My theory on how the webp 0day was discovered (BLASTPASS)

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 พ.ย. 2024

ความคิดเห็น • 128

  • @Hacsev
    @Hacsev หลายเดือนก่อน +85

    Watch how this is going to become a year-long series into fuzzing webp, just like the sudo exploit.

  • @olivezz
    @olivezz หลายเดือนก่อน +527

    this video's url contains no lowercase letters
    you guys really made this the top comment huh?

    • @DxBlack
      @DxBlack หลายเดือนก่อน +5

      What in the fu--

    • @joshuatatum8519
      @joshuatatum8519 หลายเดือนก่อน +12

      Maybe they're running out of namespace lol

    • @lucidattf
      @lucidattf หลายเดือนก่อน

      @@joshuatatum8519i assure you they are not

    • @pwall
      @pwall หลายเดือนก่อน

      @@joshuatatum8519 Go see the tomscott video on the topic

    • @luna_rants
      @luna_rants หลายเดือนก่อน

      With some quick mafs (((64-26)/64)^11), we get a probability of around 0.323%.

  • @spicybaguette7706
    @spicybaguette7706 หลายเดือนก่อน +47

    The commit you found could be squashed, that is, many commits merged into one. He might have possibly found this because MSVC complained about some kind of out-of-bound access or something

    • @t0rg3
      @t0rg3 หลายเดือนก่อน +4

      Does that mean that there is a chance to find the PR to that commit and then maybe unearth the unsquashed commit chain in another branch/repo?

    • @spicybaguette7706
      @spicybaguette7706 หลายเดือนก่อน

      @@t0rg3 I found the original PR, but unfortunately it leads to a dead end. The original branch was deleted. It seems like the committer worked at Google at the time. It's PR 118 on the google/brunsli repository

  • @_plamp_
    @_plamp_ หลายเดือนก่อน +15

    These types of videos are fun. Would also like to see more fuzzing content

  • @user-ko7oo2qg1g
    @user-ko7oo2qg1g หลายเดือนก่อน +13

    Good to see you after a long time!
    Excited for more great content on hextree. All the best!

  • @remiheneault8208
    @remiheneault8208 หลายเดือนก่อน +84

    Your analysis is very accurate, and your assumptions logical and fair. Great video!
    I, however, have a hard time believing that - in such a niche space - there is no overlap between open-source contributors and for-profit "security" companies researchers.
    Supply chain attacks have become so common, my spider sense "tingled" when I saw that commit with unassuming title, huge list of changes and no mention of the table size change. This really looks like an attempt to cover a mistake, or a previously opened backdoor.

    • @anteshell
      @anteshell หลายเดือนก่อน +12

      Making baseless assumptions is never good in security. You don't mention at all if you checked the code before the update, whether or not it contained anything exploitable or anything else pointing towards an existence of a backdoor. You simply assume as much and leave it at that. The tingling you have is just the spiky top of the Dunning-Kruger curve. Or if you actually know something more about this, you hide it very well, for which I cannot see any point of doing because it just makes you sound like a run-of-the-mill tin foil hatter.

    • @fizzlefritz9782
      @fizzlefritz9782 หลายเดือนก่อน +3

      @@anteshell I don't understand how you can hate from outside the club; you can't even get in!

    • @anteshell
      @anteshell หลายเดือนก่อน +1

      @@fizzlefritz9782 That sounds like a roundabout way to ask advice on hating. I'm sorry but can't help you. I'm old enough not go clubbing anymore and never was a hating type, so I wouldn't know how to advice you.

    • @kevinwydler7305
      @kevinwydler7305 หลายเดือนก่อน

      @@fizzlefritz9782 All he is saying is that it's not as simple... While supply chain attacks are a thing of course, the fact that the code is open source also makes it very easy for security researches to find your backdoor (if you were an "evil" adversary implementing it). So I personally don't think they are practical in the long run (just look up the liblzma attack CVE-2024-3094).
      If there is a way to exploit the bug... sure, by all means get out the pitchforks. But you have yet to prove that point. And also we must remember that BLASTPASS is not simply a single exploit that will simply let you install malware on iOS. It is in fact an exploit chain which requires multiple bugs within various components which could't all have possibly been introduced by a supply chain attack.
      I think the people behind such vulnerabilities just take the time to study these formats and/or systems in depth and know them better then most developers that just use them. They may even have contributed to such projects at some point, but to say that there are people everywhere infiltrating repos has yet to be proven by more than just some "wired commits".

