I Hacked a Discord Bot, the Owner said this...

แชร์
ฝัง
  • เผยแพร่เมื่อ 28 พ.ค. 2024
  • A vulnerability was found in the Discord bot, Captcha.bot. And I hacked into the bot and gave myself admin on a Discord server. But when I told the bot owner/developer about this, he said...
    Wow I'm a tease. But yessir, it's another video where I talk about the abhorrent security of Discord bots and how easily they can be hacked. And in this case there's a lot of things I get to complain about, from the security of a "security Discord bot" to how the owner responded to me after I disclosed the vulnerability.
    And again, massive thank you to xyzeva for finding this vulnerability. They are 2-0 right now.
    Also just so we are clear, I hacked into my own test server. I would never cause intentional damage to a Discord server.
    LINKS
    -----------------------------------------------------------------------------
    xyzeva's socials
    kibty.town/
    github.com/xyzeva
    SOCIALS
    -----------------------------------------------------------------------------
    Discord Server
    / discord
    Twitter
    / notexttospeech
    TIMESTAMPS
    -----------------------------------------------------------------------------
    00:00 - The Hack
    06:12 - The Damage
    08:27 - The Response
  • บันเทิง

ความคิดเห็น • 1.2K

  • @NoTextToSpeech
    @NoTextToSpeech  5 หลายเดือนก่อน +2491

    1. Do not harass the bot developer. Yes, he didn't say thank you, but he did fix the issue quickly. Harassing someone because of poor manners aint the move.
    2. The vulnerability is patched, please stop asking me how to hack into captcha.bot. I will never make a video on a live vulnerability because some of you are rascals.
    and finally, I was told that people are asking other bot devs if their bot is safe and linking this video. That is perfect, that's the goal of these videos. Whether it's a one man team or a big company, people will exploit discord bots and use it to ruin people's communities or scam a bunch of people. And everyone getting a little scared of eva, and double checking the security of their bots, is going to make the community a better place. (Even if it means I have to burn my bridges with bot devs that disagree).

    • @NeedForSpeedRTX
      @NeedForSpeedRTX 5 หลายเดือนก่อน +3

      Oh

    • @RoyaleWind
      @RoyaleWind 5 หลายเดือนก่อน +25

      i hope he learned now atleast to not hardcode his id and to write a good api (there a propably still allot of vulnerabilities)

    • @iwasneverjoebiden
      @iwasneverjoebiden 5 หลายเดือนก่อน +4

      that's reasonable

    • @7heMech
      @7heMech 5 หลายเดือนก่อน +2

      Well, the video could still be a clue to another exploit, if such a dumb loophole existed, there are likely many more.

    • @bnanik
      @bnanik 5 หลายเดือนก่อน

      yes

  • @QSABDO
    @QSABDO 5 หลายเดือนก่อน +3689

    this guy needs a lesson on how to properly protect his API endpoints... hilarious

    • @Neninho_
      @Neninho_ 5 หลายเดือนก่อน +175

      What do you mean? Checking the locally cached ID in the frontend with no proper backend verification is totally enough. /s

    • @masterman1502
      @masterman1502 5 หลายเดือนก่อน +19

      Their sourcemaps are still public, btw (the "Webpack" folder). Either theirs, or their payment/subscription processor

    • @giorgiotr
      @giorgiotr 5 หลายเดือนก่อน

      dark is an idiot

    • @TheRealKiRBEY
      @TheRealKiRBEY 5 หลายเดือนก่อน +9

      As a non coder whats an API?😊

    • @itznerdyfox7479
      @itznerdyfox7479 5 หลายเดือนก่อน

      ​@@TheRealKiRBEYme work wit someone else's application via my own code

  • @T_nology
    @T_nology 5 หลายเดือนก่อน +2174

    How are these bots so hilariously insecure? The fact everything could not only be done so easily but also all within the browser's DEVELOPER TOOLS is a huge problem.

    • @IanGaming101HD
      @IanGaming101HD 5 หลายเดือนก่อน +68

      @@VaultCord its the person who created the bot's fault, the website made for his bot has lots of vulnerabilties.

    • @bablela26
      @bablela26 5 หลายเดือนก่อน

      I finally understood why dumbasses politicians wanted at one point to block the inspect page... Wait, no they just are incredibly dumb and if they catch a glimpse of dev tools they will completely loose their mind lmao

    • @nocturnaldev8607
      @nocturnaldev8607 5 หลายเดือนก่อน +27

      ​@@VaultCordthey do, if only you cared to read the terms of service instead of blaming them for every goddamn thing

    • @Minecon724
      @Minecon724 5 หลายเดือนก่อน +2

      well you don't need any proven skills or any signed legal things to create a bot

    • @wiirlak8681
      @wiirlak8681 5 หลายเดือนก่อน +4

      @@VaultCordIt's the law to disclose data breah, bots' owner not following it (or the ToS) is not Discord fault - but Discord is at fault for not going after them after that through.

  • @AquaQuokka
    @AquaQuokka 5 หลายเดือนก่อน +1021

    Having this little protection is shameful. There is a complete lack of basic security measures...

    • @toydotgame
      @toydotgame 5 หลายเดือนก่อน +28

      im literally not a web dev and seeing that js auth code immediately set off alarms

    • @kibbewater
      @kibbewater 5 หลายเดือนก่อน +6

      ​@@toydotgame so if you are not a web dev, don't comment on the matter, authorization headers are completely fine and pretty standard for many applications

    • @Omega-mr1jg
      @Omega-mr1jg 5 หลายเดือนก่อน +18

      ​@@kibbewaterwhat. for an app like this? Okay

    • @bennybouken
      @bennybouken 5 หลายเดือนก่อน +9

      ​@@kibbewater💀

    • @kibbewater
      @kibbewater 5 หลายเดือนก่อน +11

      @@Omega-mr1jg The Auth headers were not the problem, lack of handling them correctly was.

