Missing HTTP Security Headers - Bug Bounty Tips

Поделиться
HTML-код
  • Опубликовано: 21 авг 2024

Комментарии • 170

  • @lukor-tech
    @lukor-tech 2 года назад +234

    You know what I absolutely love?
    The sheer idea, that he can sit at home, with a shirt that wasn't ironed for the google video. I am not saying he didn't try - it's just the audience more focused on the content than the creator.
    I don't know how many will share the thought with me, but here it is.
    Good stuff.

    • @laja6108
      @laja6108 2 года назад +1

      True, we live in amazing times

    • @Menaceirl
      @Menaceirl 2 года назад +28

      I think a large part, if not the vast majority of the audience this video is intended for are likely sitting at home wearing a shirt that was not ironed.

    • @lukor-tech
      @lukor-tech 2 года назад +2

      @@Menaceirl ha!
      I didn't even had one!

    • @RaduStancaOnline
      @RaduStancaOnline 2 года назад +1

      This is the curse of being familiar with the content(aka being 1337 h4ck3r), you start to notice things that generaly you would and that would make the video a little bit better.

    • @Zedoy
      @Zedoy 2 года назад +1

      didn't even notice wow

  • @saadmgdm706
    @saadmgdm706 2 года назад +80

    Nothing makes me more happier than seeing this guy.

    • @JimTheScientist
      @JimTheScientist 2 года назад

      same :D

    • @LeonardoNicchio
      @LeonardoNicchio Год назад

      @@JimTheScientist
      Tô aqui na casa dele e vou ficar com o cara do carro e ele me disse que vai ser um

  • @Root-uno6nw
    @Root-uno6nw 2 года назад +104

    Finally some browser security; this is the stuff that really needs to be taught, it’s practical and real world content. Keep these kind of videos up man.

    • @SirKrazzy
      @SirKrazzy 2 года назад

      Totally agree bro Ahaha nice seeing you here

    • @Root-uno6nw
      @Root-uno6nw 2 года назад

      ​@@SirKrazzy This is epic, good to see you here too bro!!

  • @gFamWeb
    @gFamWeb 2 года назад +43

    This seems to really boil down to: "if you can't accurately and specifically articulate how something can be exploited, it's likely not actually vulnerable"

    • @TimLF
      @TimLF 2 года назад +18

      "POC or GTFO"

  • @phillawrence9741
    @phillawrence9741 2 года назад +27

    Missing security headers are usually out scope on bug bounties program. Nice presentation is worth demonstrating.

  • @TheJobCompany
    @TheJobCompany 2 года назад +39

    here's my typo bounty submission: at 5:55 in the English subtitles there's a typo - it says "doens't" instead of "doesn't"

    • @LiveOverflow
      @LiveOverflow  2 года назад +33

      what's your paypal so I can send you your bounty?

    • @TheJobCompany
      @TheJobCompany 2 года назад +28

      @@LiveOverflow oh, no, thanks, but I only except payments in high quality cybersecurity videos, if that's cool.. so yea, I'm gonna be needing a couple of these instead, ty

    • @bugr33d0_hunter8
      @bugr33d0_hunter8 2 года назад

      @@TheJobCompany yeah apps these days are never getting it right. Same with speech recognition, its going to get me locked up one day for printing out the wrong words.

  • @harshrathod2237
    @harshrathod2237 2 года назад +7

    This is really crucial to understand that absence of a particular header doesn't mean the web application is vulnerable. Instead one should try to figure out how the absence of that header impacts the application in general or maybe chain that impact to find a realistic security flaw.

  • @makezi7
    @makezi7 4 месяца назад

    Thank you for sharing this informative content. It's interesting to note how the previous Systems Administrator at my workplace was strongly in favor of implementing HTTP Strict Transport Security (HSTS) and advocated for team members to obtain Security+ certification. Unfortunately, his misconfigured setup contributed to some security issues, highlighting that HSTS isn't always a critical requirement for website security. This situation underscores the impact of knowledge gaps and how they can lead to misplaced pressures within teams. Additionally, thank you for sharing the RUclips video-it provided valuable insights, even though it was originally shared on Google. We truly appreciate it.

