Script Gadgets! Google Docs XSS Vulnerability Walkthrough

แชร์
ฝัง
  • เผยแพร่เมื่อ 1 ต.ค. 2024

ความคิดเห็น • 244

  • @reydion1648
    @reydion1648 4 ปีที่แล้ว +884

    other youtubers: "this video is sponsored by Raid Shadow Legends"
    LiveOverflow: "This video is sponsored by freaking google, showing bugs on their products!"
    what a legend

    • @sharkbeats1397
      @sharkbeats1397 4 ปีที่แล้ว +3

      true legend indeed

    • @rakeshchowdhury202
      @rakeshchowdhury202 4 ปีที่แล้ว +6

      He's a true legend, just like our today's sponsor Google. Privacy? With Google you can have no privacy. Forget it. You don't care us taking your nudes from your android do you? Why are we asking anyway. 😂😂😂😂😂😂

    • @_vsnwprintf_s_l
      @_vsnwprintf_s_l 4 ปีที่แล้ว

      I got a RAID ad on this, so...

    • @rakeshchowdhury202
      @rakeshchowdhury202 4 ปีที่แล้ว +2

      @@sabaundefined Just like our todays sponsor Raycon Shadow Legends. Use code Linus to get a discount

  • @bryces8017
    @bryces8017 4 ปีที่แล้ว +571

    WHAT, google paid you, to talk about some guy who they paid to find bugs in their system, who they paid even more when he found a bug?

    • @dandogamer
      @dandogamer 4 ปีที่แล้ว +105

      Who paid a developer to introduce a bug and who paid another developer to fix said bug 😉

    • @misaalanshori
      @misaalanshori 4 ปีที่แล้ว +95

      Its also an advertisement for Google even thought its technically talking about google negatively. Its kinda weird but i think google is trying to show that they listen to people reporting bugs and fix them, and also promoting their bug bounty system.

    • @RnVjayBZb3V0dWJl
      @RnVjayBZb3V0dWJl 4 ปีที่แล้ว +4

      Just because he is sponsored, doesn't it mean that he is getting payed ^^

    • @phagesuffersatgaming.3797
      @phagesuffersatgaming.3797 4 ปีที่แล้ว +33

      @@RnVjayBZb3V0dWJl sponsor= paid to advertise. Are you for real dude?

    • @couch9416
      @couch9416 4 ปีที่แล้ว +8

      @@RnVjayBZb3V0dWJl sponsored literally means to get paid for it. Get a dictionary

  • @cryptonative
    @cryptonative 4 ปีที่แล้ว +42

    lvl1: paid to secure google source
    lvl2: paid to look at google source
    lvl3: paid for finding bugs while paid to look at google source
    lvl100: paid to make a video about google source bugs
    lvl10000: paid to make a video about google source bugs by freaking google :p

  • @LostInAutism
    @LostInAutism 4 ปีที่แล้ว +116

    When dynamic programming becomes too dynamic

    • @LugnutsK
      @LugnutsK 4 ปีที่แล้ว +6

      “Dynamic programming” doesnt mean what you think it means

    • @andreidicu2882
      @andreidicu2882 4 ปีที่แล้ว +3

      @@chyza2012 like cpp with dynamic programming? u ok bro?

    • @DominicNweze
      @DominicNweze ปีที่แล้ว

      @@LugnutsK what's dynamic programming 🤔

    • @DominicNweze
      @DominicNweze ปีที่แล้ว

      @@andreidicu2882 what's dynamic programming

    • @LugnutsK
      @LugnutsK ปีที่แล้ว +1

      @@DominicNweze Dynamic programming is a misleading name for algorithms which break a problem into small recursive sub-problems and solves all the sub-problems in order to solve the overall problem.

  • @iamskidrow
    @iamskidrow 4 ปีที่แล้ว +153

    I'll pretend I understood Everything

  • @soggybaguette8457
    @soggybaguette8457 4 ปีที่แล้ว +67

    You know you've made it as a dev/techie when you get *google* themselves to sponsor a video

  • @jbmagination2
    @jbmagination2 4 ปีที่แล้ว +295

    "It's all the Google security team's fault"

    • @兽Arufisu
      @兽Arufisu 4 ปีที่แล้ว +2

      bruh moment
      edit: how the table have turned(what i said in the live chat at the end)

    • @Vaaaaadim
      @Vaaaaadim 4 ปีที่แล้ว +1

      Trust nobody(with security) not even yourself.

