10 ай бұрын
yo this guy looks like mr robot
@WistrelChianti
@WistrelChianti 10 ай бұрын
Don't make videos about CVE's at Christmas man... someone of us didn't get over log4j yet...
@hamahawlery7194
@hamahawlery7194 10 ай бұрын
Yeah so we can call it butter overflow not buffer 🤣
@alexestefan7521
@alexestefan7521 10 ай бұрын
But how would an image get turned into a nonsensical array? The image exists and it gets turned into an array. Wouldn't that array be valid?
@LiveOverflow
@LiveOverflow 10 ай бұрын
good question ;) and it's almost philosophical. The image is not turned into a nonsensical array. There exists no image yet. If you see an image, it means that the bits and bytes were already interpreted and rendered! The vulnerability (and the nonsensical array) happen during the interpretation of the invalid bits and bytes.
@tomysshadow
@tomysshadow 10 ай бұрын
The image doesn't need to have been created with the official WebP library, that will always generate valid results. One could write their own code to create an invalid image: a file that purports to be WebP but that doesn't follow the specification or doesn't match expectations in some way. Or they could open a valid image in a hex editor to directly edit its bytes, changing it to be invalid.
@hamburgerfatso
@hamburgerfatso 10 ай бұрын
You can manually craft a file consisting of carefully picked bits that cause the decompression algorithm to generate an invalid huffman table. Then name the file with webp file type and send it to someone.
@GuyMassicotte
@GuyMassicotte 10 ай бұрын
Nothing is secure by design. The proof is "pegasus" ;)
@eno88
@eno88 10 ай бұрын
As if I needed more reasons to hate webp
@MikeJones-mf2rt
@MikeJones-mf2rt 10 ай бұрын
Israel’s Unit 8200 getting busy again 🙄
@alonzy989
@alonzy989 10 ай бұрын
these are ex-8200 rather notoriously known and the unit is not associated with them at all, to the point of vilifying them and calling them hired guns
@MikeJones-mf2rt
@MikeJones-mf2rt 10 ай бұрын
@@alonzy989 Talpiot Program is an offshoot of 8200 for the most successful red-teamers lol, it’s a promotion for them. 8200 operatives do not vilify Talpiot operations, they aspire to be recruited to them.
@sjswitzer1
@sjswitzer1 10 ай бұрын
I only wanted to know one thing from this video and that was why fuzzing didn’t find the vulnerability. Watched to the end and… “wait for the next video.”
@marioniangi
@marioniangi 10 ай бұрын
Hehehe first😂
@adithya543
@adithya543 10 ай бұрын
13th
@alang.2054
@alang.2054 10 ай бұрын
The classic Rust would have fixed that moment
@coarse_snad
@coarse_snad 10 ай бұрын
While I am normally a rust shill, keep in mind _why_ this complex allocation was done: cache locality. You could not reasonably do this in rust. I would personally prefer safety over speed though, so I'd still say rust would be a good option if this was my personal project.
@dealloc
@dealloc 10 ай бұрын
This specific problem is not something Rust would nor could have prevented-this is a programmer error by not validating the source input (i.e. file). The buffer could be overflowed by crafting an image file that caused the Huffman table construction to exceed the pre-calculated buffer size. So it would've been outside any compiler's knowledge. What could potentially have caught it would have been using advanced fuzzing techniques. However, fuzzing is not a silver bullet, and this vulnerability was not caught by Google's OSS-Fuzz project. It's possible that fuzzing alone wouldn't have been enough to catch this vulnerability at all.
@MrFram
@MrFram 10 ай бұрын
@@dealloc > so it would've been outside of any compiler's knowledge In other words, the compiler would insert a bounds check here and prevent the bug...
@dealloc
@dealloc 10 ай бұрын
​@@MrFram The vulnerability was introduced when applying a common optimization used in Huffman decoders; The decoder was optimized by pre-reading N bits to determine how many to consume and which symbol to decode. Longer symbols previously required graph traversal but were improved using an array of lookup tables. The new tables store (nbits, value) pairs; if nbits exceeds N, it's a table index, enabling efficient decoding. However, a bug emerged during table construction, risking overflow due to unanticipated table sizes. Rust's safety mechanisms might not have caught this because while it's unsuitable for unsafe code in table construction, the lookup phase often requires unsafe operations for performance. Even tools like "enough" in zlib, as explained in this video, predict table sizes under specific constraints, but when those constraints aren't met, Rust's safety wouldn't prevent a wrong table construction, potentially leading to security issues.
@MrFram
@MrFram 10 ай бұрын
@@dealloc stop using chatgpt and actually think about what you just wrote. > it's unsuitable for unsafe code in table construction, the lookup requires unsafe operations for performance So table construction can be done using safe code, and only the decoding lookup has to use unsafe
@tomroggero
@tomroggero 10 ай бұрын
Would this be a vulnerability still on Rust? I am a complete ignorant in memory safe stuff.
