This bug might change how you see eCommerce websites

Поделиться
HTML-код
  • Опубликовано: 5 ноя 2024

Комментарии • 36

  • @hanhao263
    @hanhao263 2 дня назад +21

    Race conditions sound like what an American would say.

  • @and_rotate69
    @and_rotate69 День назад +9

    unfortunately race conditions are realllyy edge cases, and u can barely do 1 especially with nowadays frameworks which offer a better security and code execution

    • @deadoverflow
      @deadoverflow  День назад +1

      I do agree but race conditions aren't always what I explained. These vulnerabilities occur in a lot of different parts of a website, that's why they are so destructive. One good example is bypassing 2fa.

  • @LK272si
    @LK272si 20 часов назад +1

    Absolutely love this kind of content!!! I hope you keep making more such content🙀

    • @deadoverflow
      @deadoverflow  19 часов назад

      Aww thanks man, really appreciate this. One way to motivate me in making more content is to subscribe, it costs you nothing but means a lot to me for each number I get

  • @someoneunknown6894
    @someoneunknown6894 День назад +2

    Hey, great video! Would love to see more videos like this going over the labs

    • @deadoverflow
      @deadoverflow  День назад +1

      Thanks a lot man, I got another video coming out today regarding broken reset password functionality so you might want to subscribe to check that out!

    • @someoneunknown6894
      @someoneunknown6894 День назад

      @deadoverflow Subscribed right now :D

  • @lightninghunterCR
    @lightninghunterCR День назад +1

    Damn, that was good stuff!

    • @deadoverflow
      @deadoverflow  День назад

      Thanks a lot man, I really appreciate your insight!

  • @pieTone
    @pieTone День назад +1

    Here before you become a decillionare.

  • @ramonbastos6232
    @ramonbastos6232 День назад +1

    Amazing video man, I would just like to know which tool you used to intercept the requests

    • @deadoverflow
      @deadoverflow  День назад

      Oh man I could get in trouble if I tell you so please promise me you won't use it for anything shady 😭

    • @OplikZPrahy
      @OplikZPrahy День назад

      ​@@deadoverflow I would like to know aswell. I have a huge interest in coding, cybersecurity etc. I promise not to do shady stuff, I actually already got rewarded for a few incredibly easy bounties.

    • @deadoverflow
      @deadoverflow  День назад

      @@OplikZPrahy Okay then, software I used is called Burp Suite standard edition, there is a pro version but I rarely use it. You can just google and download it. Set up is very easy as well!

  • @RodDiaz
    @RodDiaz День назад +1

    Can you explain, which is the best way to notify the owner of the website that there is a "bug"

    • @deadoverflow
      @deadoverflow  День назад

      If they have a bug bounty program then that is one way, if they just have a contact form that is another and if you cannot contact them, then maybe look up the owner of a website and contact them directly.

    • @Bebop79
      @Bebop79 День назад +1

      Assuming the company is being proactive they might have this set up en.wikipedia.org/wiki/Security.txt

    • @deadoverflow
      @deadoverflow  День назад

      Great point

  • @TheDenixChannel
    @TheDenixChannel 2 дня назад +1

    you got yourself a like and follow

    • @deadoverflow
      @deadoverflow  День назад

      That's awesome, thanks a lot man ❤️

  • @yolbulucu
    @yolbulucu День назад +1

    wait how do they prevent this ?

    • @deadoverflow
      @deadoverflow  День назад

      Well I guess making the functionality different on the backend. Maybe firstly setting the coupon to be invalid and then remove the -20%

    • @jisangain
      @jisangain День назад +1

      Maybe you can use mutexes/locks

    • @yolbulucu
      @yolbulucu День назад

      @@deadoverflow lol or simply use transactions

    • @deadoverflow
      @deadoverflow  День назад

      or once you start making a purchase, backend detects that you entered a coupon and only then takes 20% off

    • @rvn8552
      @rvn8552 День назад +1

      option A/B is as dead mentioned, invalidate first or check if coupon was already entered, option C is to use something called atomic locking which in short terms makes sure that things happen in sequence i.e. first coupon processed fully, then second coupon processed, not both simultaneously

  • @AnukiranGhosh
    @AnukiranGhosh 2 дня назад +3

    Race conditions? (I didn't watch the full vid yet, I solved the lab a few weeks ago).

    • @deadoverflow
      @deadoverflow  2 дня назад +1

      It's a great type of vulnerability to hunt for, honestly it's underrated but you can find these almost everywhere

    • @AnukiranGhosh
      @AnukiranGhosh 2 дня назад +2

      @@deadoverflow right. I keep moving away from cybersecurity & then some video pops up on my yt feed & I want to get back again 😂

    • @deadoverflow
      @deadoverflow  2 дня назад

      lmao had exactly the same experience few years ago. Don't give up is the best advice to give

  • @MrJloa
    @MrJloa День назад +2

    Lawl who da hell applies the coupon async and then mark it used 😂
    Probably some Indian interns wrote that estore code man

    • @deadoverflow
      @deadoverflow  День назад +2

      Lmao, well given the fact that indians charge $2 an hour, so they are cheap labor, you can see this more and more lmaoo