  • @HD_Heresy
    @HD_Heresy 2 года назад

    I'm new to Cyber Security and have been denying third party application access based on bad results from HTTP header scans, this video has helped me so much thank you!!!

  • @jesslopez2494
    @jesslopez2494 2 года назад

    Honestly, in the stratus of people out there being "Security Content Creators" L.O. has always come across as a passionate hacker. Even when advertising something, not trying to sell it.
    I appreciate that you aren't a grifter man, because there are plenty in this field.

  • @sayamqazi
    @sayamqazi 2 года назад +3

    5:33 This is exactly what I was trying to explain to a client that if a 3rd party npm module is being used in a static client size electron app the vulnerabilities reported by npm have ZERO impact because those only apply if the module is being using to process a user provided input in a route handler in a server app.

  • @elevatecyber5031
    @elevatecyber5031 2 года назад

    Very thought-provoking video! No one else is talking about this.

  • @benjaminnewman3833
    @benjaminnewman3833 2 года назад +3

    Vulnerability scanners are brilliant at what they do and its just that, they give you a static output without providing any context, they cut out all the manual crap you have to go through to assess a web apps/infra vulnerabilities. But people seem to use them as gospel when in fact they should be used to determine the posture of that thing you are scanning. If the output you receive shows a bunch of critical and high ratings then it's probably best to either get an actual pen test conducted or you need to start looking at who is developing and either assess their capability at protecting your data or up-lifting sending them on training courses. Too many orgs I go to and consult for just blindly think because they have Qualys or a similar DAST tool that they have "really good security," when in fact they don't understand what the tool is actually trying to show

  • @SeMoDrix
    @SeMoDrix 2 года назад

    I never knew why i had hsts set up, just did it because it was good practice but never knew how it worked… very informational video, even if it was just for google!

  • @7guitarlover
    @7guitarlover 2 года назад

    This is surely one of my favorite Channel on youtube !!!!

  • @ashvinbhuttoo
    @ashvinbhuttoo 2 года назад

    Web dev here, i actually learned something, great content👌

  • @chiragartani
    @chiragartani 2 года назад +4

    Trust me nowadays people are more interested in this kind of videos I mean bug bounty niche, instead of Buffer Overflow or binary exploitation things. I mean this is what people can easily learn and earn through it.
    Your last Apisix video was amazing too.
    Keep it up, Great video. 👏🌟
    Thank you!

  • @realslimchaggy
    @realslimchaggy 2 года назад

    I recommand subscribing to bug bounty reports explained for the best bug bounty knowledge

  • @pentestical8265
    @pentestical8265 2 года назад +3

    Great video as always, but I think one thing could be slightly incorrect. Sometimes (at least the last time I checked) authorization headers are automatically submitted by the browser. HTTP Basic Authentication credentials are cached so you don't need to fill out the prompt every time you visit a new page. A CORS misconfiguration in this case could allow data from a user authenticated with basic with to have data stolen. I think the same also applies to client certificate based auth, but I've never tested this one myself.

  • @mohitjaswal7657
    @mohitjaswal7657 Год назад

    Amazing video. Please keep posting such real life examples of how to assess these reports generated by pen testing automation tools!!

  • @000t9
    @000t9 2 года назад +2

    Love your videos! So much informative!

  • @brymko
    @brymko 2 года назад +1

    ayyyy nice to see that you also still have the offcon covid wristband on your wrist :P

  • @ReposHaug
    @ReposHaug 2 года назад +2

    To be fair if we only applied CSP to sites with a known existing XSS, that would be a solid way to broadcast a known issue on your site :)

  • @tech3425
    @tech3425 Год назад +1

    In other words "You don't have to lock your door if there's nothing valuable inside the house"

  • @ca7986
    @ca7986 2 года назад +1

    What an amazing explanation

  • @The-solo
    @The-solo 2 года назад

    As always the video is so Informative. I'm a beginner and I'm about to start my bug bounty journey. I must say it helped me a lot.

  • @dan-garden
    @dan-garden 2 года назад

    lookin more like John by the day my dood, keep it up

  • @leok6717
    @leok6717 Год назад +1

    Great video!!

  • @anilrp112
    @anilrp112 Год назад

    Atleast you said it!! So happy

  • @kamande_john
    @kamande_john 10 месяцев назад

    Great insights. Thank you !