    • @keineahnung1919
      @keineahnung1919 4 ปีที่แล้ว

      didn't want to ruin the perfect 69 likes

    • @__________________________177
      @__________________________177 4 ปีที่แล้ว

      but you did it... you just did it... ;(

    • @4n1eu
      @4n1eu 4 ปีที่แล้ว +3

      Google paid him to say "f you" to their own security team

  • @anakinskywalkerrr
    @anakinskywalkerrr 4 ปีที่แล้ว +33

    Sponsored by Google, "It's all Google security fault" video end. What a mad lad

  • @arthurg5966
    @arthurg5966 4 ปีที่แล้ว +144

    Watching normal TH-cam videos : Chill and Relax
    Watching LiveOverflow videos : Concentrate and Take notes. Watch again to check if flow of thoughts was correct. Watch again to see if you understood everything properly.

    • @cwmd7651
      @cwmd7651 4 ปีที่แล้ว

      Yeah I need to watch like 2 more times to understand everything lol

    • @fahmiirfan6923
      @fahmiirfan6923 4 ปีที่แล้ว

      So, true 😂

  • @blackblather
    @blackblather 4 ปีที่แล้ว +42

    Uses google ads: no one bats an eye
    Google actually sponsors the video: Holy shit

  • @metalpachuramon
    @metalpachuramon 4 ปีที่แล้ว +126

    This is very interesting! These vulnerabilities arise from a common pattern: factory pattern.
    In factory pattern, you address the problem of creation, where basically you use unchecked types like strings and use unchecked data like strings, or in this case json, and then use polymorphism to polymorphically continue the object life cycle, this allows you to have object type related if statements in a centralized manner.
    So, by not having a whitelist, you can call arbitrary constructors like hlc. The interesting part, is that implementing a whitelist falls into another pattern: abstract factory pattern, where you define an includes method that uses a string list.
    Because of how convoluted abstract factory pattern seems, programmers often choose the concrete factory pattern, because they rarely see a benefit over using abstract factory.
    The most interesting thing is, that you could even exploit other kinds of systems, like java-based systems, because they also use this string gadget for loading classes during execution time.

    • @lefteriseleftheriades7381
      @lefteriseleftheriades7381 4 ปีที่แล้ว +1

      I could never understand the difference between a regular factory and an abstract factory, please help!

    • @wtwt8714
      @wtwt8714 4 ปีที่แล้ว +6

      @@lefteriseleftheriades7381 Regular factory: create an object directly. Abstract factory: provide an abstract method to create IThing and let SomeConcreteFactory (inheriting the abstract factory) create ThingThatInheritsFromIThing. Using the abstract factory pattern you get one more indirection between code using IThing and code creating a concrete IThing.

    • @metalpachuramon
      @metalpachuramon 4 ปีที่แล้ว +13

      @@lefteriseleftheriades7381 look for "Uncle Bob factory pattern", he explains it in depth.
      The problem with factories is that statically you cannot know an object type beforehand, it's in runtime that through conditions you decide which object to use. When you add many seemingly related factories, as a dev it becomes difficult to know exactly which classes are being used on each of those factories, therefore in the abstract factory pattern you provide an abstract base class that the other factories have to derive from, this base class usually includes an abstract method called includes (or similar), by doing this you force derivative classes to implement it, which obligates them to use a list of strings to enumerate which classes are valid.
      This way, you provide some sort of type safety stated by lists of strings, that way whenever a factory receives an unexpected value, the includes method prevent you from creating an unexpected object by throwing an exception or something.
      In other words, this pattern is for devs to understand and for runtime guards, since the compiler can't statically figure this out and prompt an error.
      I hope this helps.

    • @k3daevin
      @k3daevin 4 ปีที่แล้ว +3

      The vulnerability comes from JavaScript.

    • @karserasl
      @karserasl 4 ปีที่แล้ว +1

      @@k3daevin No, the vulnerability comes correctly as said, from the implementation of the factory pattern, using JS (but JS has nothing to do with this)

  • @kryvxde6950
    @kryvxde6950 4 ปีที่แล้ว +124

    google sponsoring, dammn youve gone long way. gg

    • @alexanderdell2623
      @alexanderdell2623 4 ปีที่แล้ว +1

      Thats cool,but wheres referral link to google?

