Missing HTTP Security Headers - Bug Bounty Tips

  Рет қаралды 136,318

LiveOverflow

LiveOverflow

Күн бұрын

In this video we talk about various HTTP headers that can improve or weaken the security of a site. And we discuss how serious they are in the context of Google's bug bounty program.
Find the full playlist with videos for Google here: • BUG HUNTER UNIVERSITY
Chapters:
00:00 - Background Info
03:11 - Intro
03:53 - HTTP Security Header Overview
04:38 - Example #1: X-Frame-Options
06:43 - Example #2: Content-Security-Policy (CSP)
08:16 - Example #3: Strict-Transport-Security (HSTS)
10:44 - Example #4: Cross-Origin Resource Sharing (CORS)
13:12 - Example #5: Cookie Security Flags (HttpOnly)
14:25 - Summary
15:23 - Outro
*advertisement because the video was originally produced for Google: bughunters.google.com/learn/v...
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Instagram: / liveoverflow
→ Blog: liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow

Пікірлер: 171
@lukor-tech
@lukor-tech 2 жыл бұрын
You know what I absolutely love? The sheer idea, that he can sit at home, with a shirt that wasn't ironed for the google video. I am not saying he didn't try - it's just the audience more focused on the content than the creator. I don't know how many will share the thought with me, but here it is. Good stuff.
@laja6108
@laja6108 2 жыл бұрын
True, we live in amazing times
@Menaceirl
@Menaceirl 2 жыл бұрын
I think a large part, if not the vast majority of the audience this video is intended for are likely sitting at home wearing a shirt that was not ironed.
@lukor-tech
@lukor-tech 2 жыл бұрын
@@Menaceirl ha! I didn't even had one!
@RaduStancaOnline
@RaduStancaOnline 2 жыл бұрын
This is the curse of being familiar with the content(aka being 1337 h4ck3r), you start to notice things that generaly you would and that would make the video a little bit better.
@Zedoy
@Zedoy 2 жыл бұрын
didn't even notice wow
@saadmgdm706
@saadmgdm706 2 жыл бұрын
Nothing makes me more happier than seeing this guy.
@JimTheScientist
@JimTheScientist 2 жыл бұрын
same :D
@LeonardoNicchio
@LeonardoNicchio Жыл бұрын
@@JimTheScientist Tô aqui na casa dele e vou ficar com o cara do carro e ele me disse que vai ser um
@Root-uno6nw
@Root-uno6nw 2 жыл бұрын
Finally some browser security; this is the stuff that really needs to be taught, it’s practical and real world content. Keep these kind of videos up man.
@SirKrazzy
@SirKrazzy 2 жыл бұрын
Totally agree bro Ahaha nice seeing you here
@Root-uno6nw
@Root-uno6nw 2 жыл бұрын
​@@SirKrazzy This is epic, good to see you here too bro!!
@phillawrence9741
@phillawrence9741 2 жыл бұрын
Missing security headers are usually out scope on bug bounties program. Nice presentation is worth demonstrating.
@gFamWeb
@gFamWeb 2 жыл бұрын
This seems to really boil down to: "if you can't accurately and specifically articulate how something can be exploited, it's likely not actually vulnerable"
@TimLF
@TimLF 2 жыл бұрын
"POC or GTFO"
@HD_Heresy
@HD_Heresy 2 жыл бұрын
I'm new to Cyber Security and have been denying third party application access based on bad results from HTTP header scans, this video has helped me so much thank you!!!
@000t9
@000t9 2 жыл бұрын
Love your videos! So much informative!
@elevatecyber5031
@elevatecyber5031 2 жыл бұрын
Very thought-provoking video! No one else is talking about this.
@7guitarlover
@7guitarlover 2 жыл бұрын
This is surely one of my favorite Channel on youtube !!!!
@TheJobCompany
@TheJobCompany 2 жыл бұрын
here's my typo bounty submission: at 5:55 in the English subtitles there's a typo - it says "doens't" instead of "doesn't"
@LiveOverflow
@LiveOverflow 2 жыл бұрын
what's your paypal so I can send you your bounty?
