Google Paid Me to Talk About a Security Issue!

Поделиться
HTML-код
  • Опубликовано: 30 сен 2019
  • Conversation with a bug bounty hunter about a vulnerability found in Google Cloud Shell.
    This video is sponsored by Google (Vulnerability Rewards Program)
    ↓ Check the links
    Google VRP: www.google.com/about/appsecur...
    Cloud Shell PoC exploit (fixed): github.com/offensi/LiveOverfl...
    Cloud Shell docker "escape": github.com/offensi/LiveOverfl...
    Theia IDE: theia-ide.org/
    wtm: / wtm_offensi
    =[ ❤️ Support ]=
    → per Video: / liveoverflow
    → per Month: / @liveoverflow
    =[ 🔴 Stuff I use ]=
    → Microphone:* geni.us/ntg3b
    → Graphics tablet:* geni.us/wacom-intuos
    → Camera#1 for streaming:* geni.us/sony-camera
    → Lens for streaming:* geni.us/sony-lense
    → Connect Camera#1 to PC:* geni.us/cam-link
    → Keyboard:* geni.us/mech-keyboard
    → Old Microphone:* geni.us/mic-at2020usb
    US Store Front:* www.amazon.com/shop/liveoverflow
    =[ 🐕 Social ]=
    → Twitter: / liveoverflow
    → Website: liveoverflow.com/
    → Subreddit: / liveoverflow
    → Facebook: / liveoverflow
    =[ 📄 P.S. ]=
    All links with "*" are affiliate links.
    LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

Комментарии • 421

  • @TheWootify
    @TheWootify 4 года назад +508

    Like everyone else i am also hoping you will get the chance to create more videos for the Google VRP, LiveOverflow! Best wishes, @wtm_offensi

    • @hugo4it
      @hugo4it 4 года назад +2

      wtm to google: “G E K O L O N I S E E R D”

  • @XDRosenheim
    @XDRosenheim 4 года назад +472

    Google: Sponsors a RUclips video.
    RUclips, a Google company: Wait, can we demonetize this?

  • @karl2673
    @karl2673 4 года назад +1024

    Google is like Italy, it switches sides when you least expect it.

    • @samueleproiettimicozzi8134
      @samueleproiettimicozzi8134 4 года назад +3

      Karlo Bistrički lol...

    • @Emaxoso
      @Emaxoso 4 года назад +149

      As Italian I can confirm, no wait I can't

    • @fabiopinciroli4962
      @fabiopinciroli4962 4 года назад +11

      Laughs in Mussolinian

    • @Timsturbs
      @Timsturbs 4 года назад +7

      mi scusi mi scusi 👌

    • @MorbidEel
      @MorbidEel 4 года назад +9

      Switch? Isn't it more like they are on all sides at the same time?

  • @renanlopes6220
    @renanlopes6220 4 года назад +618

    I can't think of anyone better than you for this job! Glad to see you getting rewarded after all these years of effort here on RUclips. Congratulations !

  • @NicholasMaietta
    @NicholasMaietta 4 года назад +353

    Other companies, pay attention. This is the right way to talk about things like this. The more open we are about bugs and problems, the more secure these companies become. I love this model.

    • @WebSecurityful
      @WebSecurityful 4 года назад +5

      @Adolf Hitler They just invest money to keep their income alive, if their systems would fail or be compromised this could cause more harm then the few millions they pay for these bug bounties. These millions compared to the billions that they would risk are like nothing, especially for a company with such size and importancy in our world.

    • @WebSecurityful
      @WebSecurityful 4 года назад +1

      @Adolf Hitler There is just nothing more important than money and growth

    • @georgplaz
      @georgplaz 3 года назад

      @will triumph i think it was sarcasm. in any case, you are way overblowing it.

  • @kobiassvilli
    @kobiassvilli 4 года назад +192

    LiveOverflow to be the official bug reporter for Google? you got my vote!