    • @rakeshchowdhury202
      @rakeshchowdhury202 4 ปีที่แล้ว

      Next Video sponsored by Raycon Earbuds

  • @ASHStudios
    @ASHStudios 4 ปีที่แล้ว +26

    so its all google security team's fault xD

  • @bls7879
    @bls7879 4 ปีที่แล้ว +19

    6:16 Subtitle: "He knows that Jesus is a Javascript library".
    Okey

    • @bitrr3482
      @bitrr3482 4 ปีที่แล้ว

      CarbonCopy yeah! Just use Jesus.convert(water, wine)

    • @bitrr3482
      @bitrr3482 4 ปีที่แล้ว

      CarbonCopy That returns the now wine

  • @pietrosanchez7484
    @pietrosanchez7484 4 ปีที่แล้ว +41

    This is some incredibly dense content for people learning development and cybersecurity. This helps us learn more about what more we could still learn about. I will always be grateful for all your inspiring and insightful content!

  • @tilakmadichettitheappdeveloper
    @tilakmadichettitheappdeveloper 4 ปีที่แล้ว +10

    i don't think 4 grand is justified - this guy needs to be given 20 racks at least 😡😡😡😡😡😡😡😡😡

  • @blenderpanzi
    @blenderpanzi 4 ปีที่แล้ว +5

    That's a huge list of best practice violations:
    * Don't let a parameter specify an arbitrary function, use known values from an hashtable/switch statement instead
    * Don't let a postMessage pass a script url, just tell the page "do thing A" and it then knows what to do
    * Don't accept postMessages from arbitrary origins
    * Dissalow arbitrary script sources using CSP
    If any of these would have been done the vulnerability would not exist. There might be reasons why you want 2 and 4, but at least 1 and 3 should definitely be done.
    Edit: Hadn't finished watching the video. Why there even is a function that executes an arbitrary JavaScript from an URL was explained.

  • @ThatGamerBlue
    @ThatGamerBlue 4 ปีที่แล้ว +60

    Just enrolled in the college of XSS, wish me luck as a brand new copy paste machine :)

    • @sonofmars1337
      @sonofmars1337 4 ปีที่แล้ว +8

      i wish you luck and hope you ctrl-c ctrl-v your way to a bug bounty

    • @parabolicpanorama
      @parabolicpanorama 4 ปีที่แล้ว

      Where did you start from? Which resources would you recommend?

    • @dingusbrule5756
      @dingusbrule5756 4 ปีที่แล้ว

      @@parabolicpanorama Look into Burp Suite

    • @Folsets
      @Folsets 4 ปีที่แล้ว

      God bless your fingers!

    • @vincent-thomas
      @vincent-thomas 2 ปีที่แล้ว

      Youre fcked if your v key doesnt work

  • @Sezdik
    @Sezdik 4 ปีที่แล้ว +2

    Are we sure that was a fault? maybe it was sitting there for some selected people to use..

  • @sccp1997
    @sccp1997 4 ปีที่แล้ว +6

    *Sponsered by Google to talk about Google Security's team fault.*

  • @soksamnang2150
    @soksamnang2150 4 ปีที่แล้ว +15

    I like the way he flamed Google's security team even though he is sponsored by Google :D

    • @steefant
      @steefant 4 ปีที่แล้ว +1

      rest assured that they will get roasted for this internally as long as they are employed there ;)

    • @pvic6959
      @pvic6959 4 ปีที่แล้ว

      knowing google, they would be flaming them too. Lets point out that this issue was SUPER buried .He explained it and i didnt understand so its very likely know one even saw it happening until this guy somehow found this bug. google takes security super seriously so im more surprised the bug was fixed and CAME BACK. the engineers who let that happen are going ot be in trouble lol

    • @LiveOverflow
      @LiveOverflow  4 ปีที่แล้ว +14

      The engineers are not at all in trouble. They interviewed with me :) this is totally normal and shouldn’t be shamed.

    • @pvic6959
      @pvic6959 4 ปีที่แล้ว

      @@LiveOverflow learning from mistakes is the best thing we can do!

    • @Wowthatsfail
      @Wowthatsfail 4 ปีที่แล้ว

      Seeing since WE are googles security team, I don't think they care.