  • @lem0321
    @lem0321 5 หลายเดือนก่อน +877

    As a full-stack developer I can confirm that this is so amateur and unprofessional, no-one should trust a single product from this developer EVER. Remove captcha bot from your servers rn.

    • @justind4615
      @justind4615 5 หลายเดือนก่อน +10

      hecker

    • @Dultus
      @Dultus 5 หลายเดือนก่อน +53

      That's what happens when you just throw everything to the front end. x)

    • @Lampe2020
      @Lampe2020 5 หลายเดือนก่อน +27

      Verification etc. should be done on the backend and be a little more secure than just sending _any_ auth header. It should verify the auth header that it's actually the owner and probably a lot more.
      I even have such a login on my website, but you need the right password and username to get logged in and _then_ it just sees "Logged in? Okay, here's your perms!", because I am the only user account there. And eventually I'll replace that with a third-party OAuth login instead of an own one.

    • @tabletopjam4894
      @tabletopjam4894 5 หลายเดือนก่อน +7

      this is what happens when someone spends too much time in js land lol

    • @WindowsDaily
      @WindowsDaily 5 หลายเดือนก่อน +3

      I can't even tell how it'd make it any easier. They clearly know the account to give the server to, so all they have to do is put the if (user is not me) check in there. Sure it can be put in the client side too, but just one line in the server side would have been enough to stop it.

  • @kuuravr
    @kuuravr 5 หลายเดือนก่อน +499

    All those recent exploits discovered in bots is why I keep stressing to people to properly setup their servers and not blindly give bots permissions they don't need.
    Thank you for bringing light to these exploits, hopefully this pushes people to stop blindly trusting bots and for devs to be more careful with security

    • @justind4615
      @justind4615 5 หลายเดือนก่อน +5

      ye like who puts checks, security, etc in front-end?

    • @Liggliluff
      @Liggliluff 5 หลายเดือนก่อน +3

      I had a server where bots have different functions, but these bots only had access to the channels they should have access to. For example, no access to #general or #moderation.

    • @kuuravr
      @kuuravr 5 หลายเดือนก่อน +3

      ​​@@LiggliluffThat's pretty much how I do it, if it doesn't need to view a specific channel then it's restricted from it, if it only needs to read and not talk it won't have send message permission except for logs channels, etc

    • @ItzPubby
      @ItzPubby 5 หลายเดือนก่อน

      #1 advice i can give. Don't use bots. Bots are fully automated without human input when it comes to authentication. The best security you can do, is have active HUMAN staff members in your servers. I get the appeal for bots, but if you bringing them in from a third party, you are literally relinquishing control to someone you dont know if you can trust or not. Weither if the properly took the percautions. So, set up your discord and manage it yourself.

    • @kuuravr
      @kuuravr 5 หลายเดือนก่อน +4

      ​@@ItzPubby I wouldn't say that's a good advice, bots are helpful when used right especially when you have a large server or want to setup something specific, the issue is people are too lazy to set up bot properly and just gives it admin so it does its job, they don't organize their server roles properly, they don't disable bot features they don't need and don't restrict the bot accesses to what it doesn't need, they don't know how to look for the signs that a bot isn't made properly (such as its invite auth link requesting admin perms in any capacity).
      Sure if you're running a small server you probably don't need a bot, but they're a good tool and people needs to know better when using said tool.

  • @reki9726
    @reki9726 5 หลายเดือนก่อน +155

    As a Cybersecurity Student, that was the shitiest security that I have ever seen in my whole life 💀

    • @turtleparty7241
      @turtleparty7241 5 หลายเดือนก่อน +8

      that means you haven't been in cybersecurity for very long (no offense)

    • @distorted_heavy
      @distorted_heavy 5 หลายเดือนก่อน +50

      @@turtleparty7241 bro doesn't know how school works

    • @reki9726
      @reki9726 5 หลายเดือนก่อน

      @@turtleparty7241 A year and learning (yes, its not too long imo, doing hackthebox machines rn)

    • @danialrafid
      @danialrafid 5 หลายเดือนก่อน

      ​@@turtleparty7241 He said he was a student 🤨

    • @Goovdluck687
      @Goovdluck687 4 หลายเดือนก่อน

      ​@@turtleparty7241 so someone can easily hack into a bot by using F1 and it's not the shitiest security?

  • @7heMech
    @7heMech 5 หลายเดือนก่อน +489

    Absolutely disgusting move by the bot owner.

    • @zikohaha7440
      @zikohaha7440 5 หลายเดือนก่อน +9

      Shut UP !!!!!!!! 😍😍😍😍🥰🤩🤩🤩

    • @Craosien
      @Craosien 5 หลายเดือนก่อน

      ​@@zikohaha7440npc

    • @BroggoYT
      @BroggoYT 5 หลายเดือนก่อน

      @@zikohaha7440 you shut up

    • @redixroblox.
      @redixroblox. 5 หลายเดือนก่อน +59

      @@zikohaha7440 no

    • @user-rf1fi4uw1k
      @user-rf1fi4uw1k 5 หลายเดือนก่อน +1

      Thats messed up

  • @rryangosling
    @rryangosling 5 หลายเดือนก่อน +154

    xyzeva causally finding vulnerability in security bots 💀

    • @chevvvv
      @chevvvv 5 หลายเดือนก่อน +7

      sometimes I want people like that to point what's wrong with my stuff out, just to make them a little bit better

    • @fuyuv_
      @fuyuv_ 5 หลายเดือนก่อน

      @@chevvvv thats what beta releases, etc. are for

    • @Buttersaemmel
      @Buttersaemmel 5 หลายเดือนก่อน

      @@chevvvv and then there are those companies that sue you for letting them know, even if you just accidentially stumbled upon it...

