Adding infinite funds to your Steam wallet - $7,500 bug bounty report

Поделиться
HTML-код
  • Опубликовано: 21 дек 2024

Комментарии • 85

  • @windwest720
    @windwest720 3 года назад +51

    No one will report such a vuln for just $7500 on steam, Gabe Nice Job.

  • @hugohabicht6274
    @hugohabicht6274 3 года назад +27

    7.5k$ seems very low for this vulnerability.... That guy could have used it to generate millions, then bought csgo skins and could have cashed them out on a third party site into real money....

    • @ABEL85ky
      @ABEL85ky 3 года назад

      I was just thinking the same thing.
      A 7,500 dollar payout for a bug that could've costed steam millions.

    • @pinguluk1
      @pinguluk1 3 года назад

      He would have been sued for sure if he would have do that

  • @fedemolto
    @fedemolto 3 года назад +66

    Great video, i think US$7.500 is a cheap reward for the magnitude of the vulnerability.

    • @youcefkel4743
      @youcefkel4743 3 года назад +15

      exactly what i was thinking man . ppl got 30000$ for admin account takeover . how is this getting 7500 only ? steam is cheap as hell

    • @eggman2543
      @eggman2543 3 года назад +6

      They will learn , when someone sell the vulnerability in dark web for thousands of dollar

    • @soksamnang2150
      @soksamnang2150 3 года назад

      @@eggman2543 that when they get in to trouble do not mess in dark web if you think in long term

    • @rainsharpay4090
      @rainsharpay4090 3 года назад

      @@soksamnang2150 ss

    • @elnur0047
      @elnur0047 2 года назад +2

      this will hurt steam in a long run I think, dude only got 7500$ for an exploit that literally steals money, next one won't be reported

  • @Bleudog
    @Bleudog 2 года назад +2

    What a simple but brilliant approach. Great explanation.

  • @J0R1AN
    @J0R1AN 3 года назад +17

    Very interesting, but how did the researcher know that the hash was being generated by concatenating the parameters and values? You said steam was not open source, and you also wouldn't be able to test possibilities to see if the match because you don't have secret key

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +21

      Steam is not but some plugins to Smart2Pay are available on GitHub. For example, when preparing to this video, I was reading this project: github.com/Smart2Pay/opencart1564
      Funny thing I've noticed in this outdated one: github.com/Smart2Pay/magento
      Here, the hash was generated without any secret😂

    • @J0R1AN
      @J0R1AN 3 года назад +1

      @@BugBountyReportsExplained Oh cool, makes sense. Thanks for the info

    • @emadeddin_
      @emadeddin_ 2 года назад

      @@J0R1AN Interesting thinking, well done..

  • @-bubby9633
    @-bubby9633 3 года назад +8

    Haha what a fantastic clever bug! Such a little change yet big impact. Really shows the importance of reading docs for third party software incorporated by your target.

  • @villandoom
    @villandoom 3 года назад +6

    So he had the ability to get unlimited funds on the biggest game platform in the industry and he sold the ability for 7500

  • @javohir307
    @javohir307 3 года назад +4

    Isn't 7500$ very less for this bug ?? What do you think ?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +3

      There's always this discussion. The bounty paid often doesn't equal potential losses for the company.
      But the sad truth is that looking from the program perspective if there are hunters who are willing to dedicate their time, knowing what bounty they will potentially get then payouts are enough. Basically hunters vote with their time if payouts are good enough or not.

  • @Umar0x01
    @Umar0x01 3 года назад +2

    woah so cool, thanks for the detailed explanation!

  • @hexadecimalhexadecimal5241
    @hexadecimalhexadecimal5241 3 года назад +2

    Out of technical curiosity...does anyone know if they can track the generated money where it went? or will they?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +1

      The bug is fixed already.

    • @hexadecimalhexadecimal5241
      @hexadecimalhexadecimal5241 3 года назад

      @@BugBountyReportsExplained I know it is. I am very new to all of this and it makes not much sense to me, just wanted to know some very basic safeguards as to how a company can defend itself(back track bug etc).

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +2

      Ah, that's a good question then. They should have a way to track it. For one, they could compare the amounts of all completed transactions in the Steam's database and Smart2Pay's database. There might also be another, easier way for that - it depends on the specific logging of these transactions.

    • @TheMan8884
      @TheMan8884 4 месяца назад

      @@BugBountyReportsExplained Add in title, "OUTDATED" bet they patched because of this vid

  • @linuxuser5505
    @linuxuser5505 3 года назад +1

    How to start on bug hunting? What do I need to learn/skills that I need? For example, Google opened a bug bounty program for Android 12 on Pixel 5, 4, 4A, 3 device, etc. Do I need to buy the phone to perform the pentest? Is pentesting similar to bug hunting?
    Edit : and the tools?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад

      start learning with portswigger's websec academy. Don't worry about mobiles yet. pentesting is somewhat similar to bug bounty. learn burp suite

  • @tmayonovki
    @tmayonovki Год назад

    big brains bro... good job great explanation

  • @yashwanthd1998
    @yashwanthd1998 3 года назад +1

    Great explanation.some serious logical thinking by the researcher

  • @gabrielevaghetti5454
    @gabrielevaghetti5454 3 месяца назад +1

    even italy can do it this? i think it's cheap

  • @0xx039
    @0xx039 3 года назад +2

    Wondering how the researcher figured the hash....Great video.

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +6

      I was wondering, too. I can't say for him but when preparing to this video, I was looking at the source code of signature generation from one of the open source Magento plugins for Smart2Pay: github.com/Smart2Pay/opencart20/blob/master/catalog/controller/payment/smart2pay.php#L518
      The link leads to the line where the signature is created and above is the for loop that splits the body by & and = and concatenates.