  • @threeMetreJim
    @threeMetreJim 4 ปีที่แล้ว +1

    You can use Google chrome browser to read minified code, just click the {} for pretty print...
    All of the hacking I've done, I've used this. First in the Opera browser, and then using Chrome dev tools. I found several vulnerabilities in sites that way. With a bit of practice it's not very difficult to follow obfuscated code, especially when you can set breakpoints and skip through it. Everything I've reported got fixed, with nothing but a 'thanks' and not a bounty in sight (apart from Facebook's $500)... Now I can't be bothered reporting bugs or vulnerabilities, sometimes they'll be exploited for fun, but that is it.

  • @TheMrKeksLp
    @TheMrKeksLp 4 ปีที่แล้ว +3

    Oh boy, taking a user specified string without any validation and calling a function with that name really wasn't the finest implementation tbh. How did they NOT expect someone to exploit that?

  • @glowiever
    @glowiever 4 ปีที่แล้ว +1

    dang my company uses an SSO service which abuses jsonp in its token handling. really makes me think...

  • @iyxan23
    @iyxan23 4 ปีที่แล้ว +5

    I've never seen someone sponsored by Google before

  • @mrappu2884
    @mrappu2884 4 ปีที่แล้ว +1

    going to be 500k ..congrats @LiveOverflow

  • @Mitsunee_
    @Mitsunee_ 4 ปีที่แล้ว +3

    Why does this video end up feeling like TOP 5 TIMES the Google SECURITY Team Got GIT BLAMED

  • @humanflybzzz4568
    @humanflybzzz4568 4 ปีที่แล้ว +2

    Wow, your channel has grown. I've been away from watching your vids for a while, so it's kinda amazing to see almost 500k subs on a tech channel that's not only about gaming rigs :) Love it , good work LiveOverflow

  • @jeromej.1992
    @jeromej.1992 4 ปีที่แล้ว +1

    So, if a method is executing sensitive actions, it should embed the security check call? Does it really only apply to languages or should it be considered in other languages as well? (say c#)

  • @bren.r
    @bren.r 4 ปีที่แล้ว +1

    Idk why they’d think it would ever be a good idea to rely on a string to construct things. Shouldn’t you have an inherent hesitation to do such a things? It’s like using eval. Same with accessing arrays of methods in obfuscated code by string properties.
    It’s actually crazy how many JS exploits you can take advantage of on most websites.

  • @markusTegelane
    @markusTegelane 4 ปีที่แล้ว +1

    It's pronounced cross ss not xss
    (jk)

  • @roxrosa
    @roxrosa 4 ปีที่แล้ว +1

    I think we could automate this using Selenium. We could test it but it might we might have a lot of time developing the framework the google project. I might be wrong thou haha

  • @kevinsanthosh3537
    @kevinsanthosh3537 4 ปีที่แล้ว +2

    Fact: The guy(thefl0w) who discovered a kernel exploit for ps4 was paid 10,000$ by sony!

  • @Nossody
    @Nossody 4 ปีที่แล้ว +3

    SPONSORED BY GOOGLE?
    we're out here bois

  • @RaceForMoney
    @RaceForMoney 4 ปีที่แล้ว +2

    5:27 RUSSIAN DETECTED!

  • @cheaterman49
    @cheaterman49 4 ปีที่แล้ว +1

    You know what this kind of intricate multi-step process reminds me of? Pokémon exploits. But you started covering that already so I'm sure there'll be more coming :-)
    Also, congrats in advance for your 500k subs, very much keeping the hacking spirit alive!

  • @flonc6290
    @flonc6290 4 ปีที่แล้ว +1

    Imagine if he got demonitized..

  • @arisweedler4703
    @arisweedler4703 4 ปีที่แล้ว +1

    The malicious spreadsheet attack... this is why it's unsafe for even clients to be able to attack themselves!! The attacker gets to be the client sometimes.

  • @raiwac
    @raiwac 4 ปีที่แล้ว

    Please help me
    How to bypass speed hack detection in game ??
    🙏🙏🙏♥️♥️♥️🙏🙏♥️♥️

  • @raiwac
    @raiwac 4 ปีที่แล้ว

    Please help me
    How to bypass speed hack detection in game ??
    🙏🙏🙏♥️♥️♥️🙏🙏♥️♥️

  • @threeMetreJim
    @threeMetreJim 4 ปีที่แล้ว

    You can use Google chrome browser to read minified code, just click the {} for pretty print...
    All of the hacking I've done, I've used this. First in the Opera browser, and then using Chrome dev tools. I found several vulnerabilities in sites that way. With a bit of practice it's not very difficult to follow obfuscated code, especially when you can set breakpoints and skip through it. Everything I've reported got fixed, with nothing but a 'thanks' and not a bounty in sight (apart from Facebook's $500)... Now I can't be bothered reporting bugs or vulnerabilities, sometimes they'll be exploited for fun, but that is it.