@TheJobCompany
@TheJobCompany 2 жыл бұрын
@@LiveOverflow oh, no, thanks, but I only except payments in high quality cybersecurity videos, if that's cool.. so yea, I'm gonna be needing a couple of these instead, ty
@bugr33d0_hunter8
@bugr33d0_hunter8 2 жыл бұрын
@@TheJobCompany yeah apps these days are never getting it right. Same with speech recognition, its going to get me locked up one day for printing out the wrong words.
@harshrathod2237
@harshrathod2237 2 жыл бұрын
This is really crucial to understand that absence of a particular header doesn't mean the web application is vulnerable. Instead one should try to figure out how the absence of that header impacts the application in general or maybe chain that impact to find a realistic security flaw.
@SeMoDrix
@SeMoDrix 2 жыл бұрын
I never knew why i had hsts set up, just did it because it was good practice but never knew how it worked… very informational video, even if it was just for google!
@makezi7
@makezi7 Ай бұрын
Thank you for sharing this informative content. It's interesting to note how the previous Systems Administrator at my workplace was strongly in favor of implementing HTTP Strict Transport Security (HSTS) and advocated for team members to obtain Security+ certification. Unfortunately, his misconfigured setup contributed to some security issues, highlighting that HSTS isn't always a critical requirement for website security. This situation underscores the impact of knowledge gaps and how they can lead to misplaced pressures within teams. Additionally, thank you for sharing the KZbin video-it provided valuable insights, even though it was originally shared on Google. We truly appreciate it.
@123Shadowxx
@123Shadowxx 2 жыл бұрын
Very informational video, thank you as always for the nice content!!
@The-solo
@The-solo 2 жыл бұрын
As always the video is so Informative. I'm a beginner and I'm about to start my bug bounty journey. I must say it helped me a lot.
@oldGoatMilk
@oldGoatMilk 2 жыл бұрын
Great video! I'm going to watch it again, a lot of good information.
@kamandejohn
@kamandejohn 8 ай бұрын
Great insights. Thank you !
@ca7986
@ca7986 2 жыл бұрын
What an amazing explanation
@mohitjaswal7657
@mohitjaswal7657 Жыл бұрын
Amazing video. Please keep posting such real life examples of how to assess these reports generated by pen testing automation tools!!
@jesslopez2494
@jesslopez2494 2 жыл бұрын
Honestly, in the stratus of people out there being "Security Content Creators" L.O. has always come across as a passionate hacker. Even when advertising something, not trying to sell it. I appreciate that you aren't a grifter man, because there are plenty in this field.
@leok6717
@leok6717 Жыл бұрын
Great video!!
@ashvinbhuttoo
@ashvinbhuttoo 2 жыл бұрын
Web dev here, i actually learned something, great content👌
@sayamqazi
@sayamqazi 2 жыл бұрын
5:33 This is exactly what I was trying to explain to a client that if a 3rd party npm module is being used in a static client size electron app the vulnerabilities reported by npm have ZERO impact because those only apply if the module is being using to process a user provided input in a route handler in a server app.
@anilrp112
@anilrp112 10 ай бұрын
Atleast you said it!! So happy
@JuanBotes
@JuanBotes 2 жыл бұрын
Thank you for sharing your knowledge and clear explanations \o/
@pentestical8265
@pentestical8265 2 жыл бұрын
Great video as always, but I think one thing could be slightly incorrect. Sometimes (at least the last time I checked) authorization headers are automatically submitted by the browser. HTTP Basic Authentication credentials are cached so you don't need to fill out the prompt every time you visit a new page. A CORS misconfiguration in this case could allow data from a user authenticated with basic with to have data stolen. I think the same also applies to client certificate based auth, but I've never tested this one myself.
