WhatsApp - a malicious GIF that could execute code on your smartphone - Bug Bounty Reports Explained

Поделиться
HTML-код
  • Опубликовано: 21 авг 2024

Комментарии • 74

  • @BugBountyReportsExplained
    @BugBountyReportsExplained  3 года назад +1

    Welcome to the comment section!
    First, thanks for watching!
    Make sure you are subscribed if you liked the video!
    ruclips.net/user/BugBountyReportsExplained
    Follow me on twitter:
    twitter.com/gregxsunday
    ✉️ Sign up for the mailing list ✉️
    mailing.bugbountyexplained.com/
    ☕️ Support my channel ☕️
    www.buymeacoffee.com/bountyexplained
    🖥 Get $100 in credits for Digital Ocean 🖥
    m.do.co/c/cc700f81d215

  • @khneo
    @khneo 3 года назад +17

    I really appreciate low level bugs covered here ! Keep up the great work, thanks !

  • @FahadAlQallaf
    @FahadAlQallaf 3 года назад +2

    Awesome contents as usual! keep it up.

  • @satyajitdas1249
    @satyajitdas1249 3 года назад +1

    thanks 👍🏻 pls create more vdos on all reports, test cases, scenarios, vulnerabilities.

  • @BinaryByte
    @BinaryByte 3 года назад +15

    it was an interesting vuln..😁😃❤️

    • @dedsec7543
      @dedsec7543 3 года назад

      It is still intresting brother 😂😂😂😂

  • @megazrexalpha
    @megazrexalpha 3 года назад +2

    thx, always new things to learn here

  • @soumyapoddar4711
    @soumyapoddar4711 3 года назад +1

    Awesome explanation :)

  • @-bubby9633
    @-bubby9633 3 года назад +1

    Wow fantastic explanation! Memory exploitation isn't my forte but was able to understand it perfectly anyway! Great content thanks

  • @diabawii
    @diabawii 3 года назад +2

    it would be nice to make videos about how to fuzz specific vulnerabilities and where to look for them.

  • @dularapramod1443
    @dularapramod1443 3 года назад

    good luck bro. great work

  • @melvin16
    @melvin16 3 года назад

    Superb content 👌

  • @ankitkaushal442
    @ankitkaushal442 3 года назад +1

    ok, no haters. now I can see why

  • @gayanc6193
    @gayanc6193 7 месяцев назад

    Amazing👋

  • @blair49
    @blair49 3 года назад +1

    Interesting!
    Love your detailed explanation❤️
    You earned a sub!

  • @joelitle6167
    @joelitle6167 3 года назад

    You are really genius bro...

  • @IsarEdits
    @IsarEdits 3 года назад

    great video!

  • @siddharth__pandey
    @siddharth__pandey 3 года назад

    Great work

  • @cybersecurity3523
    @cybersecurity3523 3 года назад

    Good job bro

  • @Rundik
    @Rundik 7 месяцев назад

    Looks more like a backdoor

  • @blablablabla29382
    @blablablabla29382 3 года назад

    2000iq, insane job

  • @y.vinitsky6452
    @y.vinitsky6452 3 года назад

    Thanks for the video and clear explanation. Can you spend some more time demoing the vulnerability next time?

  • @googlemonkey7746
    @googlemonkey7746 3 года назад

    Very helpful

  • @rrazer7114
    @rrazer7114 3 года назад

    Awesome :)

  • @AnPham-uz3td
    @AnPham-uz3td 3 года назад

    I think there is a mistake at 3:04, should the last image be 6x0 if we want to reallocate based on the if condition in 2:25 ?

  • @rishabhanand4029
    @rishabhanand4029 3 года назад

    Nice.

  • @ahmedtcp3029
    @ahmedtcp3029 3 года назад

    good job

  • @p.kay_____
    @p.kay_____ 3 года назад

    Awesome

  • @mikek4637
    @mikek4637 3 года назад

    Thanks for the video! Did you consider sometimes actually exploiting the vulnerability along the explanation? While it might be too tricky for some exploits like this one (i assume it's hard to get such an old whatsapp version) However, for some this might be feasible

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +1

      yeah I'd love to do it, but usually it's hard to get the vulnerable version of an application and even harder when I'm doing website's bug bounty. But I will do it when I can.

  • @b07x
    @b07x 3 года назад

    Interesting.....

  • @antimatter6728
    @antimatter6728 3 года назад

    Researcher that searchs for low vuln really built different huh

  • @TheWiseExpress
    @TheWiseExpress 3 года назад

    Great

  • @patrickslomian7423
    @patrickslomian7423 3 года назад

    Hey Greg can you please recommend some good Assembly tutorial/book ?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +1

      No Really Patrick :/ I don't know much about it besides what I learnt for purposes of this video. I even had some friends with better knowledge verify this one before publishing.

  • @laggybot1327
    @laggybot1327 3 года назад

    Nice

  • @unknownuser1806_
    @unknownuser1806_ 3 года назад

    wow ❤️

  • @bughunter1731
    @bughunter1731 3 года назад

    love ur accent bro haha🔥

  • @zedeleyici.1337
    @zedeleyici.1337 3 года назад

    great

  • @arunsec
    @arunsec 3 года назад

    Live finding bug & report live

  • @mr.roboter
    @mr.roboter 3 года назад

    This is amasing.This bug need port forwarding?

  • @freyeahshah4494
    @freyeahshah4494 3 года назад +1

    ❤️❤️❤️

  • @ejonesss
    @ejonesss 2 года назад

    why not pad, truncate or resize the frames.
    pad where a black border is placed that is what what happens with 16:9 so it is compatible with 4:3.
    truncate is where part of the frame is cut off another option to make 16:9 compatible with 4:3 that is what the movie industry did when picture tube based tvs was the standard they printed up 16:9 and 4:3 versions.
    resize that is where the frame is stretched to fit many slideshow programs do that.
    images from the 80s will look like doom video game.
    problem solved...

  • @nirudhyogidaridram4517
    @nirudhyogidaridram4517 3 года назад

    In which software do I need to perform this

  • @27_syauqiilhamramadhan9
    @27_syauqiilhamramadhan9 3 года назад

    I think this vulnerability has already been exploited by someone. But not repaired

    • @BinaryByte
      @BinaryByte 3 года назад

      it was patched at the whatsapp version 2.19 I guess.

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад

      it was fixed in WhatsApp 2.19.244 as per the blogpost

  • @anonCharlies
    @anonCharlies 3 года назад

    ur awsm

  • @kavindunimesh9049
    @kavindunimesh9049 3 года назад +1

    ❤💜

  • @hanko1
    @hanko1 3 года назад

    can you make RCE on paypal? its on hackerone

  • @m_peter1514
    @m_peter1514 3 года назад

    Gg WhatsApp 😹

  • @shivnarayan718
    @shivnarayan718 3 года назад +1

    Bro can i talk to you...... Please

  • @thespecialchannel
    @thespecialchannel 2 года назад

    Russian accent 😂