@_Wansmet
@_Wansmet 10 ай бұрын
third
@JetsFan123-y4e
@JetsFan123-y4e 10 ай бұрын
15th
@daominh89
@daominh89 10 ай бұрын
2th
@mohamedmonem2645
@mohamedmonem2645 10 ай бұрын
Webp has always been bad
@hung8969
@hung8969 10 ай бұрын
i beg you! please make a video on CHACHA20! ive been leanring about it for 3 months and still struggle to fully understand the 4x4..... its killing me lol
@johnnywilliams2641
@johnnywilliams2641 10 ай бұрын
It was a little strange to hear the 7th of september. Strange how our brains work.
@Cornbread2100
@Cornbread2100 10 ай бұрын
First 😎
@ItIsJan
@ItIsJan 10 ай бұрын
you are the actual first!
@Cornbread2100
@Cornbread2100 10 ай бұрын
@@ItIsJan I’m a pro speedrunner now lol
@Wierie_
@Wierie_ 10 ай бұрын
Your mom’s first
@Cornbread2100
@Cornbread2100 10 ай бұрын
@@Wierie_ HAHAHAHA what a creative joke, you’re hilarious
@realzguardian
@realzguardian 10 ай бұрын
This will be pinned!
@shortseror3033
@shortseror3033 10 ай бұрын
Omg i thgought it was the hentai over fl0w part 2🤣🤣🤣🤣😌
@fb_zero
@fb_zero 10 ай бұрын
Olá, tenho um desafio pra você, tem como mudar o nome do Chipset de uma placa mãe, ou fazer com que o ryzen master não verifique a compatibilidade dela e abrir normalmente? 😂😳👉👈👍
@_CryptoCat
@_CryptoCat 10 ай бұрын
I never trusted WebP 😒
@LiveOverflow
@LiveOverflow 10 ай бұрын
But vuln is fixed now
@_CryptoCat
@_CryptoCat 10 ай бұрын
@@LiveOverflow Still don't trust it 🧐
@hyronharrison8127
@hyronharrison8127 10 ай бұрын
But IOS is more secure!
@geckwwo
@geckwwo 10 ай бұрын
Did you even watch the video? Smh
@hyronharrison8127
@hyronharrison8127 10 ай бұрын
@@geckwwo i did
@geckwwo
@geckwwo 10 ай бұрын
@@hyronharrison8127 "iOS is more secure" secure or not, a bug still exists (existed). And I'd argue that iOS is more secure - yeah, Apple does a great job of serving updates even to old devices, but Google does the same for Android, even on other manufacturers' devices (via Google Play security updates). Disallowed sideloading on iOS is more of an obstacle than a feature. (and APK sideloading is disabled on Android by default, which is the only correct way for both security and freedom)
@patfre
@patfre 10 ай бұрын
@@geckwwonot to mention this isn’t Apple’s fault since it’s Google format and google responsibility so Apple was just better and fixed it without knowing it was a webp thing
@amuga_1
@amuga_1 10 ай бұрын
This dude, instead of jump right into explaining the vulnerability and how it works he just goes on to ramble for the first 2 minutes. Anybody know his credentials? Listen dude people don't like spending time on youtube watching videos, how about you make all this more concise next time?
@LiveOverflow
@LiveOverflow 10 ай бұрын
my credentials: liveoveflow@gmail.com:stfu70053r
@nabilou555
@nabilou555 10 ай бұрын
All software needs to be rewritten using rust😢
@username65585
@username65585 10 ай бұрын
If only they had rewritten it in rust.
@Nikebl
@Nikebl 10 ай бұрын
IOs != World
@RecursiveTriforce
@RecursiveTriforce 10 ай бұрын
What about Chrome?
@patfre
@patfre 10 ай бұрын
They literally said Android, Linux and windows as well
@dazraf
@dazraf 10 ай бұрын
Q about Hextree: Signups are disabled. How may I get a signup code please?
Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)
24:11
LiveOverflow
Рет қаралды 62 М.
How The RIDL CPU Vulnerability Was Found
25:24
LiveOverflow
Рет қаралды 122 М.
PIZZA or CHICKEN // Left or Right Challenge
00:18
Hungry FAM
Рет қаралды 7 МЛН
Trick-or-Treating in a Rush. Part 2
00:37
Daniel LaBelle
Рет қаралды 27 МЛН
Каха и лужа  #непосредственнокаха
00:15
Hacking Google Cloud?
21:59
LiveOverflow
Рет қаралды 124 М.
7 Cybersecurity Tips NOBODY Tells You (but are EASY to do)
13:49
All Things Secured
Рет қаралды 759 М.
Hacking Bank from Hackthebox |  HTB Bank Walkthrough | Ethical Hacking
28:17
What is a Browser Security Sandbox?! (Learn to Hack Firefox)
18:06
LiveOverflow
Рет қаралды 144 М.
if you view this image, YOU GET HACKED.
8:40
Low Level
Рет қаралды 387 М.
The Circle of Unfixable Security Issues
22:13
LiveOverflow
Рет қаралды 115 М.
My theory on how the webp 0day was discovered (BLASTPASS)
15:03
LiveOverflow
Рет қаралды 56 М.
Trying to Find a Bug in WordPress
18:07
LiveOverflow
Рет қаралды 91 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 277 М.
Local Root Exploit in HospitalRun Software
20:48
LiveOverflow
Рет қаралды 69 М.
PIZZA or CHICKEN // Left or Right Challenge
00:18
Hungry FAM
Рет қаралды 7 МЛН