@mistercyber1848
@mistercyber1848 2 жыл бұрын
love your videos
@git-tauseef
@git-tauseef 2 жыл бұрын
What an explanation 🙌
@OthmanAlikhan
@OthmanAlikhan 8 ай бұрын
Thanks for the video =)
@brymko
@brymko 2 жыл бұрын
ayyyy nice to see that you also still have the offcon covid wristband on your wrist :P
@charlie5tanley
@charlie5tanley 2 жыл бұрын
excellent content. thank you.
@rivhaaken9763
@rivhaaken9763 2 жыл бұрын
Love it !
@lakshanperera9735
@lakshanperera9735 2 жыл бұрын
thank you this video
@chiragartani
@chiragartani 2 жыл бұрын
Trust me nowadays people are more interested in this kind of videos I mean bug bounty niche, instead of Buffer Overflow or binary exploitation things. I mean this is what people can easily learn and earn through it. Your last Apisix video was amazing too. Keep it up, Great video. 👏🌟 Thank you!
@realslimchaggy
@realslimchaggy 2 жыл бұрын
I recommand subscribing to bug bounty reports explained for the best bug bounty knowledge
@dan-garden
@dan-garden 2 жыл бұрын
lookin more like John by the day my dood, keep it up
@umar7110
@umar7110 2 жыл бұрын
Great ❤️❤️
@ReposHaug
@ReposHaug 2 жыл бұрын
To be fair if we only applied CSP to sites with a known existing XSS, that would be a solid way to broadcast a known issue on your site :)
@andyelgangster5320
@andyelgangster5320 2 жыл бұрын
Very informative 😎
@benjaminnewman3833
@benjaminnewman3833 2 жыл бұрын
Vulnerability scanners are brilliant at what they do and its just that, they give you a static output without providing any context, they cut out all the manual crap you have to go through to assess a web apps/infra vulnerabilities. But people seem to use them as gospel when in fact they should be used to determine the posture of that thing you are scanning. If the output you receive shows a bunch of critical and high ratings then it's probably best to either get an actual pen test conducted or you need to start looking at who is developing and either assess their capability at protecting your data or up-lifting sending them on training courses. Too many orgs I go to and consult for just blindly think because they have Qualys or a similar DAST tool that they have "really good security," when in fact they don't understand what the tool is actually trying to show
@SrRunsis
@SrRunsis 2 жыл бұрын
Amen
@chizzlemo3094
@chizzlemo3094 2 жыл бұрын
Great video
@gk_eth
@gk_eth 2 жыл бұрын
Woww!! Simply loved the quality of the content in this video! looking forward for much more quality content from you ..✌️✌️
@manuelfrosi2799
@manuelfrosi2799 Жыл бұрын
Great video, i would have liked that the cache header was also explained
@Amd107
@Amd107 5 ай бұрын
Nice
@user-kp7fj1ig6z
@user-kp7fj1ig6z Жыл бұрын
At 9:57 when the browser internally redirects to HTTPS the second time, are you sure it has to do with the URI scheme and not the 301 redirect? Any permanent redirects (301) are remembered by the browser and handled internally from then on. If the website had done a 302 redirect instead, would the browser have sent the HTTP request the second time? This distinction doesn't make a difference in this case but if you requested a different webpage on the same domain the 301 redirect wouldn't apply, so would your browser still request the HTTP page?
@tech3425
@tech3425 Жыл бұрын
In other words "You don't have to lock your door if there's nothing valuable inside the house"
@talalkalai8748
@talalkalai8748 2 жыл бұрын
what would u recommend as the best resource for structured learning all the headers you mentioned, and in-depth http in general ? (something like your THE BEST ON THE INTERNET, HANDS DOWN binary playlist. (am aware of your web hacking playlist))
@hernanduran4142
@hernanduran4142 2 жыл бұрын
I constantly have to deal with customer pentest reports stating I have a vulnerability because I don’t have HTTPOnly on cookies that are clearly non-sensitive.
@887310954
@887310954 2 жыл бұрын
one of the most under estimated security issues, which actually can help a lot
@PaulFisher
@PaulFisher 2 жыл бұрын
In order to make the transition truly seamless you should have also ripped off your festival wristband. What an oversight!