  • @dgramop
    @dgramop 4 года назад +35

    I really enjoy how you also explained his thought process and how he was able to do the legwork to find the vulnerability. I know people in the cyber world that would just say "there was an issue where it would automatically execute gradle" and then call it a day, if I;m lucky, after giving more details about the vulnerability itself. People rarely talk about the thought process required.

  • @mpwsh
    @mpwsh 4 года назад +28

    Great video! I would love to see more vulnerability disclosures explained like this in the channel. This also says a lot about what RUclips/Google was saying about demonetize hacking related videos. Even tho this is hacking related, it's clearly more educational than a step by step on how to damage someone by hacking their wifi or creating social engineering sites.

  • @lukor-tech
    @lukor-tech 4 года назад +21

    I am very happy that this type of sponsorship is happening !
    Way to go and best of luck with next productions.

  • @Fritzendugan
    @Fritzendugan 4 года назад +1

    Congratulations! I've been watching your videos for some time and it warms my heart to see secure these types of partnerships and grow your channel. Well deserved!
    And not to mention definitely an interesting video. Kudos for keeping everyone grounded and reminding that videos don't capture everything (on purpose, of course) :)

  • @AlexBMJ01
    @AlexBMJ01 4 года назад +30

    Awesome video! It's always cool to get the story behind a vulnerability. Would love to see more content like this!

  • @Milamber-pg3ju
    @Milamber-pg3ju 4 года назад +20

    I really enjoyed the format of this video. I liked getting the explanation from the source as well as LiveOverview’s explanation. I would watch more like this in the future.

  • @WikiPeoples
    @WikiPeoples 4 года назад +49

    I really appreciate you pausing to remind the viewer that this work is tedious, and takes time. The problem with RUclips educational videos these days, is that unless you remind yourself of this, they can make some people very discouraged... That's because their expectation is that when they sit down to code, or research, it will look similar to the video they watched... And instead of being smooth, and almost effortless, it's the complete opposite - difficult, slow, challenging.

    • @jmullentech
      @jmullentech 4 года назад +7

      That's one reason I respect guys like Ippsec so much. He leaves the majority of his "mistakes" and oversights in his videos, so you can get a taste of "why the hell isn't this working??" as a viewer. We need more people like that, for sure!

    • @kantnklaar
      @kantnklaar 4 года назад +1

      I can relate to that; I watched too much Mr Robot 😂

    • @shadowinlight20
      @shadowinlight20 4 года назад +4

      It's like this in every branch. Every time books and articles talk about an expert, be it scientist, athlete or artist, they make it sound like these people were simply born this way and that everything they touch turns into gold. In reality those experts failed more times than any "talentless" person.

  • @Mith07
    @Mith07 4 года назад +4

    You can really see how much work you put into this video compared to your usual videos. It's one of your best videos imo, keep it up!

  • @Mith07
    @Mith07 4 года назад +68

    This title sounds like clickbait but it's actually not.

  • @CySnowdrop
    @CySnowdrop 4 года назад +2

    Well done mate! I've been following you for a while now and you totally deserve the sponsorship!! Keep up the good work mate!

  • @WhosOverpowered
    @WhosOverpowered 4 года назад

    Love the new format! I think it is great for the largest developers like Google to be able to facilitate knowledge like this. It could mean that some smaller companies or freelance developers dont end up losing clients or getting into legal trouble over something that a company like Google can fix before it is used as an attack vector. Things like these need to be shared, and I am glad that you are the person sharing it with us!

  • @tomasgemes4349
    @tomasgemes4349 4 года назад +5

    Bro this is completely EPIC! Google sponsoring. It could get even nicer though, just imagine google asking you to talk about critical historic bug reports on android, drive, youtube, search engine. IT COULD BE AWESOME!

  • @bitcode_
    @bitcode_ 4 года назад

    you deserve it! all the sacrifice you've made for learning and working on your skills, keep up the good work!

