$50,000 0-day RCE on Apple bug bounty program

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ก.พ. 2025

ความคิดเห็น • 51

  • @BugBountyReportsExplained
    @BugBountyReportsExplained  3 ปีที่แล้ว +1

    Hi there ;) Thanks for watching and welcome to the comment section!
    Sign up here and get the best hacking info delivered right to your inbox: mailing.bugbountyexplained.com/

  • @keent
    @keent 3 ปีที่แล้ว +7

    I’m not a hacker nor a security researcher but just $50,000 for a zero day exploit is so cheap coming from Apple.

    • @henrypowell3496
      @henrypowell3496 3 ปีที่แล้ว +2

      like you said you are neither hacker nor security researcher so that's why you don't know how miser Apple is when it comes to bug bounties 😂😅

  • @jpierce2l33t
    @jpierce2l33t 3 ปีที่แล้ว +1

    Dude, I *just* read a writeup of this earlier today. Awesome you made a video about it, it truly did help me understand it more! Great explanations!

  • @-bubby9633
    @-bubby9633 3 ปีที่แล้ว +1

    Another great video! Extremely well explained as always. Really shows the importance of fully getting to know any frameworks/services used on your target

  • @renganathanofficial
    @renganathanofficial 3 ปีที่แล้ว +2

    Amazing explanation 🔥

  • @Hyps3106
    @Hyps3106 3 ปีที่แล้ว +1

    Thanks for Clear explanation

  • @moleIntelligence2616
    @moleIntelligence2616 10 หลายเดือนก่อน

    I have analyzed these RCE vulnerabilities in Lucee and I think they are not so hard to understand and found, but what I wonder more is how these guys identify Apple using Lucee and there is Mura/Masa CMS deployed on top of Lucee by Apple, and it’s more important for me, so do you have any ideas about it?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  10 หลายเดือนก่อน

      They just encountered a host in Apple's domain and then identifying an open-source CMS used is easy. The software name will usually be in an HTTP header or an HTML body.

    • @moleIntelligence2616
      @moleIntelligence2616 10 หลายเดือนก่อน

      @@BugBountyReportsExplained All right. but now, maybe Apple has harden those websites for security, I try to find some Lucee related fingerprint from those websites but nothing.

  • @ahmadshami5847
    @ahmadshami5847 3 ปีที่แล้ว +1

    as always great video with absolutely mind blowing researches 👌. but I have a question, a lot of the webapp bugs that you share seem to use a lot of uncommon protocols, uncommon files and extensions that are generally not discussed pretty often. so is there resources that combine those concepts that the hunters use or they just read through the documentations (which I believe takes a lot of time compared to how quickly they disclose the bugs)

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 ปีที่แล้ว

      Thanks. Regarding reading, I can only say for myself. I usually learn just in time, when I have a problem to solve. Worth noting that when you want to find a new bug, most of time spent for learning you learn something that will not work. Things that work are just a part.

    • @ahmadshami5847
      @ahmadshami5847 3 ปีที่แล้ว

      @@BugBountyReportsExplained oh so those hunters actually learn while they are investigating a potential bug. I my self did some penetration testing on a live web app and found some bugs and learned the bare metal stuff while exploiting them. But man those hunters sure look for the slightest details I guess 😅. Thanks man and keep giving us your amazing work 👌

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 ปีที่แล้ว +1

      @@ahmadshami5847 yeah, bounties are all about diving deep into the application while pentest is more about breadth

    • @ahmadshami5847
      @ahmadshami5847 3 ปีที่แล้ว

      @@BugBountyReportsExplained yup that's true. All I need is time I guess. thanks a lot man, keep up the great work 👌👌

  • @zTech300
    @zTech300 3 ปีที่แล้ว

    Thank you very much for your detailed explanation.

  • @acqua_exp6420
    @acqua_exp6420 3 ปีที่แล้ว

    You are the best my dude! ✌️

  • @dzakialthalsyah
    @dzakialthalsyah 3 ปีที่แล้ว

    Always watching your videos ❤

  • @randomguy3784
    @randomguy3784 3 ปีที่แล้ว

    Quality content! ❤️

  • @isiraadithya
    @isiraadithya 3 ปีที่แล้ว

    Let's Gooooo Nice 👌

  • @benjaminford4859
    @benjaminford4859 3 ปีที่แล้ว

    hey bro please. tell me how long the bug is reported, until you get paid ??