  • @oldGoatMilk
    @oldGoatMilk 2 года назад

    Great video! I'm going to watch it again, a lot of good information.

  • @OmegaZ2
    @OmegaZ2 2 года назад

    Very informational video, thank you as always for the nice content!!

  • @mistercyber1848
    @mistercyber1848 2 года назад +1

    love your videos

  • @renakunisaki
    @renakunisaki 2 года назад +2

    You need to proofread your captions. The tags got eaten, and at one point there's a todo note.

  • @ThisIsTheInternet
    @ThisIsTheInternet 2 года назад +2

    English CC @ 8:08 "[todo checj recording]", just FYI

  • @manuelfrosi2799
    @manuelfrosi2799 Год назад +1

    Great video, i would have liked that the cache header was also explained

  • @git-tauseef
    @git-tauseef 2 года назад

    What an explanation 🙌

  • @PaulFisher
    @PaulFisher 2 года назад

    In order to make the transition truly seamless you should have also ripped off your festival wristband. What an oversight!

  • @hernanduran4142
    @hernanduran4142 2 года назад +2

    I constantly have to deal with customer pentest reports stating I have a vulnerability because I don’t have HTTPOnly on cookies that are clearly non-sensitive.

  • @RoterFruchtZwerg
    @RoterFruchtZwerg 2 года назад +8

    While I do agree with most, I think with HSTS you missed some important points.
    You kinda made it look like HSTS is not really important and sites that use https are fine not setting it. But here I disagree. Setting HSTS is important. We can argue if it's bug bounty level important though...
    First of all, "Browsers do it anyways" is not correct. Browsers will access the site via http if you tell them to. Your experiment was kinda misleading. Your proxy log didn't show a second http request because the browser served the redirect from its cache, not because it prefers https in any way. (devtools will show you it still does an http request)
    The cache can simply be circumvented by adding query parameters or simply requesting an URL you didn't load before. HSTS works for the complete domain (and subdomains!) and is kept even if you clear the cache, while your example of "browser does it anyways" relies on the browser cache, caching headers, correct redirect type and only works for resources you already visited explicitly (exact URL).
    Also, as you stated, HSTS preload exists. While HSTS kinda requires TOFU (Trust on first use), HSTS preload does not. But even without preload, HSTS does a good job for sites that are frequently used by users (e.g. all sites with logins etc).
    Not setting HSTS leaves your site open to MITM attacks (which are not uncommon on open wifis etc), while setting it does a good job in preventing them.
    And in case someone tries to MITM an https request, it will also prevent the user from ignoring the warning and clicking "visit anyways" which probably some would do otherwise.
    So while some security headers really have no benefit at all in some cases, HSTS always increases security.

    • @shinjihirako8598
      @shinjihirako8598 2 года назад +1

      excellent points !

    • @_clavita
      @_clavita 2 года назад

      thanks! so much learning today :P

    • @effsixteenblock50
      @effsixteenblock50 2 года назад

      You can enforce HTTPS server-side.

    • @RoterFruchtZwerg
      @RoterFruchtZwerg 2 года назад +1

      @@effsixteenblock50 you cannot. As long as the client accepts http a MITM can proxy http to https. Only the client can enforce https and that's why HSTS is important.

    • @effsixteenblock50
      @effsixteenblock50 2 года назад

      @@RoterFruchtZwerg You're talking about proxying with a tool such as Burp with an installed cert? I know some try to enforce SSL with javascript (a joke - I've had crappy shared hosting providers recommend it). Or are you saying even if SSL is enforced server-side, the client can force a downgrade to http?

  • @TimLF
    @TimLF 2 года назад

    Just feeding the algorithm here.