    • @unearthlynarratives_
      @unearthlynarratives_ 5 หลายเดือนก่อน +6

      It's a very amateur mistake so I wouldn't credit too much here, this should have never worked had this been done by someone with more than 1 year of experience.

    • @schrenjaminsstift92
      @schrenjaminsstift92 5 หลายเดือนก่อน

      ​@@unearthlynarratives_even somelne with 1 month of wxperience shoudn't make this mistake. As soon as you know that anyone can send stuff to your server, you should see how this is shitty security

  • @Gandalf_Potter00
    @Gandalf_Potter00 5 หลายเดือนก่อน +126

    I'm not surprised that Dark was unresponsive after you basically saved his bot from destruction and chaos. Every interaction I've had with him (through the Arcane server), he has been cold and narcissistic. I don't know if that's how he actually is IRL, or if he gets a lot of messages per day and can't keep up with them, but he does not seem like a very good person in my opinion. I am glad that he fixed this huge vulnerability, and I can pretty much guarantee that any mention of this in any of the servers he owns will be met with a timeout or something of that sort. I mentioned the word "bot" in the Arcane server and got muted for 5 minutes for "advertising" as he told me.

    • @verytuffcat
      @verytuffcat 5 หลายเดือนก่อน +9

      almost every large bot dev is narcissistic tbh

    • @Gandalf_Potter00
      @Gandalf_Potter00 5 หลายเดือนก่อน +15

      @@verytuffcat Dark is the only bot developer I have ever directly interacted with, so I can't speak much on that, but I wouldn't be surprised if the reason they seem cold is because they just get an onslaught of friend requests and DM requests. I would imagine it would be stressful to have to deal with all of that. I'm not excusing Dark's actions as he could have at least said thank you, but there might be multiple reasons why he didn't respond other than he's a duchebag. I still think he could be nicer though.

    • @radiatedcherry
      @radiatedcherry 5 หลายเดือนก่อน

      its very easy to turn off those friend request and dms stuff its just their incompetance@@Gandalf_Potter00

    • @IceBoltGamingIBG
      @IceBoltGamingIBG 5 หลายเดือนก่อน

      ⁠@@Gandalf_Potter00influencers and developers get insane dms and friend requests all the time lol, but not all of them are narcissistic. these type of people are just inherently like that, and the fame is just feeding it

    • @verytuffcat
      @verytuffcat 5 หลายเดือนก่อน

      @@Gandalf_Potter00 yeah

  • @sluuuudge
    @sluuuudge 5 หลายเดือนก่อน +108

    As someone who has dabbled with a bit of bot development here and there on Discord, I have seen so many examples of other developers who think they're too good and too big to acknowledge other people around them - especially when it's criticism or feedback. Not surprised at all that Dark ignored your DM and I can guarantee that had you sent it from your NTTS account he 100% only then would've bothered replying.

  • @RealTheonFrFr
    @RealTheonFrFr 5 หลายเดือนก่อน +160

    "am be so so wuh a bo" such wise words from the owner...

    • @Mightype
      @Mightype 5 หลายเดือนก่อน +9

      It’s something about the word sussy Baka but in reverse

    • @mohabtameregyptgamer8902
      @mohabtameregyptgamer8902 5 หลายเดือนก่อน +4

      I reversed it and it said amongus sussy baka not kidding reverse the video and you can hear it too

    • @SleepyAsshole
      @SleepyAsshole 5 หลายเดือนก่อน +2

      @@Mightypehe said “among us Sussy balls” Lmaooooo 💀💀💀

    • @BlueYT592
      @BlueYT592 5 หลายเดือนก่อน

      Whice goat will be the next to be my subcriber🤔

    • @shrimpaerospace
      @shrimpaerospace 4 หลายเดือนก่อน

      @@BlueYT592 Well i'm not a goat. Maybe the next guy

  • @PandaMasik
    @PandaMasik 5 หลายเดือนก่อน +69

    We would be doomed if NTTS started his villain arc.

    • @YeetDisDude
      @YeetDisDude 5 หลายเดือนก่อน

      too bad he cant cause all he knows is how to get spoonfed by women

    • @norwegiansmores811
      @norwegiansmores811 5 หลายเดือนก่อน +3

      yes. and it does not help that he gets treated like shit (ignored) when helping people.

    • @Black_kot_original
      @Black_kot_original 4 หลายเดือนก่อน

      he's gonna start it someday, if he gonna keep being treated like shit

    • @user-qd6ps7dg7u
      @user-qd6ps7dg7u 3 วันที่ผ่านมา

      Xyzeva is gonna be his side kick for sure

    • @K0ra_st4r
      @K0ra_st4r 13 ชั่วโมงที่ผ่านมา

      he would be the one who ruins every discord sever ever

  • @thehansboi
    @thehansboi 5 หลายเดือนก่อน +59

    these recent vulnerability videos have really given me insight on how even the biggest bots can be taken advantage of

    • @erikkonstas
      @erikkonstas 5 หลายเดือนก่อน

      LOL forget about bots, or even Discord, try to search how many vulnerabilities people have discovered in the major cloud computing providers (AWS, Azure, etc.).

    • @ItzPubby
      @ItzPubby 5 หลายเดือนก่อน

      Take active steps to protect yourself, you cant let other people do it for you. If you want the server safe and to have these types of security you need to go through and do it properly. the best thing you can do, is be as secure as you can from your end.

    • @erikkonstas
      @erikkonstas 5 หลายเดือนก่อน

      @@ItzPubby Do you know what you're saying... thing is, bots like Captcha bot have already constructed databases which can help find alts; this is not something you can just "acquire".