  • @k1ngjulien_
    @k1ngjulien_ 4 года назад +37

    19:08 magically disapprearing hair? :D
    Very nice video

  • @omerfeyyazselcuk7325
    @omerfeyyazselcuk7325 4 года назад +160

    That glorious man's hair flied away in around 19.00

    • @Fractal227
      @Fractal227 4 года назад +5

      Luckily it came back again

    • @x3ICEx
      @x3ICEx 4 года назад

      19:00

    • @georgplaz
      @georgplaz 3 года назад

      a bug! maybe you'll get a bounty by liveoverflow

  • @CZghost
    @CZghost 3 года назад

    This is hands down the best security vulnerability related video in general I've ever watched. Talk with a full-time bug hunter and very professionally put together. Hard to believe that this is actually an advertisement, and as I can see, it's an advertisement for Google's bug bounty program. Google is rather unusual company. They propose open-source projects, they are very open about their products, even when it comes into the vulnerability of these products, and they actually care about people's opinions. Kind of like Discord as it seems.

  • @Sleezgaming
    @Sleezgaming 4 года назад +1

    Schönes Video! Echt cool, dass du solche Kooperationen realisieren kannst. Sehr sympathisch auch der Bounty hunter :)

  • @user-tn3fo3pj2x
    @user-tn3fo3pj2x 4 года назад

    nice for making this video, i know that finding bug can be frustrating unless you happen to find it accidentally, but this video showed me how even more frustrating it is. thanks!

  • @ev.c6
    @ev.c6 4 года назад +2

    It is amazing that you show the effort this guy had to find this bug. I know people who think success is a one time try-get thing based on someone's "talents". This line of thought can lead to many disappoints in life.
    Your channel is amazing :)

  • @nagoshi01
    @nagoshi01 4 года назад

    This is an awesome video. Loved the real life video shots, really made the vid easily digestible

  • @RamtheCowy
    @RamtheCowy 4 года назад

    Man I love your videos even as a newb who knows nothing about programming or cybersecurity, you have a way in structuring and presenting and always make them so fascinating! :)

  • @4400marko
    @4400marko 4 года назад

    Nicely done, both of you! Congrats!
    And please keep reminding us how tedious work it is - I forget.
    Very good video!

  • @GarthHumphreys
    @GarthHumphreys 4 года назад

    Wow, thanks for sharing this content and the interview. It was very insightful!

  • @gabrielraphaelgarciamontoy1269
    @gabrielraphaelgarciamontoy1269 4 года назад

    The captions helped a lot because my speakers got water damage today! Thanks :)

  • @bjornroesbeke
    @bjornroesbeke 4 года назад +27

    Finding hacks is always the result of someone saying "What if...", playing around a bit and then getting an understanding of how things work.
    A potential question: Would you have invested the time and effort if Google didn't have a bug bounty program, just to learn something?

    • @LiEnby
      @LiEnby 4 года назад +11

      im sure someone on the darkweb would pay for it if google didnt

    • @TheWootify
      @TheWootify 4 года назад +11

      Good question Bjorn. The truth is that I could not have afforded to spent the time i did, without the existence of bounties. If bug bounties did not exist i would have to spent time on offering penetration testing services to clients (or get a job in engineering like i used to have, and practice hacking for fun in my spare time). Best wishes!

  • @nsns7993
    @nsns7993 4 года назад

    Great video! Learned a lot from the explanation, especially the docker escape trick.

  • @felipe51lugo1
    @felipe51lugo1 4 года назад

    I appreciated both efforts: describing and explaining. thumbs up.

  • @oldbootz
    @oldbootz 4 года назад +1

    Great video! I love the interview format.

  • @gregaluise5727
    @gregaluise5727 4 года назад

    Thank you Live Overflow and Google! Cool look into container technology and how the "bug" can be the result of bringing several technologies together.

  • @dwietr
    @dwietr 4 года назад

    Whoa, you've expanded my view on a lot of services I'm using in my professional life. I'm using docker on a daily base and I was not aware you can control the container (moreover, other containers) in such way using the docker socket file. Okay, everything isn't exactly the same with comparing GCP(Google Cloud Platform) vs OCP(Openshift Cloud Platform) but technically it seems pretty similar. Anyway, thanks for the video.