  • @JuanBotes
    @JuanBotes 2 года назад

    Thank you for sharing your knowledge and clear explanations \o/

  • @OthmanAlikhan
    @OthmanAlikhan 10 месяцев назад

    Thanks for the video =)

  • @Ormaaj
    @Ormaaj 2 года назад +2

    Yep all good stuff. High-level application level stuff obviously. A ton of that (HSTS, OCSP stapling, HPKP) is largely kludge to mitigate SNI and (much later) ECH coming along far too late with far to much legacy baggage to fully deploy. So we pushed a bunch of workarounds up to the application layer and hope that all of them together are enough to cover our asses long enough for the legacy to become irrelevant.
    Yep this all requires context and it's always complicated context. CORS also makes a bit more sense if you know it historically came around in part as a means of permitting cross-site websocket access (it's a prerequisite really). Both partly a response to uglier "AJAX" type hacks that were required before there was any other means of "inter-tab" communication, that nobody needs to care about anymore.

  • @_clavita
    @_clavita 2 года назад

    i work in a mobile app (that doesnt use webview) and we had a dude reporting to us that we were missing the HSTS, x-frame-options, and others headers that we didnt need!!!! thanks to him we had to delay the production date and it endend ofc being a false positive -_-

  • @umar7110
    @umar7110 2 года назад +1

    Great ❤️❤️

  • @887310954
    @887310954 2 года назад

    one of the most under estimated security issues, which actually can help a lot

  • @gk_eth
    @gk_eth 2 года назад

    Woww!! Simply loved the quality of the content in this video! looking forward for much more quality content from you ..✌️✌️

  • @charlie5tanley
    @charlie5tanley 2 года назад

    excellent content. thank you.

  • @rivhaaken9763
    @rivhaaken9763 2 года назад

    Love it !

  • @andyelgangster5320
    @andyelgangster5320 2 года назад

    Very informative 😎

  • @lakshanperera9735
    @lakshanperera9735 2 года назад

    thank you this video

  • @cadeathtv
    @cadeathtv 2 года назад

    hope VA tool guys understand this, they should not be scaring people because of a VA results without understanding

  • @mattsionkowski
    @mattsionkowski 2 года назад

    I found a lack of X-Frame-Options tag and thought I conquered the world. It took tens of hours before I could turn it into anything usable...

  • @chizzlemo3094
    @chizzlemo3094 2 года назад

    Great video

  • @qm3ster
    @qm3ster 2 года назад +2

    Is there a reason not to set "Secure" and "HttpOnly" on all my cookies?

  • @jan_en_ik
    @jan_en_ik 2 года назад +2

    Are you going to make a video about the mc server research?

    • @LiveOverflow
      @LiveOverflow  2 года назад +1

      Yes, of course. But it will be a few weeks/months

    • @jan_en_ik
      @jan_en_ik 2 года назад

      I was also interested why a java object was logged while a normal leave message just logs the name.

    • @LiveOverflow
      @LiveOverflow  2 года назад

      Mh I don’t know what exactly you mean. If you send me an email with your question I will check it out :)

    • @Root-uno6nw
      @Root-uno6nw 2 года назад +1

      @@LiveOverflow I think he means the logj4 vulnerability

  • @git-tauseef
    @git-tauseef 2 года назад

    We would love to have a more systematic video uploads like a series about CTF what you do how you studied ,good resources , just started with picoCTF but unable to solve many crypto , binary like things ....
    Reply much appreciated ❣️❣️ thanks

  • @sobertillnoon
    @sobertillnoon 2 года назад

    Is this your first time having glasses? I think the ones you chose are nice looking.

  • @talalkalai8748
    @talalkalai8748 2 года назад

    what would u recommend as the best resource for structured learning all the headers you mentioned, and in-depth http in general ? (something like your THE BEST ON THE INTERNET, HANDS DOWN binary playlist. (am aware of your web hacking playlist))

  • @allslash7540
    @allslash7540 Год назад +1

    Is there any security vulnerability for server if it exposes the content disposition header?

  • @yy6u
    @yy6u 2 года назад +1

    lol the quality difference, its almost as you can tell it been filmed months before :)

  • @soniablanche5672
    @soniablanche5672 2 года назад

    img and form tags ignore CORS policy for backward compatibility I'm assuming ?

  • @Amd107
    @Amd107 7 месяцев назад

    Nice

  • @Valery0p5
    @Valery0p5 2 года назад

    The thumbnail xD

  • @TheKinGG0ld
    @TheKinGG0ld 2 года назад

    Yay!

