Hacking Google Cloud?

Поделиться
HTML-код
  • Опубликовано: 12 янв 2025

Комментарии • 155

  • @d3caii
    @d3caii Год назад +266

    "Yep, I regret not hacking xyz" is something I tell myself everytime i see a writeup on the internet for anything :(. If only there was a easy way to fix my laziness/procrastination

    • @Timm2003
      @Timm2003 Год назад +7

      If u found a way pls let me know 😑

    • @Nunya58294
      @Nunya58294 Год назад

      It's called don't be an idiot.

    • @nabilrise1551
      @nabilrise1551 Год назад +6

      isn't that our biggest enemy ... our own procrastination

    • @Maxjoker98
      @Maxjoker98 Год назад +9

      Amphetamines. Cocaine.
      I'm kidding of course, these are at best short-term motivators. If you want to adopt a new behavior intentionally, one of the most important things is long-term motivation.
      You need to think "If only I did X, I'd be a little closer to goal Y", where Y is a goal that you can reach by continuously working on X.

    • @w花b
      @w花b Год назад +2

      ​@@Maxjoker98Adderall, Xanax.
      I'm not kidding tho.
      Just kidding ha ha...!

  • @logiciananimal
    @logiciananimal Год назад +78

    I think it is wonderful that Google is paying for third party research, made publicly available, not "just" bug hunting.

    • @mollthecoder
      @mollthecoder Год назад +5

      It's better to pay a few thousand for a bug to be responsibly disclosed then it be used maliciously and potentially cause millions in damage

    • @test-rj2vl
      @test-rj2vl Год назад

      @@mollthecoder Yep, that is true. If they don't pay, someone else will.

    • @monad_tcp
      @monad_tcp Год назад

      I don't think they are either bug hunting or doing user experience or anything on GCP because ITS AWFUL, that's why its cheaper than AWS or Azure

    • @monad_tcp
      @monad_tcp Год назад

      @@mollthecoder " potentially cause millions in damage" is anything serious using GCP ?

  • @gagep.7017
    @gagep.7017 Год назад +174

    Its always funny seeing some of the vulnerabilities in these bugbounties are so simple its baffling. "ah that would never work its so simple those engineers probably have 20 checks on it" Hindsight 2020 i guess after the fact

    • @kyle8575
      @kyle8575 Год назад +8

      Obviously outsiders can’t comment on the work environment, but if I had to guess it’s like this.
      1) Google wants a new feature
      2) Timeline is really short or engineers take their sweet time to procrastinate then rush it out
      3) Lacks proper checks and review
      4) Goes to production

    • @Golden2Talon
      @Golden2Talon Год назад +4

      yeah i always hear what kind of amazing engineer you have to be to work at FAANG and I guess 100 PhDs will block everything I do.... then I see this

    • @jeffwells641
      @jeffwells641 Год назад

      I think it's more likely just the fact that they are always trying to improve, and therefore always changing. The more you change, the more likely it is someone will make a mistake or two systems will interact in a way that will open one or the other up to a vulnerability that was formerly not possible.
      That's why the Google Cloud hacking competition is brilliant - for about the cost of a single software engineer, Google gets thousands of talented individuals discovering weaknesses in their system, most of which a Google engineer can then fix in like 5 minutes.

    • @amunak_
      @amunak_ Год назад

      It's also just that there's just *so much code* and *so many people* that things slip through easily.

    • @MegaTomPL2
      @MegaTomPL2 Год назад

      its like puzzle

  • @mathijsfrank9268
    @mathijsfrank9268 Год назад +55

    It would be an interesting video idea if you film the process of finding an actual vulnerability in something like Google cloud (if you actually manage to find one). Which you can release once the party has had time to fix it. It would give a more real world example of how you go about finding vulnerabilities that isn't just capture the flag.

    • @expandingsalad786
      @expandingsalad786 Год назад +9

      I don't remember which videos specifically, but I'm 99% sure he's done almost exactly this

    • @GoldbergToastyBred
      @GoldbergToastyBred Год назад +1

      @@expandingsalad786 can you name me 1 video pls

  • @Maxjoker98
    @Maxjoker98 Год назад +133

    I'm very surprised. At least 2 of these bugs could have been found by using a very basic bad-string library on the APIs arguments.

    • @ALZlper
      @ALZlper Год назад +7

      As long as you see this fix as a swiss cheese slice

  • @annorome
    @annorome Год назад +17

    Was exposed to Kubernetes Clusters in my work. I think, there is still unbelievably many bugs, we have no idea of. The more complex your cluster the higher the chance, that there is a misconfiguration. The juciest ones being at egress and ingress nodes (apart from the master node). Builing up your patience for it might be very fruitful! ;) And thank you of course for you insanely valuable content!