    • @remiheneault8208
      @remiheneault8208 หลายเดือนก่อน +7

      @@anteshell The weakest link in security is always people. Assuming everyone is honest would be more dangerous than showing skepticism. You don't need to put a full reverse SSH shell in the code to open a door. You're welcome to challenge my point but please do so with less arrogance.

  • @Debrugger
    @Debrugger หลายเดือนก่อน +16

    6:30 Valley nerds try not to build a LISP for 1 hour challenge (impossible)

  • @BlackHermit
    @BlackHermit หลายเดือนก่อน +3

    The URL of this video is the best thing in the world!

  • @dadogwitdabignose
    @dadogwitdabignose หลายเดือนก่อน +11

    We’re so back

  • @nero2k619
    @nero2k619 หลายเดือนก่อน +1

    This video made me realise why I'm bad at VR :D So much to learn and so little time.

  • @twistedsim
    @twistedsim หลายเดือนก่อน +48

    that’s just a theory, a hacking theory

  • @impostorsyndrome1350
    @impostorsyndrome1350 หลายเดือนก่อน +7

    After seeing Linus' friends hacking his phone, it is scary how much stuff can be hacked.

    • @togamid
      @togamid หลายเดือนก่อน +8

      Yeah, though that attack and the exploit discussed in this video don't have much in common besides both involving a phone

    • @yourfellowhumanbeing2323
      @yourfellowhumanbeing2323 หลายเดือนก่อน

      SS7 exploits are in tge news and forums on and off for the last copule of years. Last time I had seen them in the wild was in 2018-19

  • @roguesecurity
    @roguesecurity หลายเดือนก่อน +1

    This is why I love this channel❤

  • @GH-jl2td
    @GH-jl2td หลายเดือนก่อน +3

    Bro its so weird as someone completely removed from coding or cyber security in general, just a random idiot. You keep me so fixated on this stuff. Really love to see more from you on just about anything

  • @jpphoton
    @jpphoton หลายเดือนก่อน

    consistent with my overall assessment but insightful .. and just remember kids you are ALREADY pwned

  • @almatsumalmaadi8103
    @almatsumalmaadi8103 หลายเดือนก่อน

    Will be great if this libwebp series turned like sudo vulnerability series, from fuzzing to full working exploit.

  • @hariharan6514
    @hariharan6514 หลายเดือนก่อน

    I fully admired your talk 🙃

  • @ceilingfun2182
    @ceilingfun2182 หลายเดือนก่อน

    Yes, I did miss you. I will check it out.

  • @abuhamza2771
    @abuhamza2771 หลายเดือนก่อน

    really missed your videos

  • @AgentM124
    @AgentM124 หลายเดือนก่อน +3

    And remember guys. That's just a theory. A VULNERABILITY THEORY

    • @balsalmalberto8086
      @balsalmalberto8086 หลายเดือนก่อน

      He has a concept of a vulnerability.

  • @Se7enSoups
    @Se7enSoups หลายเดือนก่อน

    Awesome video as always

  • @3xpl0i79
    @3xpl0i79 22 วันที่ผ่านมา

    Hey liveoverflow, can you make a video on hunting for CVEs, your methodology and ideas?

  • @alexanderdell2623
    @alexanderdell2623 หลายเดือนก่อน

    Wow
    the moment of searching for same code in other projects felt like "eureka!"