    • @verytuffcat
      @verytuffcat 5 หลายเดือนก่อน

      ​@@erikkonstasi honestly wonder how it works tho. can you explain

    • @erikkonstas
      @erikkonstas 5 หลายเดือนก่อน

      @@verytuffcat So basically the thing stores a number of IP addresses and other characteristics pertaining to a number of "devices" for every Discord account that goes through it, so if another account shares anything in common it is considered to be a possible alt. Yes, it can have false negatives (e.g. the person changes their public IP address) and false positives (e.g. the person is on a public Wi-Fi).

  • @jacetang9552
    @jacetang9552 หลายเดือนก่อน +15

    A hacking tutorial 💀

  • @Gotham-guardian-pls7t
    @Gotham-guardian-pls7t 5 หลายเดือนก่อน +209

    This is the reason I like to troll the help pages on Dark's Discord server. It makes him waste his time on stupid things that takes his precious time off. I feel no remorse for Dark whatsoever

    • @epicstar86
      @epicstar86 5 หลายเดือนก่อน +18

      Big W

    • @billyhatcher643
      @billyhatcher643 5 หลายเดือนก่อน

      Glad I never heard of this dumbass bot

    • @_tr11
      @_tr11 5 หลายเดือนก่อน +2

      lol

    • @leckerp
      @leckerp 5 หลายเดือนก่อน

      Did he just hack it for fun?

    • @KaiDevvy
      @KaiDevvy 5 หลายเดือนก่อน +4

      Am I misunderstanding? All the dude did was not reply to him. Why harass him?

  • @ectothermic
    @ectothermic 5 หลายเดือนก่อน +40

    I don't think I could've resisted the intrusive thoughts tbh. Good on you, dude lol.

    • @identifydelaymc3873
      @identifydelaymc3873 5 หลายเดือนก่อน +1

      xyzeva is a developer on a server Im an admin on lmao

    • @liquidmagma0
      @liquidmagma0 5 หลายเดือนก่อน

      i mean you could have harmless fun, right? don't have to go destructive.

    • @erikkonstas
      @erikkonstas 5 หลายเดือนก่อน +3

      It's people like you who are the reason why problems are only made public after they're fixed...

    • @ectothermic
      @ectothermic 5 หลายเดือนก่อน +9

      @@erikkonstas it's a joke not a dick, don't take it so hard.

    • @erikkonstas
      @erikkonstas 5 หลายเดือนก่อน +1

      @@ectothermic Literally nobody thinks you're joking tho.

  • @Cybreak
    @Cybreak 5 หลายเดือนก่อน +115

    im starting to think eva is an AI, they have found ways to do this with so many bots lmao

    • @cylan6914
      @cylan6914 5 หลายเดือนก่อน +1

      Obviously she is, girls are not real

    • @skylarkblue1
      @skylarkblue1 5 หลายเดือนก่อน +29

      AI's pretty awful at cyber security. No, this is just a decent amount of time having fun pentesting lol

    • @kacperkonieczny7333
      @kacperkonieczny7333 5 หลายเดือนก่อน +1

      NULL

    • @user-to7ds6sc3p
      @user-to7ds6sc3p 5 หลายเดือนก่อน +19

      She does hobby pentesting according to her homepage. And her git shows activity in regards to malware/pentesting and most importantly silly block game.

    • @_tr11
      @_tr11 5 หลายเดือนก่อน

      @@kacperkonieczny7333 undefined

  • @pokameni
    @pokameni 5 หลายเดือนก่อน +135

    To be ethical or not to be. As soon as you have a good intention, you literally get shit on by life. Honestly, you shouldn't have given away the exploit without getting a response from him, or a bug-finding contract. This kind of vulnerability should have been rewarded. If I made a bot and such a vulnerability was discovered, not only would I thank the user who found it and didn't abuse it, but I'd also try to pay for it or give away premium benefits.
    What a rat.
    Translated because i'm not ca or us, just a baguette.

    • @nwerd7584
      @nwerd7584 5 หลายเดือนก่อน +7

      I think NTTS makes a good amount of video legally through YT. Probably why he leaves this stuff for other people to make the choice. But not responding doesn't sound like they tend to pay bug bounties. a good team would have probably offered it.

    • @Buttersaemmel
      @Buttersaemmel 5 หลายเดือนก่อน +10

      even ignoring ethics this is just stupid.
      if you know you get paid out and don't need to fear legal actions if you point out vulnerabilities, you'll probably do it.
      but if you know you will just be ignored but could instead exploit it to make some money, a lot of people wont care about ethics and decide to exploit.
      it's just proof for anybody that you'll gain much more from exploiting his products.
      that's just stupid and for all of his customers you can just hope that no bad actor is going to find something.

    • @delicious_orange013lol6
      @delicious_orange013lol6 5 หลายเดือนก่อน

      P sure the owner doesn't care to fix it and knowingly just lets that be possible

    • @parapetcloud
      @parapetcloud 5 หลายเดือนก่อน +4

      ​@@delicious_orange013lol6it's best not to attribute to malice, that which can reasonably be attributed to being a complete dumbass.

    • @delicious_orange013lol6
      @delicious_orange013lol6 5 หลายเดือนก่อน

      @@parapetcloud if he's a dumbass then he'll learn the hard way

  • @ashmaniacal
    @ashmaniacal 5 หลายเดือนก่อน +109

    Once again, thank you for keeping us safe on Discord, NTTS!
    Shame Discord don't have an employee to do this.

    • @denjidenjidenj
      @denjidenjidenj 5 หลายเดือนก่อน +3

      npc

    • @ashmaniacal
      @ashmaniacal 5 หลายเดือนก่อน +5

      You're an Npc @@denjidenjidenj 😂😝

    • @SilenceBot
      @SilenceBot 5 หลายเดือนก่อน +7

      ​@@denjidenjidenjyou have become the very thing you have set out to destroy!!

