The Hacker who could turn on ANYONE'S Zoom Camera [Zero-Day]

Поделиться
HTML-код
  • Опубликовано: 21 сен 2024

Комментарии • 147

  • @DanielBoctor
    @DanielBoctor  10 месяцев назад +7

    JOIN THE COMMUNITY ➤ discord.gg/WYqqp7DXbm
    ♥ thank you for all of the support ♥

  • @chriss3404
    @chriss3404 9 месяцев назад +89

    Classic SQL injection and a nice explanation to go with it!
    Text encoding was def not the first thing on my mind when thinking about possible escapes, and I guess it wasn't on the mind of the person that tried to manually sanitize SQL input either!

    • @mudi2000a
      @mudi2000a 7 месяцев назад +5

      They just should use parameters. Then you don’t need to sanitize anything because you can’t inject anything. Not using parameters is a classic beginners mistake. Also I think this should be caught by static code analysis tools which maybe they should have used at Zoom.

  • @capability-snob
    @capability-snob 10 месяцев назад +46

    We tend not to ship debug symbols by default with open source programs either - they tend to be much larger than the compiled program itself.

  • @eyephpmyadmin6988
    @eyephpmyadmin6988 10 месяцев назад +44

    "Cant read the source code" Ghidra has entered the chat

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +16

      yep, that's actually what the researcher used to locate the SQLite functions 🤯

    • @MaxCE
      @MaxCE 6 месяцев назад +5

      ghidra still can't tell you the function names

    • @king_james_official
      @king_james_official 5 месяцев назад +1

      that's not source code

  • @amaankhan8436
    @amaankhan8436 10 месяцев назад +28

    Criminally underrated channel. Keep up the good work man you'll make it big

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +2

      That's the dream 🚀 Thanks for the support

  • @0xgordo350
    @0xgordo350 10 месяцев назад +38

    Great video! That explanation of unicode was perfect.

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +3

      Thanks for the support! Glad you liked it 😊

    • @BillAnt
      @BillAnt 7 месяцев назад +2

      ​@@DanielBoctor- Loved it with the great explanation. :)

    • @DanielBoctor
      @DanielBoctor  7 месяцев назад +2

      @@BillAnt Thank you!

  • @b33thr33kay
    @b33thr33kay 10 месяцев назад +164

    Wow! Very well explained, thank you!
    EDIT: my only complaint is the title. It's makes it look like a recent exploit, which is clickbaity and not very nice. I don't think you need to resort to that. 🙂

    • @cooldestroyer1
      @cooldestroyer1 10 месяцев назад +11

      A channel can only upload about this type of stuff when it gets patched.

    • @aurilly_
      @aurilly_ 10 месяцев назад +4

      @@cooldestroyer1yea and it was patched in june 2020

    • @SlitheringDemon
      @SlitheringDemon 10 месяцев назад +3

      ​@@cooldestroyer1but still makes it look like it's recent

    • @B1ADE99
      @B1ADE99 10 месяцев назад +1

      Obviously worked on you

    • @cooldestroyer1
      @cooldestroyer1 10 месяцев назад

      @@B1ADE99 I stopped watching very early:/

  • @nournote
    @nournote 10 месяцев назад +25

    Very well explained. Lots of small things to learn, not only a story telling content. Just keep up.
    Subscribed.

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +2

      Thanks! Glad you have you aboard :)

  • @gh0stm0nst3r6
    @gh0stm0nst3r6 10 месяцев назад +14

    Oh my goodness. This is such fantastic knowledge. You explain things phenomenally. Thanks so much.

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +2

      LOOOOOL I'm glad it was helpful! Glad you have you here! Thanks for the support ❤️

  • @junosoft
    @junosoft 10 месяцев назад +9

    Seems very well explained. Still didn't finish the video, but so far so good. Keep it up

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +2

      Will do! More is on the way 🚀. Thank you for the support

  • @ByronShingo
    @ByronShingo 7 месяцев назад +2

    Another eloquent description of a fascinating piece of software security history, brilliant as always.

  • @cancerino666
    @cancerino666 10 месяцев назад +5

    Why a new company like Zoom decided to use SQL with all of it's string-based vulnerabilities baffles me.