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 ปีที่แล้ว +1

      It's not written in this writeup but I think with Apple waiting a year for a payout is nothing extraordinary. Not the program you want to be on if you need the money in forseeable future

  • @oo7posam581
    @oo7posam581 3 ปีที่แล้ว +1

    Bro where to find that Codings which they found vulnerable????

    • @bangunwismoyo1294
      @bangunwismoyo1294 3 ปีที่แล้ว

      Use burpsuite pro

    • @oo7posam581
      @oo7posam581 3 ปีที่แล้ว

      @@bangunwismoyo1294 But i didn't found the Codings which they found Vulnerable.... I just revisited the site

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 ปีที่แล้ว

      @@oo7posam581 Im not sure what do you mean by "Codings"

    • @oo7posam581
      @oo7posam581 3 ปีที่แล้ว

      @@BugBountyReportsExplained Sir that Codings u displayed which were Vulnerable.... Where to find such Codings except Html one's

    • @mcvmedia2024
      @mcvmedia2024 3 ปีที่แล้ว

      I guess you are looking for this github.com/lucee/Lucee (thats the open-source lucee github repor) as explained in the video, the testers downloaded a copy of lucee and tested in the local instance. then they replayed those attacks on Apple server.
      Feel free to correct me if I am wrong :)

  • @krishanuchhabra
    @krishanuchhabra 3 ปีที่แล้ว

    Nicely explained.

  • @URKCS-kx3sf
    @URKCS-kx3sf 3 ปีที่แล้ว

    I'm beginners one dought how they hosted in localhost how they got code can u explain that love from india

    • @mikekitckchan
      @mikekitckchan 3 ปีที่แล้ว

      Because lucee is opensource. Everyone can download it and run in localhost.

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 ปีที่แล้ว +2

      As mentioned above, it's open source. Those screens from localhost were from me and I used these commands to host it:
      docker pull lucee/lucee:5.3.5.92-nginx
      docker run --rm --name lucee -p 8888:8888 lucee/lucee:5.3.5.92-nginx

  • @benjaminford4859
    @benjaminford4859 3 ปีที่แล้ว

    hmm I think it's really bad.. it's been two months but he still fix it.. ok thanks bro.

  • @sakyb7
    @sakyb7 3 ปีที่แล้ว

    Amazing ❤️‍🔥

  • @cybersecurity3523
    @cybersecurity3523 3 ปีที่แล้ว

    Good bro

  • @soaphornseuo8630
    @soaphornseuo8630 3 ปีที่แล้ว

    Great

  • @saranshsarafmr23r06
    @saranshsarafmr23r06 3 ปีที่แล้ว

    Sir can you please share some resources to us so we can grow our poor hunting🙏

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 ปีที่แล้ว

      What resources other than videos do you mean?

    • @saranshsarafmr23r06
      @saranshsarafmr23r06 3 ปีที่แล้ว

      @@BugBountyReportsExplained some books or posts with advanced ideologys and ways.
      You are right sir there is no better way other then videos, but in videos we just have to grab instructor's ideology and i want to develop mine, so if you can help it'll be great sir.

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 ปีที่แล้ว

      @@saranshsarafmr23r06 zseano has recently made his book about his methodology free. I didn't see it yet, but I watched a few of his videos and talks and I really liked them.

    • @saranshsarafmr23r06
      @saranshsarafmr23r06 3 ปีที่แล้ว

      @@BugBountyReportsExplained thank you sir

  • @0xgodson119
    @0xgodson119 3 ปีที่แล้ว

    bingo !!

  • @pmohan67
    @pmohan67 3 ปีที่แล้ว

    Hi bro
    What u prefer for beginner bug hunters how find bugs securely and easy understanding
    Make a video abt that
    And
    Make one more is
    I looking some of xss bug finding videos I didn't understanding
    So explain about
    How find xss bug
    Which tool is used
    And there types like
    1.Reflected
    2.stored
    3.dom
    P
    L
    S
    MAKE A VIDEO ABOUT THAT
    👆
    👆👆
    👆

    • @pmohan67
      @pmohan67 3 ปีที่แล้ว

      Hi bro take my req

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 ปีที่แล้ว +1

      your req is to cover all aspects of one of the most popular and complex class of vulnerabilities. Im gonna need 240 hour days for that

    • @pmohan67
      @pmohan67 3 ปีที่แล้ว

      @@BugBountyReportsExplained kk bro
      Kindly give me a safety instructions to beginner for finding bug
      Give some examples of
      simple bugs to achieve beginners goals
      Hlp me bro
      👆👆👆👆👆

  • @SrRunsis
    @SrRunsis 3 ปีที่แล้ว

    50k is joke! These guys should receive more than a million dollars