    • @denjidenjidenj
      @denjidenjidenj 5 หลายเดือนก่อน

      npc activity@@SilenceBot

    • @ZickZenniYT
      @ZickZenniYT 5 หลายเดือนก่อน

      @@denjidenjidenj *bot activity

  • @RavDeBest
    @RavDeBest 5 หลายเดือนก่อน +28

    That is the most pathetic thing I ever seen, like imagine ghosting the guy that help you find a security problem in your code, like imagine this happened again. I'm sure NTTS knows this abt stuff or he knows someone knows this stuff, imagine being so egoistical and risking ur career

    • @sal_strazzullo
      @sal_strazzullo 3 หลายเดือนก่อน

      Can't say for sure he ghosted him, he only gave him one day to reply. When my dms are full it takes me two weeks to read and reply to them on average

  • @kawaiiplayz4007
    @kawaiiplayz4007 5 หลายเดือนก่อน +7

    Some servers really are set up horribly, one time, I saw a server where for some reason the owner role, with all perms, was under the member role, which everyone has, and also has perms to manage roles, so if literally anyone looked at the roles, which the member role also has perms for, they could've easily just given themselves owner and destroyed the entire server before the real owner got on.

  • @Sunnyon163
    @Sunnyon163 5 หลายเดือนก่อน +4

    okay so heres the thing, firstly a super big thank you for makeing those videos secondly i get that the dev might have had a bigger thing to work on than responding to you when they first saw it and im happy they did fix it so fast but a "hey we fixed it thanks for saveing our butt here" wouldve been nice

  • @TezlaGrey
    @TezlaGrey 5 หลายเดือนก่อน +12

    Can you cover the new mobile layout and how to revert to the old layout? It's absolute ass and makes me happy to be legally blind

    • @TorutheRedFox
      @TorutheRedFox 5 หลายเดือนก่อน +1

      trick is to downgrade to earlier version, disable it there, update back and never update again without confirmation that it still exists

    • @chaos9790
      @chaos9790 5 หลายเดือนก่อน

      done

    • @sal_strazzullo
      @sal_strazzullo 3 หลายเดือนก่อน

      I like the switching between severs and dms, but I absolutely hate the new search and how I can't just type from:someone without it trying to do some Google type of stuff

  • @7heMech
    @7heMech 5 หลายเดือนก่อน +24

    This escalated so quickly.

    • @TheFakePlayerGame
      @TheFakePlayerGame 5 หลายเดือนก่อน

      he dont understand protection LOL

  • @Jakkilip
    @Jakkilip 5 หลายเดือนก่อน +9

    I can't believe the owner said the N word

    • @MarshawnEmpire
      @MarshawnEmpire 2 หลายเดือนก่อน +1

      Fr

    • @MODULER_PHI
      @MODULER_PHI 8 วันที่ผ่านมา +1

      Normal on Discord

  • @Gamer430YT
    @Gamer430YT 2 หลายเดือนก่อน +1

    I just finished watching this video, and decided to check a few of the bots I have used on servers I own/co-own, including paid, free, and trial bots. It takes a bit longer than this, but some very popular bots(not gonna name them) have some major issues very similar to this one. I tested a method on a server I am friends with the owner on and managed to(after creating a backup server so people wouldn't lose everything) completely wipe the server in the span of 8 minutes. People really need to hire some kind of white-hat to double check that things aren't as hilariously undefended as this was.

  • @lollolcheese123
    @lollolcheese123 5 หลายเดือนก่อน +10

    You can always go the middle route: Sell the vulnerabilty but also tell the owner about it

    • @seawinn
      @seawinn 5 หลายเดือนก่อน

      that's big brain time

    • @tyx168
      @tyx168 5 หลายเดือนก่อน +2

      i wouldnt even bother telling him about this, i would just look how his bot gets destroyed. he's such a looser for not even answering

    • @wanderingpalace
      @wanderingpalace 5 หลายเดือนก่อน +1

      just sell the vulnerability to him for 1000 dollars

  • @ur1zenAE
    @ur1zenAE 5 หลายเดือนก่อน +12

    NTTS Started his own villain arc confirmed 100%

  • @Cheios-Demiose
    @Cheios-Demiose 5 หลายเดือนก่อน +7

    Eva and no text to speech are really helping people on this. the hero's we need.

  • @F.B.I_A.F.M
    @F.B.I_A.F.M 4 หลายเดือนก่อน +6

    Welp time to raid some Discord servers. 💀

  • @paintden
    @paintden 5 หลายเดือนก่อน

    Man, you are a real hero! This made me so proud and insipred. Well done bro.

  • @genericname3685
    @genericname3685 5 หลายเดือนก่อน +23

    This shows us very well how life slaps you across the face for just being nice and the least they could've done is a thank you, but apparently thats too much for some people.

  • @nanopi
    @nanopi 5 หลายเดือนก่อน +4

    no announcement could mean some servers don't notice the bot handing out the wrong roles for a little while

  • @DarkSansTV
    @DarkSansTV 5 หลายเดือนก่อน +1

    this is epic, guilded is finally getting the attention is really needs, this is poggers

  • @lightrealmrapono
    @lightrealmrapono 5 หลายเดือนก่อน +1

    Seeing this makes me glad that I went through the trouble of attaching this one bots permissions to each relevant Channel instead of giving it the blanket permission.

  • @kipchickensout
    @kipchickensout 5 หลายเดือนก่อน +24

    don't worry, if he was that careless and clueless about security on that matter, he probably has a lot of other holes to patch

  • @RetoonHD
    @RetoonHD 5 หลายเดือนก่อน +6

    At this point, bad security by discord bot devs doesn't surprise me anymore. The bar to making a bot is so goddamn low that incompetent people make bots that get too popular for their own good.

  • @mauron55
    @mauron55 5 หลายเดือนก่อน +2

    6 seconds into the video and I have to pause to replay it, I was not prepared for this start.