    • @mattm7378
      @mattm7378 8 месяцев назад

      It wasn't a mistake. Zoom has been caught out working with gov agencies to essentially steal info from both individuals and organizations. Essentially is a gov tool for blackmail and info stealing (source twitter files)

  • @m4rt_
    @m4rt_ 10 месяцев назад +10

    4:33 and if you want it be more of a hell for people who want to reverse engineer your stuff, you can tell the compiler to generate a stripped binary.
    On Linux you can do this using the "strip" command. You could use it like this "strip binary -o stripped_binary"
    or you can do it with the "-s" flag if you are using GCC.

    • @mudi2000a
      @mudi2000a 7 месяцев назад +1

      Stripped binary is also much smaller and thus always a good thing.

    • @davikad-quirkies
      @davikad-quirkies 6 месяцев назад

      yup I love using Linux

    • @restoreleader
      @restoreleader 2 месяца назад

      So whats the catch? Why is it not used by default by everyone?

  • @Impracticallypractical
    @Impracticallypractical 9 месяцев назад +4

    Great video! Well explained! Only correction is that SQL doesn’t use `//` for comments. It uses `--`.

  • @dcquence
    @dcquence 10 месяцев назад +7

    Very interesting. I cannot get over the upward inflection on every sentence though

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +4

      Ughhhhhhh I know, I do it while I'm filming without realizing it . I'm trying to fix it though.

    • @qps9380
      @qps9380 5 месяцев назад +1

      @@DanielBoctor Honestly man, wasn't an issue for me at all. Super interesting video!

  • @whoman0385
    @whoman0385 10 месяцев назад +2

    I honestly thought I was watching from a big channel, your so underrated, keep it going!

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +1

      THANK YOU! I appreciate the support! More is on the way 🚀🚀🚀

  • @mbhv-ll9lq
    @mbhv-ll9lq 10 месяцев назад +2

    How do you not have more than million subscribers? What. you deserve more. keep up the great work!

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +1

      Thank you! You are a highly awesome fella keep on spreading that positivity

  • @vanzylv
    @vanzylv 9 месяцев назад +1

    Very interesting and technically informative. You have a elegant way of explaining things. Thanks!

    • @DanielBoctor
      @DanielBoctor  9 месяцев назад +2

      Glad you found it helpful! Thanks for the support I appreciate it 😊

  • @VG-or1nu
    @VG-or1nu 9 месяцев назад +1

    I typically find myself frustrated, or have little patience for videos that fail to delve deeply… (as in all the over-hyped/dumbed-down clickbait that plagues this site)… Luckily this video was a pleasant surprise with its depth and steady quality. 👍

    • @DanielBoctor
      @DanielBoctor  9 месяцев назад +1

      Glad you liked it! Thanks for the support

  • @Isaac-se6ye
    @Isaac-se6ye 9 месяцев назад +2

    great explanation and editing!

    • @DanielBoctor
      @DanielBoctor  9 месяцев назад +1

      Thanks for the support, I appreciate it 😊

  • @Jiyoon02
    @Jiyoon02 6 месяцев назад

    Wow... Vulnerabilities like this one convince just how important it is to implement a web-cam cover and a physical mic on/off togle, just for a percussion. A simple step like that goes quite a long way, it seems.

  • @HydratedBeans
    @HydratedBeans 5 месяцев назад

    I love your channel, but also hate realizing that there’s no real way to defend against these things proactively.

  • @flipflopsn
    @flipflopsn 6 месяцев назад

    Great video, directly subscribed to your channel.
    Keep on doing great videos like these!
    ----
    EDIT:
    Maybe mention tools like IDA or BinaryNinja for reverse engineering. It's not about giving the "bad guys" more information (because we assume they already have them), it's about spreading knowledge across the good guys (White-Hats) to expand their knowledge and being faster/quicker in finding new vulns than the opposition.
    ----
    Nevertheless you did a great job related to the reversing procedure (e.g. the short analysis of the sqlite lib)!

  • @accountaccount3840
    @accountaccount3840 9 месяцев назад +1

    Great explanation. Thanks for these videos 😊😊😊

    • @DanielBoctor
      @DanielBoctor  9 месяцев назад +1

      Glad you liked it! Thanks for watching 😊

  • @SteveProjectX
    @SteveProjectX 3 месяца назад

    Great content man. Thank you.

  • @AlexandreGTavares
    @AlexandreGTavares 10 месяцев назад +1

    Happy this was on my recommended, nice one

  • @hgbugalou
    @hgbugalou 6 месяцев назад

    I now understand unicode encoding.