  • @andreibida
    @andreibida Год назад +28

    I don't know if it's just me, but these prizes seem absurdly low for what they're worth. And also considering software engineers at google get salaries in the range of hundreds of thousands per year, the reward is like what, a few weeks of pay for one of their employees? The first two prizes are more "worth", but even those are low compared to their value. It makes you wonder how many people find such exploits and instead of turning them in they'd rather sell them on the black market.

    • @LiveOverflow
      @LiveOverflow  Год назад +25

      This is just a bonus on top of the regular bounty reward ;)

    • @stewiegriffin6503
      @stewiegriffin6503 Год назад

      @@LiveOverflow Yes, bonus to yearly 100 $

    • @AGryphonTamer
      @AGryphonTamer Год назад +1

      @@stewiegriffin6503 $100? Where did you get that number? Google paid an average of $11k per vulnerability of chrome. And they paid out 12 million this year. A few rewards even going for hundreds of thousands.

    • @NoNameAtAll2
      @NoNameAtAll2 Год назад

      ​@@LiveOverflowhow big is "usual bouny reward"?

    • @AGryphonTamer
      @AGryphonTamer Год назад +2

      Google paid an average of $11k per vulnerability of chrome. With some going for hundreds of thousands. Even for software engineers that's not nothing. It's profitable people are building teams to find bugs, and Google paid out over 12 mill this year.
      Now let's say you're a skilled software engineer, and you find a vulnerability. Would you rather take your chances on the black market, where you'd be breaking the law, risk losing your job, getting arrested, and have no guarantee of getting paid, or get paid a not insubstantial (if not massive) amount 100% legally.
      I know what I'd pick.

  • @ArthurSchoppenweghauer
    @ArthurSchoppenweghauer Год назад +32

    Love how all of the prizes are variations on 1337.

    • @chill_melodies
      @chill_melodies Год назад +3

      all Google bounties have 1,3 and 7 always

  • @andrekz9138
    @andrekz9138 Год назад +10

    Finding bug bounties at this level is like panning for gold.

  • @Zivd101
    @Zivd101 Год назад +6

    Proud of Yuval's incredible work and findings 🙌

  • @RayfuzuLearning
    @RayfuzuLearning Год назад +3

    This is so cool. I just recently discovered your channel and you are already in my top 3 favorites. You inspire me so much to keep learning new things and experimenting with new technologies.

  • @FMontanari709
    @FMontanari709 Год назад +27

    Daaaamn if a team can win 4th to 2nd place does it mean there could be a team that would win all 7 places? (I know it's next to impossible, but I wonder what would it take)

    • @coldfire6869
      @coldfire6869 Год назад +13

      Let's find out. When are you free?

    • @Freakinkat
      @Freakinkat Год назад

      It's not impossible

    • @Freakinkat
      @Freakinkat Год назад +4

      ​@@coldfire6869yeah you got the right attitude, In good at Social engineering :D

    • @w花b
      @w花b Год назад +1

      Think bigger : a whole company.

    • @Freakinkat
      @Freakinkat Год назад

      @@w花b I'm dead ass serious, over here! I'm down AF! Y'all just lemme know what's up, we can link up then delete our post to ditch any evidence "Just in case there be lurker's" thank goodness for hiding in plain sight, it's a beautiful thing, truly it is.

  • @davidedias1922
    @davidedias1922 Год назад +14

    One clarification, don't use the phrase "PODs or containers" because first they are not the same thing, and for a bit of extra knowledge, PODs can have multi-containers inside of them. Love your work, keep it up!

    • @oblivion_2852
      @oblivion_2852 Год назад +1

      True but normally people referring to the other containers in a pod will be referring to a sidecar or init container.

  • @ktktktktktktkt
    @ktktktktktktkt Год назад +6

    The payout structure is a play on leet right? Didn't realize that was still a thing

  • @anonded
    @anonded Год назад +3

    "But, time issues can be solved with just, spending more time..."
    -LiveOverFlow @ 20:27

  • @omespino
    @omespino Год назад +2

    Congratulations to all the winners!

  • @Capiosus
    @Capiosus Год назад +7

    Is the entire video an advertisement? because the text stays in the top right corner the entire time

    • @LiveOverflow
      @LiveOverflow  Год назад +25

      well the video was sponsored by Google. So I should probably clearly and transparently disclose that ;)

  • @JGerard0
    @JGerard0 Год назад +2

    I really enjoy watching your videos; they motivate me to keep studying.

  • @nysdehm9966
    @nysdehm9966 Год назад +1

    Great Ed Sheran teaching us about hackin

  • @mugosquero
    @mugosquero Год назад +1

    Good to see "Buğra" here, he's a teenager from Turkey, I saw his video on "Google Cloud OS Command injection" but didn't know he won the prize. Let the 'mdisec' community rise.

