Authorization vs. Authentication (Google Bug Bounty)

Поделиться
HTML-код
  • Опубликовано: 16 ноя 2024

Комментарии • 42

  • @kallocainsynthemesc4172
    @kallocainsynthemesc4172 3 года назад +81

    I lost count of how many google sponsored videos you made by now. Good for you man. Guter Kontent Junge

    • @BenjaminAster
      @BenjaminAster 3 года назад +11

      DIESE KOMMENTARSEKTION IST NUN EINHEIT DER BUNDESREPUBLIK DEUTSCHLAND. 🇩🇪🇩🇪🇩🇪🇩🇪🇩🇪🇩🇪🇩🇪

    • @theguyfromtech4090
      @theguyfromtech4090 2 года назад +1

      @@BenjaminAster Lol ja

  • @studyshit4418
    @studyshit4418 3 года назад +3

    A nice topic. I usually just summarize it as Authentication authenticates i.e checks the data you entered, while the authorization is to check whether you have permission to perform a task or not.

  • @goblinlordx6108
    @goblinlordx6108 3 года назад +14

    Something interesting I have seen:
    Allowing a user to edit themselves but not restricting fields they can modify via the backend (UI doesn't show). Then any user can escalate roles/permissions if stored using user information.

  • @Encysted
    @Encysted 3 года назад +9

    Thanks, this is really helpful!
    Authorization: do you have the authority to do that?
    Authentication: are you the authentic __ ?

  • @mgetommy
    @mgetommy 3 года назад +7

    Good example with change email. Simple but I didn't see it coming

  • @YandiBanyu
    @YandiBanyu 3 года назад +25

    A good devs avoid the confusion by using the name "Auth".
    /s
    Seriously, a good fine grained authorization manager are hard to find for my use case.

  • @shravankumarsheri6732
    @shravankumarsheri6732 3 года назад +1

    Like always @liveroverflow content is informative and substantial for any Security Aspirant.

  • @bhnjhbjhbkgkkvhnhmbm
    @bhnjhbjhbkgkkvhnhmbm 3 года назад +1

    Cmon google, hire this guy already!

  • @AntoshaPushkin
    @AntoshaPushkin 3 года назад +79

    I think you have authorization issues in your video, at 0:57 email addresses are not blurred while they are blurred later, and we are probably not authorized to see them

    • @aim2986
      @aim2986 3 года назад

      Where it is blurred later?

    • @DasUberAdmin
      @DasUberAdmin 3 года назад

      @@aim2986 for example on 2:16 the username is blurred but it's not hard to guess it's the same one as shown in 1:02

    • @AntoshaPushkin
      @AntoshaPushkin 3 года назад +6

      @@aim2986 yes, when I commented, everything was clearly visible, now it's blurred. It's possible to do it with some RUclips tools when the video is already uploaded and public

    • @J0R1AN
      @J0R1AN 3 года назад +17

      Finding vulnerabilities in RUclips videos, a whole new business

    • @SamGib
      @SamGib 3 года назад +1

      In fact, there is an ML model that can recover text from blurred form. Now the proper way is a solid black rectangle.

  • @georgehammond867
    @georgehammond867 3 года назад +3

    Great work on the SUDO videos, you might find your self working for Apple after this..Congratulations.

  • @fadhilsaheer8877
    @fadhilsaheer8877 3 года назад +23

    developers who just call both of them auth 😌

    • @kebien6020
      @kebien6020 2 года назад

      Or we call them AuthZ and AuthN. Clear as day.

  • @iamvinku
    @iamvinku 2 года назад +5

    Please do Log4Shell next. Everyone's out there talking about how you can use it to launch notepad or calculator on Minecraft players' computers but I'd love to know about the real nasty things you can do using an RCE vulnerability that basically allows you to run custom Java code on vulnerable systems.

    • @shadow201011
      @shadow201011 2 года назад +2

      check John Hammond :)

    • @oskarz
      @oskarz Год назад

      Anything you can do with a java app- keylogger, bootstrap non-java executables, etc

  • @konradw360
    @konradw360 3 года назад +3

    Google's mouthpiece is back!!!

  • @knowledgeboxbd9625
    @knowledgeboxbd9625 3 года назад +3

    Awesome explanation thanks

  • @almightyhydra
    @almightyhydra 3 года назад +4

    5:54 can I file a bug report? :) The documentation there has a typo, it should say "because the documentation explicitly requires the OWNER role".

  • @_CryptoCat
    @_CryptoCat 2 года назад

    i authenticate AND authorize this video ❤

  • @ProBarokis
    @ProBarokis 2 года назад +1

    Hey! Make a video about the log4j vulnerability!

  • @ChillerDragon
    @ChillerDragon 2 года назад +1

    did i just watch a 10 min google ad?

  • @mohmadhafiz1675
    @mohmadhafiz1675 3 года назад +1

    authentication vs authentication or authentication vs authorization?

  • @logiciananimal
    @logiciananimal 3 года назад +1

    I am not sure that undocumented exposed APIs are necessarily as innocuous as portrayed. (The "prefiltered" ones are well described) Why? Attack surface; a general principle I usually follow that if you don't need, don't expose it - just in case it is relevantly buggy, etc.

  • @HBees79
    @HBees79 3 года назад +5

    @1:00 - you forgot to blure out email address ⚠️⚠️⚠️

  • @kifayatshabir5468
    @kifayatshabir5468 2 года назад

    I think you should make a video or series on car unlocking.

  • @just8192
    @just8192 3 года назад +1

    0:58 hide mails

  • @sebastiancioek5970
    @sebastiancioek5970 3 года назад

    But you can change the UI to get access to the API?!

  • @tg7943
    @tg7943 2 года назад

    Push!

  • @h4ckv157
    @h4ckv157 3 года назад +1

    ⚡👌🏻

  • @themrpancake
    @themrpancake 2 года назад

    Why no comments

  • @ROBOTRIX_eu
    @ROBOTRIX_eu 3 года назад +1

  • @bf314159
    @bf314159 3 года назад

    Why the fuck would anyone just "trust google's judgement"