  • @Grinwa
    @Grinwa 10 месяцев назад +1

    Absolutely wonderful ❤
    And that was super genius method to trick sql once again

  • @Anthonyfromtheuk-g3j
    @Anthonyfromtheuk-g3j 10 месяцев назад +1

    Internation man is Hereeer? 🎉

  • @joseville
    @joseville Месяц назад

    Another great video!!!

  • @altaccount648
    @altaccount648 10 месяцев назад +1

    jokes on you i don't have a camera

  • @m4rt_
    @m4rt_ 10 месяцев назад +5

    Damn that UTF-8 trick is clever.

  • @RoterFruchtZwerg
    @RoterFruchtZwerg 7 месяцев назад

    Nice 👍 I thought the whole reason why utf-8 subsequent bytes have to start with 1 is to prevent exactly this - a utf-8 start byte eating away ASCII characters. So the utf-8 decoder is also at fault here? It should have stopped decoding...

  • @thisismygascan4730
    @thisismygascan4730 9 месяцев назад +1

    is there any reason zoom would have decided to manually implement the input sanitization

  • @larry1851
    @larry1851 10 месяцев назад +2

    Such a great video. Glad i found you! Keep going and you shall succeed.

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +1

      Thank you for the support! Glad you have you apart of the community

    • @larry1851
      @larry1851 10 месяцев назад +1

      @@DanielBoctor somehow evertime I ask myself something while you explain something somehow you clear it up right the next second. It’s a pleasure to watch and I learned a lot.

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +1

      That's awesome LOL. I appreciate all of the support, and I'm glad you're able to learn from them! It's the reason why I make these videos

  • @TheTankiPlayer
    @TheTankiPlayer 9 месяцев назад

    Cool video, just wanted to add that debug symbols are not necessary for debugging

  • @przemeu1353
    @przemeu1353 10 месяцев назад +1

    Great job you getting my sub.

  • @Jango1989
    @Jango1989 7 месяцев назад +1

    Brilliant video

  • @spinniboi
    @spinniboi 9 месяцев назад +1

    this is basically a Kevin Fang video

    • @DanielBoctor
      @DanielBoctor  9 месяцев назад +2

      Never heard of him before, but you're definitely right - we even both use LEMMiNO's music LOL

  • @John-ix6iw
    @John-ix6iw 9 месяцев назад

    kind of like that one darkweb movie when the charons joined the call 💀

  • @kodzisko-gd7fc
    @kodzisko-gd7fc 9 месяцев назад +1

    great video

  • @vnc.t
    @vnc.t 9 месяцев назад +1

    isn't it a sqlite bug as the utf-8 encoder assumes the 10xxxxxx instead of checking for it and raising an error if the first 2 bits weren't 1 and 0? why was it reported to zoom?

    • @DanielBoctor
      @DanielBoctor  9 месяцев назад +2

      Yeah, that definitely shouldn't have happened, but it's technically up to SQLite how they want to treat their encodings ¯\_(ツ)_/¯
      The deeper source of the vulnerability was the discrepancy in the way that Zoom and SQLite handled encodings. Zoom treated input as plaintext, while SQLite treated the backslash (\) as an escape, indicating that the following hexadecimal sequence was Unicode. Regardless how how SQLite handled those encodings, it was the discrepancy at the end of the day that enabled any of this to be possible, and the onus is on Zoom to deal with that.

  • @ntrq
    @ntrq 9 месяцев назад +1

    nice man

  • @happyjohn1656
    @happyjohn1656 9 месяцев назад

    This was a great vid

  • @bigyoshi4555
    @bigyoshi4555 9 месяцев назад

    i do not know what most of the things are or mean but i still watch it anyway cuz it sounds interesting

  • @bigbilly29
    @bigbilly29 10 месяцев назад +1

    Great breakdown, thanks for the video!

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +1

      Thanks! Glad you liked it 😊

  • @pabloenriquegorga4222
    @pabloenriquegorga4222 10 месяцев назад +2

    Outstanding ! cool video !

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +1

      Thank you! Glad you have you here

  • @ahndeux
    @ahndeux 10 месяцев назад +1

    That is why I put electrical tape over all cameras on laptops. That will never be hacked.

    • @Hauketal
      @Hauketal 10 месяцев назад

      Sometimes the camera is actually wanted. There are laptops providing a mechanical slider, or one can 3D-print a clamp to put over the lens. Easy to reverse and doesn't leave gooey residue.

    • @mudi2000a
      @mudi2000a 7 месяцев назад

      You can buy a Lenovo they have a built in mechanical cover for the webcam so you can easily cover it when not in use.