  • @arnonymous7211
    @arnonymous7211 4 года назад +106

    15:03 did i just see the famous merkel raute?

    • @hexdreams
      @hexdreams 4 года назад +9

      Nice catch xD

    • @Rebouz
      @Rebouz 4 года назад +6

      this concludes there has to be a section about bratwurst in this video aswell.

    • @Nadox15
      @Nadox15 4 года назад

      @@Rebouz Damit hat er unsere Mutti mit Stolz erfüllt

    • @hiabst
      @hiabst 4 года назад +1

      @@Nadox15 stimmt , hab grad meine mutti gefragt

    • @xenon5993
      @xenon5993 4 года назад +1

      Also referred to as "Merkeldach" ("Merkel's roof") or "Raute der Macht" ("Rhombus of power").

  • @osamazaid25
    @osamazaid25 4 года назад

    Beautiful idea 💡 thanks to everyone who was involved in this.

  • @BGroothedde
    @BGroothedde 4 года назад +1

    Nice video! I would love more of this type of content. Let's hope Google sponsors you more often!

  • @smtmssmtms
    @smtmssmtms 4 года назад

    Love your content, love the knowledge, love the way you transmit it :)

  • @FloWoelki
    @FloWoelki 4 года назад

    This is such an awesome video. Thank you!! :)

  • @maciej-36
    @maciej-36 4 года назад +6

    Actually YES! This is the best sponsored video I have ever seen!

  • @joehollon317
    @joehollon317 4 года назад

    Awesome video I hope one day I can find some bugs I've been working on it really hard :)

  • @RickyMau1
    @RickyMau1 4 года назад

    another great video. Great pace, great explanation.

  • @deskoner
    @deskoner 4 года назад

    Really awesome, interesting and well presented video.I truly appreciate it :)

  • @jon-anthoneydeboer4383
    @jon-anthoneydeboer4383 4 года назад +1

    Excellent find, love the concept of this video too.

  • @glorytoarstotzka330
    @glorytoarstotzka330 4 года назад

    I am really happy for live overflow geting asked by google themselves to make a regular video with a bug they had. feelsgoodman

  • @Reth_Hard
    @Reth_Hard 4 года назад +2

    Very, very interesting video.
    You guys are real genius.
    I wish I had half your talent.

  • @MannyLama
    @MannyLama 4 года назад

    Love this video! Great work.

  • @velho6298
    @velho6298 4 года назад +3

    Love it

  • @xenialxerous2441
    @xenialxerous2441 4 года назад

    Hey there #liveoverflow!! This was an awesome awesome video, loved it thoroughly!

  • @JakeHillion
    @JakeHillion 4 года назад

    Loved it. Thank you.

  • @ydrezende
    @ydrezende 4 года назад +2

    Congratulations, my friend! You are doing such a great job, I'm so glad Google recognized your work.

  • @HritikV
    @HritikV 4 года назад +2

    Awesome video !
    I had a question though, why would google put host's docker daemon socket in the shell container ?
    One possible explanation would be, because the shell needs to communicate to the thea IDE, but I'm not sure because if that's the case then why not put thea and the shell in the same container ?

  • @srlorch406
    @srlorch406 4 года назад

    wow i was like "i can barley understand that" and the subtitle hint comes up. perfect!

    • @ThePC007
      @ThePC007 4 года назад +2

      I understood it perfectly fine, but then again, my own accent is probably just as bad.

  • @bale-qb7jv
    @bale-qb7jv 4 года назад +20

    You need to do a video on the new iOS bootrom exploit!

  • @jeffsirkis2552
    @jeffsirkis2552 4 года назад

    I really enjoyed this video and would love to watch more videos exactly like it.

  • @marekunas
    @marekunas 4 года назад

    Great video, thanks!