@allslash7540
@allslash7540 Жыл бұрын
Is there any security vulnerability for server if it exposes the content disposition header?
@TheKinGG0ld
@TheKinGG0ld 2 жыл бұрын
Yay!
@Ormaaj
@Ormaaj 2 жыл бұрын
Yep all good stuff. High-level application level stuff obviously. A ton of that (HSTS, OCSP stapling, HPKP) is largely kludge to mitigate SNI and (much later) ECH coming along far too late with far to much legacy baggage to fully deploy. So we pushed a bunch of workarounds up to the application layer and hope that all of them together are enough to cover our asses long enough for the legacy to become irrelevant. Yep this all requires context and it's always complicated context. CORS also makes a bit more sense if you know it historically came around in part as a means of permitting cross-site websocket access (it's a prerequisite really). Both partly a response to uglier "AJAX" type hacks that were required before there was any other means of "inter-tab" communication, that nobody needs to care about anymore.
@ThisIsTheInternet
@ThisIsTheInternet 2 жыл бұрын
English CC @ 8:08 "[todo checj recording]", just FYI
@git-tauseef
@git-tauseef 2 жыл бұрын
We would love to have a more systematic video uploads like a series about CTF what you do how you studied ,good resources , just started with picoCTF but unable to solve many crypto , binary like things .... Reply much appreciated ❣️❣️ thanks
@bjorndunderbeck
@bjorndunderbeck 2 жыл бұрын
a non related question buut you guys might be able to help me?? my mum in hospital post stroke has wrongly entered her pin to open her ipad so now it is so locked it doesnt even appear when I plug it into her pc. I get how it is supposed to protect a stolen ipad being accessed but I dont understand why her laptop cant talk to it. any ideas on how to get to the pin input stage again? at the moment its just an expensive coaster. oh I know the pin but theres no way to talk to the ipad, it turns on and thats it.
@renakunisaki
@renakunisaki 2 жыл бұрын
You need to proofread your captions. The tags got eaten, and at one point there's a todo note.
@soniablanche5672
@soniablanche5672 2 жыл бұрын
img and form tags ignore CORS policy for backward compatibility I'm assuming ?
@qm3ster
@qm3ster Жыл бұрын
Is there a reason not to set "Secure" and "HttpOnly" on all my cookies?
@arm2644
@arm2644 2 жыл бұрын
Can you please talk about the Expect-CT security header and how it is set right! I cannot find any true worthy information of this header and how it is set right in apache servers!
@mattsionkowski
@mattsionkowski 2 жыл бұрын
I found a lack of X-Frame-Options tag and thought I conquered the world. It took tens of hours before I could turn it into anything usable...
@jan_en_ik
@jan_en_ik 2 жыл бұрын
Are you going to make a video about the mc server research?
@LiveOverflow
@LiveOverflow 2 жыл бұрын
Yes, of course. But it will be a few weeks/months
@jan_en_ik
@jan_en_ik 2 жыл бұрын
I was also interested why a java object was logged while a normal leave message just logs the name.
@LiveOverflow
@LiveOverflow 2 жыл бұрын
Mh I don’t know what exactly you mean. If you send me an email with your question I will check it out :)
@Root-uno6nw
@Root-uno6nw 2 жыл бұрын
@@LiveOverflow I think he means the logj4 vulnerability
@_clavita
@_clavita 2 жыл бұрын
i work in a mobile app (that doesnt use webview) and we had a dude reporting to us that we were missing the HSTS, x-frame-options, and others headers that we didnt need!!!! thanks to him we had to delay the production date and it endend ofc being a false positive -_-
@Thiago1337
@Thiago1337 2 жыл бұрын
I like your shirt, where did you buy it?
@sobertillnoon
@sobertillnoon 2 жыл бұрын
Is this your first time having glasses? I think the ones you chose are nice looking.