  • @cuty5372
    @cuty5372 2 года назад

    Once you try to deploy an API-Endpoint, you know to hate those headers... Wait, the frontend code that talks to my api works, bit only on Firefox? Because Chrome acts slightly differently with no CORS headers set? Just plain annoying.

  • @el7440
    @el7440 2 года назад

    its all about the context baybee

  • @dummyevil7638
    @dummyevil7638 2 года назад

    You have changed.

  • @arm2644
    @arm2644 2 года назад

    Can you please talk about the Expect-CT security header and how it is set right! I cannot find any true worthy information of this header and how it is set right in apache servers!

  • @ocean3323
    @ocean3323 2 года назад

    F for old MDN theme

  • @shaheenfazim
    @shaheenfazim 2 года назад

    Is password input vulnerable to clickjacking considered a vulnerability by Google.

  • @eschoepis
    @eschoepis 2 года назад

    1-2 year im, I am already hearing google's product mgmt opinion in the intro

  • @angeloanan
    @angeloanan 2 года назад +1

    Subtitle broke at 8:08 :

  • @KuopassaTv
    @KuopassaTv 2 года назад

    Also such headers can be per page, not site-wide 😉

  • @bjorndunderbeck
    @bjorndunderbeck 2 года назад

    a non related question buut you guys might be able to help me?? my mum in hospital post stroke has wrongly entered her pin to open her ipad so now it is so locked it doesnt even appear when I plug it into her pc. I get how it is supposed to protect a stolen ipad being accessed but I dont understand why her laptop cant talk to it. any ideas on how to get to the pin input stage again? at the moment its just an expensive coaster. oh I know the pin but theres no way to talk to the ipad, it turns on and thats it.

  • @x3ICEx
    @x3ICEx 2 года назад +1

    8:08 [todo checj recording]

  • @alvionjames5925
    @alvionjames5925 2 года назад

    Hello can you please do a video about http smuggling request 🙏🙏

  • @Thiago1337
    @Thiago1337 2 года назад

    I like your shirt, where did you buy it?

  • @oedebiri
    @oedebiri 2 года назад +1

    enough people do this that google paid to commission a video discouraging them

  • @hashimmirdad8678
    @hashimmirdad8678 2 года назад

    what is the exact difference between ( HSTS, secure attribute)?

    • @huntit4578
      @huntit4578 2 года назад +1

      4
      This strategy protects against passive eavesdropping by making it hard for an attacker to trick your user into using something other than SSL to access your site. It also probably ensures that any bookmarks users store will point to the https URLs, which is good. However, HSTS still offers advantages in the event of a man-in-the-middle attack.
      The core of the problem that HSTS tries to solve is that the browser doesn't know whether a given site should be using SSL or not. And most users don't explicitly try SSL first; if they type in a URL, they generally go to the non-SSL http site first, and usually they're just following links. If an attacker can trick your user into going to your site via an http URL and can sit in the middle of the user's traffic (by being their wireless AP, for example), that attacker can launch a man-in-the-middle attack against your site by proxying the user's traffic to your site and presenting the site to the user without SSL (this is a type of downgrade attack). Since the user won't see SSL, their browser won't recognize that the attacker doesn't have a valid certificate for your site and that they're not connecting to your site directly. (A more complicated approach would be to intercept the SSL traffic and present a self-signed or otherwise invalid certificate for your site, but this will normally result in browser warnings.)
      In this scenario, redirecting non-SSL users to SSL or setting the secure flag on cookies doesn't actually help you very much. The man-in-the-middle attacker will be connecting to your SSL site (and proxying the user's actions to it), and will just remove the secure flag from your cookies when passing them along to the user.
      The attacker can, of course, also remove the HSTS header. The point of the HSTS protocol, however, is that if the user had ever successfully gone directly to your site in the past, their browser will remember that your site sent HSTS. If they then later connect to your site and find that it's not using SSL or that the browser can't verify the certificate, the browser will throw an error and refuse to continue. This will prevent the attacker from downgrading your site to non-SSL if the browser supports HSTS and has your site recorded as requiring SSL.