  • @Eflaene
    @Eflaene 5 หลายเดือนก่อน +2

    So now NTTS teamed up with hacker-cat-girl pfp and we're getting more videos like this ? love it

  • @the_mclean
    @the_mclean 5 หลายเดือนก่อน +6

    This is why I don't trust security bots.

  • @theenigmascribe
    @theenigmascribe 5 หลายเดือนก่อน +3

    Waiting for NTTS's video on the new discord update with the interface

  • @Doodle128
    @Doodle128 5 หลายเดือนก่อน +1

    I wonder if most bots have this exact issue with a similar result after making it think you're the owner and some devs are just too lazy to patch it if they hear about it.

  • @AsrielDreemurrPlays
    @AsrielDreemurrPlays 5 หลายเดือนก่อน

    from what i've seen (at least on this channel I don't really use bots in my servers at all, and the bots I do use are like, music bots which only need like 1 permission). Most bot developers don't have experience with an internet facing service. If the debug endpoint is there just for debugging other servers just incase there's an issue, why not just have it to where it can accept any ID and auth token, but on the backend it checks if it's the correct user. The code is right there in the page source, it just checks if the userID is the ID if the owner of capture bot, and just doesn't show it if it's not...the actual call doing the debug mode just does it, no other prior checks beside if the guildID is a valid id.
    What should've been done is, A. don't hardcode the user ID into the check for the User ID someone could just spoof it by just copying it right there B. do other verification on the actual backend.
    it could be a whole thing where first it sends the request like it does in the video, but when it gets to the backend it'll check multiple things, the user ID that sent the data, what permissions it has etc etc. verification shouldn't be done on the front end.

  • @stoteam8748
    @stoteam8748 5 หลายเดือนก่อน +7

    crazy how this guy doesn't even protect his api endpoints

  • @JaheemTheThing
    @JaheemTheThing 5 หลายเดือนก่อน +4

    0:04 says
    "Among us sussy ba-"

  • @user-nz5sv3gf8n
    @user-nz5sv3gf8n หลายเดือนก่อน +1

    love your vids man

  • @user-um7ge6rl7k
    @user-um7ge6rl7k 5 หลายเดือนก่อน

    I LOVE THIS. I can spend hours finding vulnerabilities or bypasses like this :). I wish I could do this as a full time job

  • @rainbowspongebob
    @rainbowspongebob 5 หลายเดือนก่อน +3

    Bro went from making videos about discord news to becoming a hacker, well I wasn’t expecting that

  • @kepscorner
    @kepscorner 5 หลายเดือนก่อน +3

    this makes me glad and sad that I am so neurotic about server setup. If I was a bit stupider I coulda used this to get back into my own server but I'm too reserved about permissions so this would've never worked :sob:

  • @lateworm
    @lateworm 5 หลายเดือนก่อน +1

    yup. this is why I always set up bots below mods/andmins and above janitors. bots can only be trusted to delete messages and give roles that have no real perms under them.

  • @Mewo289.
    @Mewo289. 5 หลายเดือนก่อน

    What plugin do you use to check the permission thing? Better discord or that other one? (i forgot the name of it lmao, forgive me)

  • @tamerjustine
    @tamerjustine 5 หลายเดือนก่อน +5

    NTTS, idk if you still read comments, but are you aware how discord is forcing mobile users to use new ui
    To explain, now if you change the ui, you CANNOT change back to old ui (im forever stuck in new ui purgatory. Send Help)

  • @Zencep
    @Zencep 5 หลายเดือนก่อน +4

    I…might have to see if I can hire Eva to do a vulnerability check on a project at some point…

    • @identifydelaymc3873
      @identifydelaymc3873 5 หลายเดือนก่อน +1

      she is a developer for a server im an admin on

  • @Signupking
    @Signupking 5 หลายเดือนก่อน +1

    some time ago you made a video to make your own music bot, in case you find other "selfmade" bots like a reaction role bot and others it would be great if you could make a video about these or atleast recommend them.

    • @erikkonstas
      @erikkonstas 5 หลายเดือนก่อน

      LOL, those are way more likely to also not be Emmental cheese... 😂

    • @Signupking
      @Signupking 5 หลายเดือนก่อน

      @@erikkonstas i really dont what you are trying to tell me with this comment

    • @erikkonstas
      @erikkonstas 5 หลายเดือนก่อน

      @@Signupking That the "small" GitHub projects are much more likely to involve proper practices, because once a project becomes big, the focus changes from proper implementation to profit.

  • @Baburun-Sama
    @Baburun-Sama 5 หลายเดือนก่อน +1

    Security Problems in Discord Bots? You're... the One Legend.

  • @HeyLyfe
    @HeyLyfe 5 หลายเดือนก่อน +4

    NTTS you giving here a good example of people who doesn't give a shit about safty, you did your thing and i proud of you its his problem

  • @roxlife8173
    @roxlife8173 5 หลายเดือนก่อน +3

    This escalated quickly.

  • @oglothenerd
    @oglothenerd 5 หลายเดือนก่อน +2

    I reversed the reversed audio, and it said: "Among Us Sussy"

  • @thegreatsmol
    @thegreatsmol 5 หลายเดือนก่อน

    Can you make a video on the new mobile layout? I just got it and god it's horrible I need help. I did some searches and apparently theres no way to revert it, it would be nice to know i'm not the only one suffering

  • @souls4781
    @souls4781 5 หลายเดือนก่อน +6

    Disgusting behavior. A ‘thank you’ from his response would’ve really shown that he at least cared a bit. Sometimes it just doesn’t pay to have morals. I would have made an airdrop in an NFT server then have drained their wallets.