@shaheenfazim
@shaheenfazim 2 жыл бұрын
Is password input vulnerable to clickjacking considered a vulnerability by Google.
@TimLF
@TimLF 2 жыл бұрын
Just feeding the algorithm here.
@alvionjames5925
@alvionjames5925 2 жыл бұрын
Hello can you please do a video about http smuggling request 🙏🙏
@RoterFruchtZwerg
@RoterFruchtZwerg 2 жыл бұрын
While I do agree with most, I think with HSTS you missed some important points. You kinda made it look like HSTS is not really important and sites that use https are fine not setting it. But here I disagree. Setting HSTS is important. We can argue if it's bug bounty level important though... First of all, "Browsers do it anyways" is not correct. Browsers will access the site via http if you tell them to. Your experiment was kinda misleading. Your proxy log didn't show a second http request because the browser served the redirect from its cache, not because it prefers https in any way. (devtools will show you it still does an http request) The cache can simply be circumvented by adding query parameters or simply requesting an URL you didn't load before. HSTS works for the complete domain (and subdomains!) and is kept even if you clear the cache, while your example of "browser does it anyways" relies on the browser cache, caching headers, correct redirect type and only works for resources you already visited explicitly (exact URL). Also, as you stated, HSTS preload exists. While HSTS kinda requires TOFU (Trust on first use), HSTS preload does not. But even without preload, HSTS does a good job for sites that are frequently used by users (e.g. all sites with logins etc). Not setting HSTS leaves your site open to MITM attacks (which are not uncommon on open wifis etc), while setting it does a good job in preventing them. And in case someone tries to MITM an https request, it will also prevent the user from ignoring the warning and clicking "visit anyways" which probably some would do otherwise. So while some security headers really have no benefit at all in some cases, HSTS always increases security.
@shinjihirako8598
@shinjihirako8598 2 жыл бұрын
excellent points !
@_clavita
@_clavita 2 жыл бұрын
thanks! so much learning today :P
@effsixteenblock50
@effsixteenblock50 2 жыл бұрын
You can enforce HTTPS server-side.
@RoterFruchtZwerg
@RoterFruchtZwerg 2 жыл бұрын
@@effsixteenblock50 you cannot. As long as the client accepts http a MITM can proxy http to https. Only the client can enforce https and that's why HSTS is important.
@effsixteenblock50
@effsixteenblock50 2 жыл бұрын
@@RoterFruchtZwerg You're talking about proxying with a tool such as Burp with an installed cert? I know some try to enforce SSL with javascript (a joke - I've had crappy shared hosting providers recommend it). Or are you saying even if SSL is enforced server-side, the client can force a downgrade to http?
@cuty5372
@cuty5372 2 жыл бұрын
Once you try to deploy an API-Endpoint, you know to hate those headers... Wait, the frontend code that talks to my api works, bit only on Firefox? Because Chrome acts slightly differently with no CORS headers set? Just plain annoying.
@cadeathtv
@cadeathtv 2 жыл бұрын
hope VA tool guys understand this, they should not be scaring people because of a VA results without understanding
@yy6u
@yy6u 2 жыл бұрын
lol the quality difference, its almost as you can tell it been filmed months before :)
@hashimmirdad8678
@hashimmirdad8678 2 жыл бұрын
what is the exact difference between ( HSTS, secure attribute)?