  • @PolyRocketMatt
    @PolyRocketMatt 4 года назад +60

    19:08 he's having a bad hair day xD

    • @xellaosu
      @xellaosu 4 года назад +1

      Yeah I noticed the change in hair style as well. I thought it was a brilliant easter egg! Wonder if the Dutch guy suggested it xD

  • @alexhuang7681
    @alexhuang7681 4 года назад +7

    Hope someday we'll see LiveOverflow talking about bugs on LastPass/Dashlane/NordVPN/PIA/Audible/etc. :3

    • @TealJosh
      @TealJosh 4 года назад +1

      Well, nordvpn is relevant now lol.

  • @kalexander777
    @kalexander777 4 года назад +18

    "We connect you with Hackers, just make a simple video.. blah blah" -Google Hmm.. does this mean you think i'm a Hacker, Google?!

  • @sumitlahiri209
    @sumitlahiri209 4 года назад

    Awesome. Keep up the great work.

  • @Tyranimus
    @Tyranimus 4 года назад

    Amazing! I want more of that!

  • @michael-gary-scott
    @michael-gary-scott 4 года назад

    That’s awesome! Congrats man 😁

  • @WelteamOfficial
    @WelteamOfficial 4 года назад

    One of your best video imo. Thank you

  • @tootalldan5702
    @tootalldan5702 4 года назад

    Cool content and research. Thanks for sharing. BTW, I hope you get paid twice because there were 2 commercials in this video also.

  • @josephwong2832
    @josephwong2832 4 года назад

    love how you emphasized how hard it was

  • @TrustedCreeper
    @TrustedCreeper 4 года назад

    It looked way to easy. Nice collaboration👍🏻

  • @yalopov
    @yalopov 4 года назад

    really interesting, i hope you get to do more videos like this

  • @elrashidco
    @elrashidco 4 года назад

    I feel smart 🤣 , you are doing a great job ❤

  • @TimLF
    @TimLF 4 года назад

    A video on securing containers and escaping them would be very interesting

  • @Rajeev-o2j
    @Rajeev-o2j 4 года назад

    Your contents are on another level.

  • @rythm3756
    @rythm3756 4 года назад

    Cool video man keep it up!

  • @BlackHermit
    @BlackHermit 4 года назад +6

    The beginning of Google is the ray. I've already heard about this vulnerability, but your explanations are.

  • @cptpinecone
    @cptpinecone 4 года назад

    Kudos dude. But I mean, with your content quality, it pretty much makes sense!

  • @gcm4312
    @gcm4312 4 года назад +14

    If only all ads taught me this much.
    ps: Google, you should pay more for your bug bounty hunters...

  • @retpolanne
    @retpolanne 4 года назад

    Nice video, really inspiring for people who want to find bugs.
    I wonder if you can kubectl to this cluster.
    13:33 hey, if you get access to the host, you can use strace to trace the container processes pid.

  • @Simrasil_
    @Simrasil_ 4 года назад +5

    woah.. I kinda lost sight of this channel for some time (shifting interests and such) and now I come back and he has 374k subscribers? When and how did that happen?! I mean congratulations I'm really happy for him but damn ^^

  • @beccybausinger2933
    @beccybausinger2933 4 года назад

    Very exciting. Thanks for explaining :-)

  • @ibrahimkahfie3467
    @ibrahimkahfie3467 4 года назад +2

    Wow.Michael cera really is knowledgeable in cyber security.

  • @aerodigital
    @aerodigital 4 года назад

    Implementation of a wrapper, nice stuff.

  • @threeMetreJim
    @threeMetreJim 4 года назад

    I find the easiest vulnerabilities to work on are client/server web apps with the logic carried out by some script on a server with the client side in Javascript. Found a few bugs in commercial products, the companies involved were happy to receive the bug reports for fixing, but no reward unfortunately (but I did receive a thank you). Only reward was from Facebook for quite a trivial privacy issue ($500 lowest tier bug bounty reward). I find live chat apps are usually the ones with flaws - best was a complete deletion of an app from a web page without admin privilege (with permission of the owners of the site it was hosted on), and a moderation bypass (done on the providers demo page). Another one is trying to insert HTML markup in a page when you shouldn't be able to (not enough user input sanitation that can lead to cross site scripting vulnerabilities), had a laugh on a Facebook game with that one (before letting the game developers know about the bug).
    While this is probably not legal to do, as long as you don't cause any damage and notify the providers so that the 'bug' can be fixed, I've never had anyone be upset about it - better than someone malicious coming along and causing untold havoc for anyone using whatever service has the bugs.