  • @Pengal25
    @Pengal25 5 หลายเดือนก่อน +8

    The amount of trolling that will be done is devastating

    • @thewitchidolsachika6682
      @thewitchidolsachika6682 5 หลายเดือนก่อน +1

      The exploit is fixed. The trolling can only happen if something like this is leaked again.

    • @Pengal25
      @Pengal25 5 หลายเดือนก่อน +11

      @@thewitchidolsachika6682 rules of the universe: 1. Trolling will happen 2. If the trolling is stopped, it can happen again

    • @nwerd7584
      @nwerd7584 5 หลายเดือนก่อน

      @@thewitchidolsachika6682 in discord the only updates shown in the video is they moved around the roles, theoretically if someones already in they could change it back. Unless NTTS didn't show what was further changed.

  • @Mutraxation
    @Mutraxation 5 หลายเดือนก่อน +1

    another good reason to not make dashboards :D
    but fr whenever i got time to publish my bot, its just gonna be command-setting up cuz no clue how to make actual dashboards for setting stuff up

    • @WindowsDaily
      @WindowsDaily 5 หลายเดือนก่อน

      Making dashboards is fine, in this case the developer just made a way to give himself access to any server, but server side he didn't check if it was him, which was the problem here.

  • @boxYT1
    @boxYT1 5 หลายเดือนก่อน +1

    just imagine this man going to his villain arc, it won't be pretty...

  • @lightning_11
    @lightning_11 5 หลายเดือนก่อน +3

    Why does everyone do authentication _client side?!_ Like, seriously, that's the oldest mistake in the book!

  • @17ashishemmanuel
    @17ashishemmanuel 5 หลายเดือนก่อน +6

    It's pronounced as VIEW NOT VUUUU I'M DYING

  • @techwhipped
    @techwhipped 5 หลายเดือนก่อน +2

    This also brings to to the question how many other captcha bots are affected by this same exploit.

    • @_tr11
      @_tr11 5 หลายเดือนก่อน

      it's something very well-known, i think this bot's dev is just dumb

    • @erikkonstas
      @erikkonstas 5 หลายเดือนก่อน +1

      I'm sure you can find another one in the channel... 😂

  • @Khibanyan
    @Khibanyan 5 หลายเดือนก่อน

    Hey whats the dev tools u used at the start of the video? it looks cool I would like to have it pls

  • @SheIITear
    @SheIITear 5 หลายเดือนก่อน +3

    To anyone wondering, similar bots exist on whatsapp too. Those bots have a lot more serious vulnerabilities tho (i.e RCE on host machine).

    • @_tr11
      @_tr11 5 หลายเดือนก่อน

      I use WhatsApp, and I think it doesn't have bots unless you are a business and verify it

    • @SheIITear
      @SheIITear 5 หลายเดือนก่อน

      @@_tr11 unofficial libraries exists.

  • @ILoveland7
    @ILoveland7 หลายเดือนก่อน +18

    Me not understanding anything:🗿
    Edit: the most likes ive ever gotten is 11 and its this comment

    • @ilovemywhiteshoes
      @ilovemywhiteshoes หลายเดือนก่อน +1

      it makes no sense if you’re not a person who programs. like me.

  • @InkChara
    @InkChara 5 หลายเดือนก่อน +1

    never wished to be a time traveler so badly until now

  • @nero3700
    @nero3700 5 หลายเดือนก่อน

    Damn, that's a real bad one. There must be other giant holes in this dev's projects...
    Understandable for a "got-out-of-hand" FOSS project, less so for a commercial product with paying users.

  • @codeguy11
    @codeguy11 5 หลายเดือนก่อน +15

    1:52 OMFG He pronounced "Vue" incorrectly, as a web developer I'M OFFENDED 😭😭

    • @release9025
      @release9025 5 หลายเดือนก่อน +1

      View

  • @tagKnife
    @tagKnife 5 หลายเดือนก่อน +5

    As a Developer, hacker, consultant.
    You would be suprised at how many of these APIs are vulnrable to this exact issue. To many developers think that frontend verification is secure. Completely ignoring anyone could send requests directly to the API.
    And tbh, 99% of these issues come from Javascript developers. They have no idea about secure backend programming.
    Discord had the exact same vulnrability in their APIs, last year people discovered a new API for model popups, it was completely undocumented and wasnt supposed to be public, but even discord doesnt put propper authentication on their APIs.

    • @Sammysapphira
      @Sammysapphira 5 หลายเดือนก่อน

      It's certainly a js issue. Tons of js frameworks bake back end into the front end like react and nextjs. There's a level of abstraction that non system engineers can't really understand because they think they're writing back end code but it's actually running on the client. It's like giving them a notepad with all your passwords to everyone who visits your website.

  • @ErrorAnimator687
    @ErrorAnimator687 5 หลายเดือนก่อน +2

    "But when i told the owner he said obby sussy mama"

  • @md.riyasathossain590
    @md.riyasathossain590 5 หลายเดือนก่อน +1

    Bruh, you can definitely protect Vue routes in other ways! And also there should always be an API level securities e.g. protected endpoints based on roles, not by user ID even! Anyways, we need more ethical volunteers to check for stupid vulnerabilities like this... All developers are human beings, they can definitely make mistakes, it's not a thing to feel shy about. Therefore, let's put our hands together to fight the criminals who actually takes advantage of these mistakes... Thanks to NTTS for this awareness video!

    • @sattlerdevelopment
      @sattlerdevelopment 5 หลายเดือนก่อน +1

      I wouldnt do it by role ids since someone could exploid the support server and give itself the roles or any other way I would always do it by user ids

    • @md.riyasathossain590
      @md.riyasathossain590 4 หลายเดือนก่อน

      @@sattlerdevelopment Yes, truly it can be a secure option if you can sanitize website's input cases. Even with user ID, you can add better defences for this kind of XSS attacks. You can add some sort of Server authentications and stuffs (as I noticed the website only authorised the "hacker" by what it sees from the browser's perspective, meaning it's an exploit that can completely be done from the frontend). You can also add Public IP address checking (i think) to notify the developer that an unknown device is trying to connect to the admin portal...or smth like that idk. Either way, there are a lots of measures you can take. (Thanks for the callback, I just didn't think of that exploit.)