  • @paranoidraider
    @paranoidraider 4 ปีที่แล้ว

    This is immoral how silly money they pay for such a hard work when they earn SO MUCH.
    SHAME on you Google!
    Moreover Google just showed us how shitty their code is - thanks Google but I won't be your another low paid worker.

  • @hocky-ham324-zg8zc
    @hocky-ham324-zg8zc 3 ปีที่แล้ว

    Only $4,000 for a pretty substantial bug? Next time maybe Nikolai should see if there’s a higher bidder ;)

  • @valrina
    @valrina 3 ปีที่แล้ว

    Saying that this bug couldn't be found by any tool is not a statement I would make. I am pretty sure a GPT3 like transformer for this purpose could find not only this but much more bugs that we can't even possibly understand.

  • @aat2312
    @aat2312 4 ปีที่แล้ว

    Is it only me that thinks Nikolay looks like Elliot?

  • @missingno6618
    @missingno6618 4 ปีที่แล้ว +2

    Great video man!
    Also, can you do a video with Ezequiel Pereira? His vulns are super awesome.

  • @paxdriver
    @paxdriver 4 ปีที่แล้ว

    It is so dope to see cooperation and capitalism working and outputting free educational videos afterwards. This is a shining example of how we should behave in society lol

  • @ZombieBrine1309
    @ZombieBrine1309 3 ปีที่แล้ว

    Damn. Google sponsored a video on their own platform. That's a rare one!

  • @over00lordunknown12
    @over00lordunknown12 4 ปีที่แล้ว

    I want to go into cyber security. bug hunting, penetration testing (with social engineering), but I feel like I know so little about all of it. :/

  • @myhackertech
    @myhackertech 4 ปีที่แล้ว +1

    It is interesting to know that Google sponsored it ! I wonder if this XSS was exploited in the wild

  • @sriram-zn3ic
    @sriram-zn3ic 3 ปีที่แล้ว

    Only $4133.70 for his great work ?

  • @HarryBallsOnYa345
    @HarryBallsOnYa345 4 ปีที่แล้ว +23

    Whenever i hear the word i just shiver, ugwha.

  • @nightking4615
    @nightking4615 3 ปีที่แล้ว

    And Google keeps saying we are not smart enough to work there because we are not able reverse a linked list under pressure the way they expect us to! LOL

  • @Gess1t
    @Gess1t 4 ปีที่แล้ว +2

    damn, this guy is farming money from google's security team

    • @barefeg
      @barefeg 4 ปีที่แล้ว

      Actually his job could be easier if he had access to the source code and internal google tools. But that would mean he’d be a google employee with a 6+ figure salary. Instead they pay him actual pennies for the bounty.

  • @chadsoftwarefreedom65
    @chadsoftwarefreedom65 4 ปีที่แล้ว +1

    awesome

  • @amyshaw893
    @amyshaw893 4 ปีที่แล้ว +1

    Am I misunderstanding something? I don't see the issue here. you create a google doc, then modify it so that when you embed it, and tell it to run javascript, it runs javascript. Can't you just... run the javascript? If you have control over the embedding site like that, can't you just write your own javascript directly?

    • @KuromiAK
      @KuromiAK 4 ปีที่แล้ว +5

      You are not supposed to be able to embed arbitrary JavaScript into embedded Google Doc. The embedded Google Doc has access to visitor's account which you shouldn't have access to.
      It is true that you can just embed any JavaScript. But it should only happen when the embedded content also comes from your website. XSS happens when you can embed code to other's website, which is accessed with a different set of credentials & cookies.

  • @leozendo3500
    @leozendo3500 4 ปีที่แล้ว

    Google sponsors. Good your channel is less likely to be demonetized.

  • @dichvuseo
    @dichvuseo 4 ปีที่แล้ว

    Bạn đang dùng những phần mềm nào trong video này?