@huntit4578
@huntit4578 2 жыл бұрын
4 This strategy protects against passive eavesdropping by making it hard for an attacker to trick your user into using something other than SSL to access your site. It also probably ensures that any bookmarks users store will point to the https URLs, which is good. However, HSTS still offers advantages in the event of a man-in-the-middle attack. The core of the problem that HSTS tries to solve is that the browser doesn't know whether a given site should be using SSL or not. And most users don't explicitly try SSL first; if they type in a URL, they generally go to the non-SSL http site first, and usually they're just following links. If an attacker can trick your user into going to your site via an http URL and can sit in the middle of the user's traffic (by being their wireless AP, for example), that attacker can launch a man-in-the-middle attack against your site by proxying the user's traffic to your site and presenting the site to the user without SSL (this is a type of downgrade attack). Since the user won't see SSL, their browser won't recognize that the attacker doesn't have a valid certificate for your site and that they're not connecting to your site directly. (A more complicated approach would be to intercept the SSL traffic and present a self-signed or otherwise invalid certificate for your site, but this will normally result in browser warnings.) In this scenario, redirecting non-SSL users to SSL or setting the secure flag on cookies doesn't actually help you very much. The man-in-the-middle attacker will be connecting to your SSL site (and proxying the user's actions to it), and will just remove the secure flag from your cookies when passing them along to the user. The attacker can, of course, also remove the HSTS header. The point of the HSTS protocol, however, is that if the user had ever successfully gone directly to your site in the past, their browser will remember that your site sent HSTS. If they then later connect to your site and find that it's not using SSL or that the browser can't verify the certificate, the browser will throw an error and refuse to continue. This will prevent the attacker from downgrading your site to non-SSL if the browser supports HSTS and has your site recorded as requiring SSL.
@KuopassaTv
@KuopassaTv 2 жыл бұрын
Also such headers can be per page, not site-wide 😉
@eschoepis
@eschoepis 2 жыл бұрын
1-2 year im, I am already hearing google's product mgmt opinion in the intro
@angeloanan
@angeloanan 2 жыл бұрын
Subtitle broke at 8:08 :
@ocean3323
@ocean3323 2 жыл бұрын
F for old MDN theme
@Valery0p5
@Valery0p5 Жыл бұрын
The thumbnail xD
@el7440
@el7440 Жыл бұрын
its all about the context baybee
@dummyevil7638
@dummyevil7638 2 жыл бұрын
You have changed.
@takeshikovacs667
@takeshikovacs667 2 жыл бұрын
Missing HTTP Security Headers is out of scope 99% of Bug Bounty Programs. It's more a thing about penetration testing reported as good practice information depending of the context. But yeah I agree that many HTTP headers are useless like the X-XSS-Protection (because not implemented in any browser) while some are useful like HSTS or CSP. Yeah if there is an XSS and there is HTTPOnly flag you can still then an XHR but you can't leak the cookie. So if the attacker has only a reflected XSS and not a stored one he will have a far less permanent access. PS: I know the title is just for clickbait
@LiveOverflow
@LiveOverflow 2 жыл бұрын
yeah it's out of scope, and still there are many reports about it. So this video hopefully helps those people understand why it's usually not rewarded ;) But what's clickbait about the title? The video is about HTTP Security Headers. That's literally the most accurate boring title lol
@takeshikovacs667
@takeshikovacs667 2 жыл бұрын
@@LiveOverflow I found the "Bug Bounty Tips" clickbaity. Lot of vloger use the word "bug bounty" as a shiny word when it's only general security not specific to bug bounty. The title could have been "HTTP Security Headers real impact" or "HTTP Security Headers - What not to report on Bug Bounty" if you really wanted to use the term "bug bounty". But as I said it is always out of scope of bug bounty so putting it in the title is weird, the title could have been "HTTP Security Headers - Pentest tips" and just saying a parenthesis : HTTP Security Headers are out of scope of BB programs 99% of the time so we'll focus on pentest. But nowaday "bug bounty" is such a trendy word where youg people think they can become rich with it that youtuber use it for every infosec video to get more clicks.
@reduced1420
@reduced1420 2 жыл бұрын
bro the video was literally made for google to give tips to people using their bug bounty program, shut up lmaoo
@ninostephen
@ninostephen 2 жыл бұрын
I'm going to post this in our Vulnerability Management Team group. I hate it when they make us report petty header issues without checking the context. I might get kicked for it. But fuck it. - _ -
@x3ICEx
@x3ICEx 2 жыл бұрын
8:08 [todo checj recording]
@georgehammond867
@georgehammond867 2 жыл бұрын
somebody is uploading buggy ubuntu 20.04 on my pc al the time, this comes from Ubuntu HQ. kernel version 5.13.0-35-generic. very bad indeed.