  • @kevinnyawakira4600
    @kevinnyawakira4600 หลายเดือนก่อน

    Inlove how you explain complex vulnerability even if 50% of the time i don't get it😅

  • @Zizo8182
    @Zizo8182 หลายเดือนก่อน

    amazing one as usual, thanks for sharing

  • @alfatech8604
    @alfatech8604 หลายเดือนก่อน

    nice you are smart . I salute the first researcher he might be laughing 🤣. Please make a video on how to use Afl to find the vulnerability thanks.

  • @spicybaguette7706
    @spicybaguette7706 หลายเดือนก่อน +2

    The Return of the King

  • @jyrk
    @jyrk หลายเดือนก่อน

    very interesting video

  • @null-calx
    @null-calx หลายเดือนก่อน

    waited so long for this one

  • @ari_archer
    @ari_archer หลายเดือนก่อน +1

    hey ur back :D

  • @jtw-r
    @jtw-r หลายเดือนก่อน

    BlastDoor
    Now THAT is a cool fucking name for a library

  • @ameer2942
    @ameer2942 หลายเดือนก่อน

    Finally you have started ironing your shirt after google sponsorship ...

  • @Jango1989
    @Jango1989 หลายเดือนก่อน

    Very cool

  • @metalpachuramon
    @metalpachuramon หลายเดือนก่อน

    Finally! My man got his password back

  • @M0h4mud
    @M0h4mud หลายเดือนก่อน

    Bro he’s back 🗣️🔥

  • @bean_TM
    @bean_TM หลายเดือนก่อน

    Love your new glasses! What are they called?

  • @littleblack111
    @littleblack111 หลายเดือนก่อน

    ur back!!

  • @dreicraft2597
    @dreicraft2597 หลายเดือนก่อน

    Nice, hope you'll start your hacked Minecraft series again xD

  • @muzamilshaikh838
    @muzamilshaikh838 หลายเดือนก่อน +1

    Big Brain🔥

  • @stonemannerie
    @stonemannerie หลายเดือนก่อน +1

    Why is project zero so concerned with ios and not solely android/Google projects?

    • @tylerb6981
      @tylerb6981 หลายเดือนก่อน

      Mostly cause Project Zero was/is less like an arm of Google's security engineering and more like a passion project that was a result of Google's massive counter-surveillance movement after the events of Heartbleed and Edward Snowden. It was more about researching and responsibly disclosing zero days in any and all public facing software than it was about Google protecting/improving their own. Many of the vulns they have discovered range widely from Safari, to Windows 8, to CPUs, to RAM, to Cloudflare, to Apple. Their specialty is not just discovering these zero days but writing about how they could be actively exploited to impact anyone and everyone. It also doesn't hurt that one of their earliest members was geohot... Famous for his iOS jailbreaks.

    • @rnts08
      @rnts08 หลายเดือนก่อน

      Apple pays better for exploits. Android is OSS as well.

    • @thewhitefalcon8539
      @thewhitefalcon8539 หลายเดือนก่อน +2

      They say they want the whole Internet to be secure.

    • @ムワ-d7n
      @ムワ-d7n หลายเดือนก่อน +2

      i mean if you look at their blog they concerned about all type of internet application, the IOS one is more concerned probably because there's not enough source code online and the exploitation method require one to research the internal on their own. while android/linux/google based projects is open source that way community can contribute and have different approach for fuzzing/exploitation cmiiw

    • @tylerb6981
      @tylerb6981 หลายเดือนก่อน

      Since my original comment got deleted for some unknown reason.............
      Project Zero was started as part of Google's huge counter-surveillance movement after the Heartbleed and Edward Snowden leaks. It was less about Google's product security and more about exposing the dangers of the Zero Day market and improving public awareness of how a zero day could be exploited to compromise their sensitive information. Their specialty is in not only discovering by also publicizing the vulns and exploits.

  • @ameer2942
    @ameer2942 หลายเดือนก่อน

    7:09 *Samuel not saelo
    Saelo is your friend.

  • @v255666
    @v255666 หลายเดือนก่อน

    Its possible sms hack buffer overflow android zero clicks ?

  • @logiciananimal
    @logiciananimal หลายเดือนก่อน

    A. Tornhill nods.

  • @tg7943
    @tg7943 หลายเดือนก่อน

    Push!