  • @gorilla8275
    @gorilla8275 หลายเดือนก่อน +7

    Hi (make this famous)

  • @EchoTheBat.
    @EchoTheBat. 5 หลายเดือนก่อน +1

    Let’s hope there is a Batman out there just incase NTTS turns into evil superman with this someday

  • @YourLocal_AverageViewer
    @YourLocal_AverageViewer 27 วันที่ผ่านมา +1

    Bro has the power in his own hand and shared it

  • @ttayg
    @ttayg 5 หลายเดือนก่อน +1

    funny how i see the ad of a nuking bot before this video 💀

  • @xvirtualgamer8468
    @xvirtualgamer8468 5 หลายเดือนก่อน

    the funny thing is the ad before this video (for me) was the advertise for a discord nuking bot lol

    • @erikkonstas
      @erikkonstas 5 หลายเดือนก่อน

      And here we, yet again, enter the topic of TH-cam literally letting anything that smells like money slide...

  • @asdat3582
    @asdat3582 3 หลายเดือนก่อน

    I dont really get how you got all the source code. AFAIK for example with flask the client (browser) only gets some js that is needed to run the ui properly, but the stuff like shown there (actually using the request variable) would never be sent to the client.

  • @roulette22221
    @roulette22221 5 หลายเดือนก่อน +2

    its so funny that he puts so little protection into the bots security

  • @daiymohermitaurenjoyer9160
    @daiymohermitaurenjoyer9160 หลายเดือนก่อน

    When I saw the title, I thought NTTS was going through like a villain arc

  • @missingprofile
    @missingprofile 5 หลายเดือนก่อน +1

    What is the browser you used in the video? The console window is very good.

    • @missingprofile
      @missingprofile 5 หลายเดือนก่อน +1

      ohh ok I found it Firefox Browser Developer Edition

    • @cezarc1345
      @cezarc1345 5 หลายเดือนก่อน

      i found your profile, it saying This Profile Couldn't Be Found but i found it@@missingprofile

  • @retrogamerfoxxie
    @retrogamerfoxxie 5 หลายเดือนก่อน +1

    Eva seems to be really good when it comes to Discord. Seems to be in a lot of vids now

  • @halladba101
    @halladba101 หลายเดือนก่อน

    The "I'm projecting" at the end killed me 😂

  • @Funtime3Freddy3
    @Funtime3Freddy3 5 หลายเดือนก่อน +1

    The only solution in my opinion, is making a private owner panel and move the api /guilded there. The owner panel and it's api endpoint will be connected to the database locally and they could add a login check with the owner's discord account. Trust me, I've done this for a website I own and it's a very good security. Like, who'll try to come at your house, try to guess your pc's password/pin or whatever you have, find the hidden owner panel and try to get in with your discord account?

    • @justind4615
      @justind4615 5 หลายเดือนก่อน +1

      ? just store verification check code in back-end (server-side)

    • @erikkonstas
      @erikkonstas 5 หลายเดือนก่อน

      I think you meant "/debug", not "/guilded", but a simple auth flow ought to be enough (what we saw in the video was Dark putting it "where nobody will go looking for it", a "very good" "alternative"!!! 😂).

  • @EnBunk
    @EnBunk 5 หลายเดือนก่อน +1

    A naked man fears no pickpocket.

  • @rebok232
    @rebok232 5 หลายเดือนก่อน +1

    that's why putting the authorization and query logic in client is bad. You need to do stuff server side. Never allow the client to send you the authorization data, if it's not a secret like authorization token, the user can fake the globally available data that you require the client to provide, and when you use this data to control user permissions then probably nothing will happen. But you shouldn't trust any user, some people don't want to be any good to you.

  • @Cobb
    @Cobb 26 วันที่ผ่านมา

    The other move would be to capture your request to access that page and change your user ID to the one listed in the code.

  • @Teslazer
    @Teslazer 5 หลายเดือนก่อน +2

    Waiting for the new video about the discord mobile update 😁

  • @metalspoon69
    @metalspoon69 5 หลายเดือนก่อน

    This is like multiple cardinal sins:
    1: pushing debug tools to production
    2: CLIENT SIDE VERIFICATION (????)
    3: UNPROTECTED ENDPOINT (????????????)

  • @BentiePentie
    @BentiePentie 5 หลายเดือนก่อน +1

    how do your dev tools look like that?

  • @GarbageManThe4th
    @GarbageManThe4th 5 หลายเดือนก่อน +1

    The reversed speech at 0:05 is "Among us sussy balls".

  • @melsbacksfriend
    @melsbacksfriend 5 หลายเดือนก่อน

    Since auto moderation is something that technology isn't really ready for yet, you should do this to AltDentifier next.

  • @Swankster9000
    @Swankster9000 5 หลายเดือนก่อน +2

    As the saying goes, no good deed goes unpunished.

  • @ris_kis
    @ris_kis 5 หลายเดือนก่อน

    When you get tired from telling people how to defend themselves from scams, you become a hacker.

  • @leafofyume7838
    @leafofyume7838 5 หลายเดือนก่อน +1

    and this is why i dont like that everyone can make a security bot and get 400k servers just because the bot works. most of these servers wont search for vulnerabilities

  • @FrederichPedersen
    @FrederichPedersen 5 หลายเดือนก่อน

    There is a way hackers use to destroy the service if they don't get paid for the vulnerability, simply find more than 1, and only show the 1, then if they don't respond/don't pay you money for being nice. Simply destroy the whole service