@GoBzi
@GoBzi 2 жыл бұрын
Cookie missing secure flag, server has only 443 open
@nullvoidpointer
@nullvoidpointer 2 жыл бұрын
MiTM.
@mmmdyarcavadl9004
@mmmdyarcavadl9004 2 жыл бұрын
@@nullvoidpointer is it possible mitm when you are in different network? I mean mitm to public ip
@myzel394
@myzel394 2 жыл бұрын
13:53 yeah then when should you use HttpOnly? You basically said that the flag is completely useless.
@NorbertdeRooy
@NorbertdeRooy 2 жыл бұрын
I really dislike the HSTS header, I mean why is it a header and not a DNS record, it would be so much simpler and we could disable http all together if it was simply a DNS record.
@fn-fn-fn
@fn-fn-fn 2 жыл бұрын
where's the penguin?
@oedebiri
@oedebiri 2 жыл бұрын
enough people do this that google paid to commission a video discouraging them
@the_hanged_clown
@the_hanged_clown 2 жыл бұрын
2:36 wait....youtube isn't google's website?
@aviationbutterr
@aviationbutterr 10 ай бұрын
🏈🏈🏈🏈🏈🏈
@AmgadEmad
@AmgadEmad 2 жыл бұрын
All this information is mistaken and not technical gaps and for this reason, this is not considered within the bug buny HANTING system, which is presented by Google
@TheWoosh
@TheWoosh 2 жыл бұрын
The whole video is an advertisement?
@LiveOverflow
@LiveOverflow 2 жыл бұрын
I explained it in the beginning what the deal with this video is. Also german regulations requires to properly label it in the video as well.
@yy6u
@yy6u 2 жыл бұрын
yes and no, see his reply, i suggest seeing tom scott video about exactly this kind of disclaimer, its explained there
@mikeyz8775
@mikeyz8775 2 жыл бұрын
The line is discussing n theory is a crime
@ari_archer
@ari_archer 2 жыл бұрын
good soup
@tentaklaus9382
@tentaklaus9382 2 жыл бұрын
You know what's a lot harder to do - build a tool which helps everyone and also avoids to be dangerous when used maliciously.
@ahmedsaadsabit1749
@ahmedsaadsabit1749 2 жыл бұрын
First comment yes
@AtomicBl453
@AtomicBl453 2 жыл бұрын
They don't pay for intentional dev flaws
@ELYESSS
@ELYESSS 2 жыл бұрын
Should've also changed shirt
@Ormaaj
@Ormaaj 2 жыл бұрын
Google has skilled hackers? This is a genuine surprise.
Script Gadgets! Google Docs XSS Vulnerability Walkthrough
18:57
LiveOverflow
Рет қаралды 141 М.
The Same Origin Policy - Hacker History
12:19
LiveOverflow
Рет қаралды 105 М.
Would you like a delicious big mooncake? #shorts#Mooncake #China #Chinesefood
00:30
Countries Treat the Heart of Palestine #countryballs
00:13
CountryZ
Рет қаралды 8 МЛН
How much money I made in my 1st year of bug bounty? Bounty vlog #4
17:02
Bug Bounty Reports Explained
Рет қаралды 135 М.
Web App Pentesting - HTTP Headers & Methods
33:39
HackerSploit
Рет қаралды 52 М.
Hacking Google Cloud?
21:59
LiveOverflow
Рет қаралды 122 М.
Could I Hack into Google Cloud?
24:55
LiveOverflow
Рет қаралды 127 М.
How To Protect Your Linux Server From Hackers!
20:38
LiveOverflow
Рет қаралды 294 М.
Content-Security-Policy: An Introduction
30:28
Abhay Bhargav
Рет қаралды 39 М.
The Circle of Unfixable Security Issues
22:13
LiveOverflow
Рет қаралды 111 М.
Would you like a delicious big mooncake? #shorts#Mooncake #China #Chinesefood
00:30