  • @prashantsharma4846
    @prashantsharma4846 4 ปีที่แล้ว +1

    How can i analyse obfuscated javascript code ? Any suggestions. it’s difficult to analyse a.b b.this like these codes

    • @madghostek3026
      @madghostek3026 4 ปีที่แล้ว

      You can try downloading the page and run it offline, but that usually breaks the page, or you can use some kind of proxy to load your modified js file instead. Then you can add debug prints or dump objects for information easily

  • @rajk9034
    @rajk9034 4 ปีที่แล้ว

    If google really rewards then I will report vulnubs

  • @FurriousFox
    @FurriousFox 4 ปีที่แล้ว +1

    amazing video's!
    can you add a link to the bug report in the description?

  • @secureitmania
    @secureitmania 4 ปีที่แล้ว +12

    Eagerly waiting to see😍

  • @anakinskywalkerrr
    @anakinskywalkerrr 4 ปีที่แล้ว

    Just put XSS as out of scope, problem solved.

  • @1008OH
    @1008OH 4 ปีที่แล้ว +1

    So you got sponsored by google? Damn that's some serious drip

  • @권현준-o1k
    @권현준-o1k 4 ปีที่แล้ว

    Wow... that's amazing...
    And that was a perfect explanation. Thank you for your video!

  • @iamjoris
    @iamjoris 4 ปีที่แล้ว

    As always, nice explanation!
    Why would you say this problem could never be found by an automated check? I'd argue that instantiating an object from a string is always a bad idea. It may be quite normal to do in Javascript, but that does not make it a good idea. It feels comparable to manually changing the instruction pointer based on some input. Yes, this can be powerful, but why the heck would you? I'd say creating a static mapping between strings and classes is definitely worth the effort. For example, Google's own language Go does not allow you to do anything like this without getting into the (literally called) unsafe package (if it's even possible with that).
    So to conclude: why not just disallow using a string for instantiating an object altogether. I use Javascript only limited professionally, so I'd love someone to tell me why this is not feasible/not applied in practice :-]

  • @falxie_
    @falxie_ 4 ปีที่แล้ว

    Obfuscated/minified code is kinda pointless when you can just beatify it. I think all JS code should have sourcemaps

  • @Rickyy4K
    @Rickyy4K 4 ปีที่แล้ว

    "This god damn Google Security team can´t do anything right! Well I guess we´ll just say it´s larry´s fault then."

  • @jessefontainieohfwob
    @jessefontainieohfwob 3 ปีที่แล้ว

    I just stumbled upon your video's. I understand most of it, but i gotta ask. Why is xss so bad?

    • @angelcaru
      @angelcaru 3 ปีที่แล้ว

      If you can run JS, you can steal cookies or, in the worst cases, even passwords!

  • @ijwarren170
    @ijwarren170 4 ปีที่แล้ว

    This is why companies like Google, Apple, Microsoft and many others stay in business. They acknowledge that everything is vulnerable and are open to fixing them. Vice, many startups who try and punish those who exploit them, or Twitter, who makes no effort in securing their systems.
    Things could be better, but getting better starts with this mentality.

  • @0x-SHx
    @0x-SHx 4 ปีที่แล้ว

    I just found this channel few hour ago and I'm already in love with your work...
    You're feeding all my curiosities... Love your approach how you explain things...

  • @bhushann2356
    @bhushann2356 4 ปีที่แล้ว

    It requires you to understand code structure. Can't be explained in such video. We can only trust on what Nicoli's work.

  • @TheNitroPython
    @TheNitroPython 4 ปีที่แล้ว

    Where did you find the step by step instructions originally for this cross site script vulnerability?

    • @LiveOverflow
      @LiveOverflow  4 ปีที่แล้ว

      If you understand how XSS works it’s just creativity to come up with it

  • @NicmeisteR
    @NicmeisteR 3 ปีที่แล้ว

    Please tell me what packet analyzer you're using??

    • @NicmeisteR
      @NicmeisteR 3 ปีที่แล้ว

      Took a lot of cross referencing and searching but found it if anyone wants it, called burp:
      portswigger.net/burp/documentation/desktop/tools/proxy/using

  • @mrcobalt124
    @mrcobalt124 4 ปีที่แล้ว +1

    I wonder.. how is this dangerous? If you have the ability to actually put the there in the first place, then why can't you just create your own code in the same place instead of running it through google docs?