  • @stefanjia8387
    @stefanjia8387 3 года назад +1

    Nice found. It seems that Steam does not take care about security, how can they just pay 7500 for this bug?

  • @LiEnby
    @LiEnby 2 года назад +2

    oof tfw you traded literally infinite money for $7500

  • @GiQQ
    @GiQQ 3 года назад +2

    How could one subscribe without a credit card?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +1

      It's not possible at the moment. What payment method would you like to use?

    • @GiQQ
      @GiQQ 3 года назад +2

      @@BugBountyReportsExplained Paypal would work!

    • @NoahElRhandour
      @NoahElRhandour 3 года назад +3

      oh yeah paypal would be dope. its my only option here in germany

  • @BugBountyReportsExplained
    @BugBountyReportsExplained  3 года назад +5

    Hello! Welcome to the comment section. If you want to get access to hands-on labs, along with many other benefits of BBRE Premium, click here: premium.bugbountyexplained.com/
    To get 25% off, use the code AMOUNT100

  • @punizares
    @punizares 26 дней назад

    Dalej ta metoda działa?

  • @_bergee_
    @_bergee_ 3 года назад +3

    Nie spodziewałem się, że jesteś moim krajanem :) Świetna robota!!!

  • @jw0725
    @jw0725 3 года назад +3

    Btw this doesn’t work. It’s just a scam

  • @Jebingos7
    @Jebingos7 2 года назад

    But does that actilly work?

  • @IanPlayzIDK
    @IanPlayzIDK 6 месяцев назад

    how tf do i do this bro

  • @OthmanAlikhan
    @OthmanAlikhan 2 года назад

    Thanks for the video =)

  • @curated_euphoria_experience
    @curated_euphoria_experience 2 года назад +1

    7500???? 75k would have been meh.

  • @mayoneznyk
    @mayoneznyk Год назад

    bro traded infinite money for literally nothing💀💀💀

  • @Edy_100
    @Edy_100 4 месяца назад

    is this working?

  • @matthewzamat3331
    @matthewzamat3331 2 года назад

    Ha. Genius. Thanks for sharing

  • @Dodo-rb4zf
    @Dodo-rb4zf 3 года назад +2

    That's why ppl fuck with websites and etc.... 7500$ from steam? Lol

  • @mrbmbastic6655
    @mrbmbastic6655 11 месяцев назад

    too little money for such a critical vulnerability

  • @ahmadshami5847
    @ahmadshami5847 3 года назад +1

    just great as always 👌👌👌. So it's basically like abusing an API to manipulate arguments like http content. I am actually trying to discover some bugs with mobile applications. But I am stuck at the point to what tools can analyse most of the protocols other than http interceptors like burp or zap. where can I find such tools and documentations of such tools?? cuz I think that most undiscovered bugs lie in those uncommon communication protocols (for example I know that WhatsApp for example uses a unique protocol created by the WhatsApp team, but don't know how to intercept it)

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +1

      you can use Wireshark to analyse traffic but I don't think you will be able to intercept it and modify in flight. It will be hard to find a tool ready for custom made protocol.
      You can also go the other way. Instead of intercepting the message after it leaves WhatsApp, try to attach to the application and modify messages like that. I'm not an expert when it comes to these things but tools that come to my mind for that would be frida or gdb

    • @ahmadshami5847
      @ahmadshami5847 3 года назад

      @@BugBountyReportsExplained yeah I actually heard once about frida in a conference talk, maybe it is the way to go. as completely reverse engineering a program to manipulate messages is still out of my league 😂. thanks bro and keep up the good work 👌👌

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +1

      @@ahmadshami5847 thanks mate, good luck with it

  • @mnageh-bo1mm
    @mnageh-bo1mm 3 года назад

    Hey.... where do i suggest ideas ?
    There is a massive UPNP exploit that every one should know about but it's a bit complicated and not very new

  • @Explorerhabib
    @Explorerhabib 2 года назад

    Great bruh

  • @devsutong
    @devsutong 3 года назад +1

    simple yet critical 😅💔

  • @hdphoenix29
    @hdphoenix29 3 года назад

    Excellent

  • @peterchari3839
    @peterchari3839 3 года назад +1

    Great video. Its always a pleasure watching your videos. Bug hunting requires critical thinking or analysis of events. I'm looking for a mentor in this field. I completed my CEH practical last year but i guise there is a lot a i need to learn from experts

    • @bravo-6900
      @bravo-6900 3 года назад

      CEH is garbage man

    • @peterchari3839
      @peterchari3839 3 года назад

      @@bravo-6900I didn't get gud advice b4 i enrolled. Which one do you recommend.

    • @bravo-6900
      @bravo-6900 3 года назад

      @@peterchari3839 it depends but mostly oscp ,sans but not sure nowdays they seems lookin for projects ,bug report,any website or something to enhance your profile when you lookin for job.

    • @rainsharpay4090
      @rainsharpay4090 3 года назад

      @@peterchari3839 dd

  • @cybersecurity3523
    @cybersecurity3523 3 года назад

    Good bro

  • @Amducyas
    @Amducyas 3 месяца назад

    nice april fools joke

  • @avenue6427
    @avenue6427 3 года назад

    🔥🔥🔥

  • @jepp_
    @jepp_ 2 года назад

    pRzElEwY 24 tO dObRy WyBóR!
    (lol)
    (its polish language)

  • @Prelondon
    @Prelondon Год назад

    Hi thats perfect
    But you know... i couldnt access to paypal beyond adding
    funds it tell me (oops Sorry)then couldnt acept my request

  • @zzzkatt
    @zzzkatt 2 года назад

    send weed

  • @gang_albanii
    @gang_albanii 3 года назад

    wielki polak

  • @avenue6427
    @avenue6427 3 года назад

    🔥🔥🔥