  • @quakc
    @quakc หลายเดือนก่อน

    Just in time for xmas

  • @kevinwydler7305
    @kevinwydler7305 หลายเดือนก่อน

    YESSS

  • @ProfessionalBirdWatcher
    @ProfessionalBirdWatcher หลายเดือนก่อน

    If it ain't broke, FIX IT!

  • @almatsumalmaadi8103
    @almatsumalmaadi8103 หลายเดือนก่อน

    Finally you're back

  • @thuslymars
    @thuslymars หลายเดือนก่อน

    I feel I seen this 1year ago

  • @Cmanorange
    @Cmanorange หลายเดือนก่อน +2

    6:30 (display "LISP MENTIONED!!~%")

  • @hichemsavastano4430
    @hichemsavastano4430 หลายเดือนก่อน

    i message ❤

  • @HolyAdilokGames
    @HolyAdilokGames หลายเดือนก่อน

    Liveoverflow is alive! Heart, Pin, First!;;;
    Watching you since 4 yrs

  • @Mitsunee_
    @Mitsunee_ หลายเดือนก่อน

    video consistently crashes the player after 19 seconds

  • @VinayKumar-sy3oj
    @VinayKumar-sy3oj หลายเดือนก่อน

    😀

  • @Smokeyyy337
    @Smokeyyy337 หลายเดือนก่อน +1

    why don't they report the vulnerability to Apple? don't they have a bug bounty program

    • @garrygarrygarry1
      @garrygarrygarry1 หลายเดือนก่อน +26

      apple's bug bounty program payouts are tiny in comparison to the actual value of these exploits.

    • @Tjkrusinski
      @Tjkrusinski หลายเดือนก่อน +3

      Organizations want the vulnerabilities to do bad things. They don’t want the vulnerabilities reported.

    • @ahmadshami5847
      @ahmadshami5847 หลายเดือนก่อน +3

      ​@@Tjkrusinskispy agencies*

    • @sasjadevries
      @sasjadevries หลายเดือนก่อน

      If you find such a zero day, you could either report to apple, and get pennies, or sell it to some govt-funded security firm, such that they can "deal with" some of their enemies.

  • @mrpopsicle3339
    @mrpopsicle3339 หลายเดือนก่อน +8

    not first its cringe

  • @attention_shopping
    @attention_shopping หลายเดือนก่อน

    oooo

  • @WalterSamuels
    @WalterSamuels หลายเดือนก่อน

    Here's a discovery path: Vulnerabilities are put into software like this on purpose to be sold to the highest bidder for a few years, by the developers themselves.

  • @celesian7372
    @celesian7372 หลายเดือนก่อน +1

    first

  • @itsdakideli755
    @itsdakideli755 หลายเดือนก่อน

    Early 🎉

  • @ErkiEberg
    @ErkiEberg หลายเดือนก่อน

    First!

  • @Brawlstriker89
    @Brawlstriker89 หลายเดือนก่อน +2

    Let’s make the video as long as possible with filler and bluff. Could’ve been answered in a minute or 2. Not 15

    • @LiveOverflow
      @LiveOverflow  หลายเดือนก่อน +5

      Could be answered in 0 seconds if you knew already everything

    • @pete3897
      @pete3897 หลายเดือนก่อน

      @@LiveOverflow it's rewarding comments like that one which keep you coming back to post free content so regularly isn't it! Oh, wait...

  • @skibidisj
    @skibidisj หลายเดือนก่อน

    Bro fell off 93 views in 2 mins

    • @siomek101
      @siomek101 หลายเดือนก่อน +6

      93/2min = 46.5/1min
      2790/1hour
      66960/1day
      still more than you would ever get.

    • @skibidisj
      @skibidisj หลายเดือนก่อน

      @@siomek101 actual estimate, you're right

  • @RVIZX9
    @RVIZX9 หลายเดือนก่อน

  • @pelaajahacks8358
    @pelaajahacks8358 หลายเดือนก่อน

    _ACCK0AUQ8Q wow no lowerspacs