    • @szymonnn
      @szymonnn 4 ปีที่แล้ว +3

      because then the code runs from google docs, so it has access to the google login cookies and stuff like that

    • @mrcobalt124
      @mrcobalt124 4 ปีที่แล้ว

      @@szymonnn Oh, I see! Thanks.

  • @youdonotknowmyname9663
    @youdonotknowmyname9663 3 ปีที่แล้ว

    I wonder how they come up with the ammount of $$ that they pay as bug bountys.
    Why exactly 4133,70 $?
    Why not just 4100$ or 4130$?
    Weird ...

  • @RN-kl4kp
    @RN-kl4kp 4 ปีที่แล้ว

    I always thought wait for ur videos ..
    They are fun and very much self explanatory 😊
    Thanks mate for all this contribution you are doing towards the community .

  • @driziiD
    @driziiD 4 ปีที่แล้ว

    pretty sophisticated programming concepts discussed here. would be impressed if civilians could grok this one.

  • @smithwillnot
    @smithwillnot 4 ปีที่แล้ว

    I love this because it shows how complex development is. Basically this is main reason why I'm reluctant to change anything on complex project if it's not critical bug, and every change made feels like it'd require whole project to be tested again.

  • @ekemark224
    @ekemark224 4 ปีที่แล้ว +1

    this is good, but why would you add an hlc to the HTML???

  • @amaan5676
    @amaan5676 4 ปีที่แล้ว +2

    hi i learn a lot from u

  • @RapiBurrito
    @RapiBurrito 4 ปีที่แล้ว

    wow, this bug has "you programmers were so preoccupied with wether or not they could, they didn't stop to think if they should" all over it.

  • @gudangnya1178
    @gudangnya1178 3 ปีที่แล้ว

    Plis give subsitel indonesia

  • @bap9394
    @bap9394 4 ปีที่แล้ว

    Don't get cocky... Anyone can make security mistakes, even Google!

  • @jacobcollins934
    @jacobcollins934 4 ปีที่แล้ว

    Far out, imagine getting sponsored by google, that’s absolutely awesome. You know, sometimes I just binge watch this channel, and it never gets old. I’m super proud dude!

  • @ziakader7530
    @ziakader7530 4 ปีที่แล้ว +1

    How long did it take him to find

  • @raqha4575
    @raqha4575 4 ปีที่แล้ว

    WOT THE FUCK, ich dachte mir so ok wird schon interessant, nein einfach gesponsort by google und ein absolut informatives video

  • @OMorningStar
    @OMorningStar 4 ปีที่แล้ว

    Paused at 3:13 to see if I understand the code, I think hlc creates an object that captures a port, url, and data as an array. Then it creates a function inside that object to stringify the message. Finally it creates a script tag and appends it along with a url.

  •  4 ปีที่แล้ว

    another google sponsored google product bug video. man, they're in the right direction.
    Love LiveOverflow!

  • @johnkelfy7256
    @johnkelfy7256 4 ปีที่แล้ว

    They don’t pay much

  • @liveon7400
    @liveon7400 4 ปีที่แล้ว

    It's reasonable because those security engineers are following the "best practice" and forgot to consult the developer!

  • @some1purple
    @some1purple 4 ปีที่แล้ว

    I had a dream about a script execution exploit in Google sheets a few months ago.

  • @barefeg
    @barefeg 4 ปีที่แล้ว

    Cool content keep it coming

  • @dontaskme1625
    @dontaskme1625 4 ปีที่แล้ว

    awesome video, awesome that you did so detailed chapter markings and great that you're talking about how this bug got introduced in the first place (that part could have been even more detailed)

  • @LemonChieff
    @LemonChieff 4 ปีที่แล้ว

    Sponsored by Google? You officially won the internet. Also:

  • @massimoray9730
    @massimoray9730 ปีที่แล้ว

    Bug hunting ebook

  • @ameisee4
    @ameisee4 4 ปีที่แล้ว

    +1 for "allowlist"

  • @squirrel1620
    @squirrel1620 4 ปีที่แล้ว

    Awesome! Love the in depth.. and that's my world, ECMAScript. In this world we rely on the closures and scope for security 😏

  • @berndeckenfels
    @berndeckenfels 4 ปีที่แล้ว

    Btw I think recognizing the usafe Gadget function would be in the realm of automated tools

  • @saurajitseth
    @saurajitseth 4 ปีที่แล้ว

    my brain hurts