    • @everyhandletaken
      @everyhandletaken 7 месяцев назад

      You had better do the same for the microphone then too 😂

  • @CheckmateRubik
    @CheckmateRubik 10 месяцев назад +1

    Great Explanation!

  • @jerichaux9219
    @jerichaux9219 10 месяцев назад

    I'd thought I'd recognized Lemmino's music there

  • @RonaldTrumpOfficial
    @RonaldTrumpOfficial 9 месяцев назад

    Well, to this hackers dismay I’m too poor to afford a webcam!

  • @TheControlMastr
    @TheControlMastr 9 месяцев назад

    Make a reverse engineering video tutorial, geniuenly interested!!!!

  • @chengong388
    @chengong388 6 месяцев назад

    I don’t program but I know you can debug binary because I know how to do some basic binary editing with cheat engine.

  • @WackoMcGoose
    @WackoMcGoose 9 месяцев назад +1

    _taps forehead_ Can't turn on my camera if I never have it plugged in...

  • @gorg212
    @gorg212 10 месяцев назад +1

    You sound exactly like code with lewis lol

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +1

      LOOOOOOOOOL I NEVER HEARD OF HIM BEFORE BUT I ACTUALLY DO

  • @Tavern_Talk
    @Tavern_Talk 9 месяцев назад +2

    Fr

  • @s0kulite
    @s0kulite 9 месяцев назад +2

    I can’t help to say that you’re pronouncing SQLite with an extra L, it’s “Ess-Queue-Lite”, without that extra L.

    • @DanielBoctor
      @DanielBoctor  9 месяцев назад +2

      I didn't even think of it that way LOL

  • @ankk98
    @ankk98 10 месяцев назад +1

    Good explanation

  • @BanglaBitTheAi
    @BanglaBitTheAi 10 месяцев назад +1

    Well explained

  • @eyephpmyadmin6988
    @eyephpmyadmin6988 10 месяцев назад +1

    I have a self sqli on a android app for a bug bounty. Im not sure how to make it viable. It is using sqlite too. Trying to find any other vuln to chain with it. Been sitting on it for a month

  • @VVVutov
    @VVVutov 7 месяцев назад

    Shit. I watch it but suddenly i figured thats the guy with the "girl with a attitude voice" Dude, find somebody to do a voiceover for you

    • @DanielBoctor
      @DanielBoctor  7 месяцев назад

      this was actually my last video with this issue, if you check out my subsequent ones, they should be fine

  • @novelhawk
    @novelhawk 9 месяцев назад

    This is full of inaccuracies

  • @neilmeich
    @neilmeich 6 месяцев назад

    nice

  • @NahImPro
    @NahImPro 10 месяцев назад

    Find some verifiable sources to link on the next one

  • @parthsahni8952
    @parthsahni8952 10 месяцев назад +1

    Very nice vid

  • @sekiro_19
    @sekiro_19 10 месяцев назад

    Lost to sql injection 😂

  • @dogedev12
    @dogedev12 10 месяцев назад

    bro April 7th is my birthday lol

  • @procactus9109
    @procactus9109 9 месяцев назад

    This is not easy to listen too.. are you drunnnnnk ?

  • @mikee.
    @mikee. 9 месяцев назад

    Great video, horrible clickbait.

  • @AurraKo
    @AurraKo 10 месяцев назад +1

  • @bigbilly29
    @bigbilly29 10 месяцев назад +1

    If you get a nebula account ill drop a sub to it

    • @DanielBoctor
      @DanielBoctor  10 месяцев назад +1

      It's an honour to be considered nebula worthy LOL

  • @iseverynametakenwtf1
    @iseverynametakenwtf1 9 месяцев назад +2

    the way you are changing the way you talk is bad, just go with your natural tone, it will come off easier to listen to. I had to stop

    • @DanielBoctor
      @DanielBoctor  9 месяцев назад +2

      I think I finally fixed my intonation in my most recent video

    • @iseverynametakenwtf1
      @iseverynametakenwtf1 9 месяцев назад +1

      will be checking it out, you are interesting @@DanielBoctor

    • @DanielBoctor
      @DanielBoctor  9 месяцев назад +1

      thank you LOL you are one awesome fella

  • @aoe4_kachow
    @aoe4_kachow 6 месяцев назад

    Nice topic but boring because you explain too many noob details

  • @metalwellington
    @metalwellington 9 месяцев назад +2

    upspeak. come on.

  • @matthewkeen6281
    @matthewkeen6281 6 месяцев назад

    nice