  • @rigoligorlc4795
    @rigoligorlc4795 3 года назад

    Now I finally know why new JetBrains IDEs asks whether you trust the build system used by a project.

  • @chillyvanilly6352
    @chillyvanilly6352 4 года назад

    What an eye opener this is... Boy ou boy

  • @ikervans
    @ikervans 4 года назад

    Nice vídeo! Good job

  • @vkredgod2340
    @vkredgod2340 4 года назад

    I loved the video, thanks for the incredibile content :)

  • @FreeFallerrz
    @FreeFallerrz 4 года назад

    Really great video!

  • @Rednesswahn
    @Rednesswahn 4 года назад

    This is awesome, @Google should sponsor more videos like this :D

  • @theawesomegamer123
    @theawesomegamer123 4 года назад

    Awesome video!

  • @Jango1989
    @Jango1989 4 года назад

    Great video!

  • @retry51776
    @retry51776 4 года назад +85

    Only $5k for this? That is way underpay for his skill set

    • @iisky1
      @iisky1 4 года назад +4

      Terry Wu I’ll appreciate 5k, cuz that’s a lot for a kid :)

    • @makitard
      @makitard 4 года назад +6

      @@iisky1 nobody asked you

    • @michaeljones5681
      @michaeljones5681 3 года назад +1

      @@makitard nobody asked you to make this negitive comment but yet here we are

    • @makitard
      @makitard 3 года назад

      @@michaeljones5681 necro

    • @michaeljones5681
      @michaeljones5681 3 года назад +1

      @@makitard what does that mean sorry I'm fairly new to this stuff

  • @rj-nj3uk
    @rj-nj3uk 4 года назад

    That horse playing guitar, drum and [that blow horn thing] 😅

  • @OmarChida
    @OmarChida 4 года назад +3

    Great job LiveOverflow just one question what software do you use to make these cool paintings and writings ?

    • @LiveOverflow
      @LiveOverflow  4 года назад +2

      you can find making of videos on my channel ;)

    • @OmarChida
      @OmarChida 4 года назад +2

      @@LiveOverflow Definitely will check it out. Your my Number 1 RUclipsr when it comes to learning security and reversing. Thanks so much for the content

  • @vasiliskonstantinou8577
    @vasiliskonstantinou8577 4 года назад

    Loved it ❤️

  • @oxodao
    @oxodao 4 года назад

    This vidéo was awesome. If you have the opportunity to do something like this again dont hésitate !

  • @vypxl
    @vypxl 4 года назад +25

    I would say: Ehre an Google!

    • @treppi
      @treppi 4 года назад +1

      @@effiti2905 huhu xD

    • @treppi
      @treppi 4 года назад +1

      @@effiti2905 ich weiß, denkst du er ist dieses Jahr wieder auf dem C3? Will unbedingt ein Autogramm oder so

  • @hopehowdoyoufeel
    @hopehowdoyoufeel 4 года назад

    You've made it! Congratulations

  • @Ariana-dn4mm
    @Ariana-dn4mm 4 года назад +10

    Which piece is that on the piano i kinda want to know

    • @simone9485
      @simone9485 4 года назад +2

      I would really enjoy a video of him playing the piano

  • @immjs
    @immjs 4 года назад

    Incredible,again!

  • @Shinika01
    @Shinika01 4 года назад

    I guess it's a good sumary (untill you guys release the 4h version :p ? )
    Great mind of that person (we're here cuz you have a great mind already, and... Google Agrees... :( )
    Good luck to both, very VERY interresting topic and conclusion, and Extremely very interresting trick i'll share soon ;) Thanks guys.
    Kepp pushing the boundaries of these bounties!