  • @takeshikovacs667
    @takeshikovacs667 2 года назад +4

    Missing HTTP Security Headers is out of scope 99% of Bug Bounty Programs. It's more a thing about penetration testing reported as good practice information depending of the context. But yeah I agree that many HTTP headers are useless like the X-XSS-Protection (because not implemented in any browser) while some are useful like HSTS or CSP.
    Yeah if there is an XSS and there is HTTPOnly flag you can still then an XHR but you can't leak the cookie. So if the attacker has only a reflected XSS and not a stored one he will have a far less permanent access.
    PS: I know the title is just for clickbait

    • @LiveOverflow
      @LiveOverflow  2 года назад +5

      yeah it's out of scope, and still there are many reports about it. So this video hopefully helps those people understand why it's usually not rewarded ;)
      But what's clickbait about the title? The video is about HTTP Security Headers. That's literally the most accurate boring title lol

    • @takeshikovacs667
      @takeshikovacs667 2 года назад +1

      @@LiveOverflow I found the "Bug Bounty Tips" clickbaity. Lot of vloger use the word "bug bounty" as a shiny word when it's only general security not specific to bug bounty. The title could have been "HTTP Security Headers real impact" or "HTTP Security Headers - What not to report on Bug Bounty" if you really wanted to use the term "bug bounty". But as I said it is always out of scope of bug bounty so putting it in the title is weird, the title could have been "HTTP Security Headers - Pentest tips" and just saying a parenthesis : HTTP Security Headers are out of scope of BB programs 99% of the time so we'll focus on pentest. But nowaday "bug bounty" is such a trendy word where youg people think they can become rich with it that youtuber use it for every infosec video to get more clicks.

    • @reduced1420
      @reduced1420 2 года назад +3

      bro the video was literally made for google to give tips to people using their bug bounty program, shut up lmaoo

  • @mikeyz8775
    @mikeyz8775 2 года назад

    The line is discussing n theory is a crime

  • @ahmedsaadsabit1749
    @ahmedsaadsabit1749 2 года назад

    First comment yes

  • @fnzip
    @fnzip 2 года назад

    where's the penguin?

  • @the_hanged_clown
    @the_hanged_clown 2 года назад

    2:36 wait....youtube isn't google's website?

  • @ari_archer
    @ari_archer 2 года назад

    good soup

  • @ELYESSS
    @ELYESSS 2 года назад

    Should've also changed shirt

  • @AtomicBl453
    @AtomicBl453 2 года назад

    They don't pay for intentional dev flaws

  • @NorbertdeRooy
    @NorbertdeRooy 2 года назад

    I really dislike the HSTS header, I mean why is it a header and not a DNS record, it would be so much simpler and we could disable http all together if it was simply a DNS record.

  • @ninostephen
    @ninostephen 2 года назад

    I'm going to post this in our Vulnerability Management Team group. I hate it when they make us report petty header issues without checking the context. I might get kicked for it. But fuck it. - _ -

  • @Ormaaj
    @Ormaaj 2 года назад +1

    Google has skilled hackers? This is a genuine surprise.

  • @myzel394
    @myzel394 2 года назад

    13:53 yeah then when should you use HttpOnly? You basically said that the flag is completely useless.

  • @tommasobarbolani2147
    @tommasobarbolani2147 5 месяцев назад

    but of * cors *

  • @AmgadEmad
    @AmgadEmad 2 года назад

    All this information is mistaken and not technical gaps and for this reason, this is not considered within the bug buny HANTING system, which is presented by Google

  • @aviationbutterr
    @aviationbutterr Год назад

    🏈🏈🏈🏈🏈🏈

  • @GoBzi
    @GoBzi 2 года назад

    Cookie missing secure flag, server has only 443 open

    • @nullvoidpointer
      @nullvoidpointer 2 года назад +1

      MiTM.

    • @mmmdyarcavadl9004
      @mmmdyarcavadl9004 2 года назад

      @@nullvoidpointer is it possible mitm when you are in different network? I mean mitm to public ip

  • @georgehammond867
    @georgehammond867 2 года назад

    somebody is uploading buggy ubuntu 20.04 on my pc al the time, this comes from Ubuntu HQ.
    kernel version 5.13.0-35-generic. very bad indeed.

  • @mnovagwati8744
    @mnovagwati8744 2 года назад

    Isai neshona

  • @a.k_theportal3085
    @a.k_theportal3085 2 года назад

    first