  • @DiddleDangle
    @DiddleDangle Год назад +2

    That's fucking genius with the image drag n drop.. good lord.

  • @Paintballman251
    @Paintballman251 Год назад

    It’s so crazy hearing the theme tune for liveOverflow for ages and then realise it’s by Gunnar who I just saw with Puscifer! How crazy

  • @TBadalov
    @TBadalov Год назад +4

    I laughed a lot at every recap saying "We'll see if I regret" :D

  • @SuperLlama88888
    @SuperLlama88888 Год назад

    Wow, great video! You should definitely try next year!

  • @vygh1957
    @vygh1957 Год назад +2

    What's up with the "Advertisement" hanging out at the top right corner for the entire duration of the video?

    • @AGryphonTamer
      @AGryphonTamer Год назад +2

      The entire video was paid for by Google, and google used it on their own page. So it kind of makes sense to declare it.

  • @voluntad.
    @voluntad. Год назад +1

    Really interesting, thanks for the upload.

  • @cemkaaidarov2415
    @cemkaaidarov2415 Год назад

    You are great as always, thanks!

  • @10FactsShow-10factshow
    @10FactsShow-10factshow Год назад +1

    Hy I am from Pakistan and stuck in a question, I just want to know how x86-64 Architecture processor know what is the required privilege level of the instruction or what privilege required to execute fetched command or with what it should compares CPL when executing the command. I Hope you will understand my question and respond to architect security enthusiast like you. Thanks

  • @bruteforce7746
    @bruteforce7746 Год назад

    Thanks for this nice content.
    So surprised with Ssh key injection, is crazy.

  • @Rune.
    @Rune. Год назад

    love how all the prize money is variations of 1337

  • @803titan
    @803titan Год назад +7

    Hey man I love the work you do the breakdowns are incredible. Really loved the description of Sockpuppet and wondering if you’d do more with iOS/xnu. The FORCEDENTRY (Triangulation) vulnerability is very intriguing (zero click) and I’m still purposefully in the cross hairs on iOS 14.2. Would you please look into these CVE to see if there is a potential video for the channel and us viewers? RCE with no interaction from a user 😱

  • @CheritPL
    @CheritPL Год назад +1

    Sorry for offtop but...from the security researcher perspective, what do you think about passkey?

  • @Schoko4craft
    @Schoko4craft Год назад

    Can you make a video how dangerous extensions are (Browser, VSC)? I think its quite hard to find sources on that that are not like "its really dangerous" but yet everyone uses them.

  • @skifli
    @skifli Год назад +2

    Why does the video say `advertisement` in the top all through the video?

    • @LiveOverflow
      @LiveOverflow  Год назад +1

      it's a sponsored video, so I want to transparently disclose this

    • @skifli
      @skifli Год назад

      @@LiveOverflow Oh ok that makes sense, thanks.

  • @dani33300
    @dani33300 Год назад

    Why is the 6th place prize money at 3:14 displayed as 13,373$ when it could have been much cooler as 13,337$?

    • @hansmuds6018
      @hansmuds6018 Год назад

      Because 7th place was 13,337$ already

    • @dani33300
      @dani33300 Год назад

      @@hansmuds6018 True. Should have been 13333.37$ to avoid this issue.

  • @lPlanetarizado
    @lPlanetarizado Год назад

    i admit i tried the command shell last year but at the end i just didnt continue...damn....this year i proposed myself to learn more abour kernel windows, and stuff, but i think i must dedicate some time to google

  • @NeoKailthas
    @NeoKailthas Год назад +3

    I honestly think 100k is not enough for finding these bugs. consider how large google is.

    • @AGryphonTamer
      @AGryphonTamer Год назад +1

      This is just a bonus prize. Google paid 12 mill in bounties this year, Some going for hundreds of thousands.

  • @Mitsunee_
    @Mitsunee_ Год назад

    Google's product naming is so confusing. Is this Google Cloud as in Drive and Docs or Google Cloud as in GCP? And what is Google One and where did that suddenly come from??

  • @SRG-Learn-Code
    @SRG-Learn-Code Год назад

    why to ssh in the browser?

  • @monad_tcp
    @monad_tcp Год назад

    I might have found that last SSH problem by mistake when typing my username, but I was too busy to care.

  • @navagationvrvideos7445
    @navagationvrvideos7445 Год назад +1

    Good video.

  • @itech7354
    @itech7354 Год назад +5

    Please make bypass biometric security

    • @poglin_or_smh
      @poglin_or_smh Год назад +2

      Plastic surgery

    • @kmcat
      @kmcat Год назад

      Finger print scanners are easy and sometimes messy

    • @Capiosus
      @Capiosus Год назад

      gj u are first

  • @Rhidayah
    @Rhidayah Год назад +1

    We will see,,
    *5 years later:*
    We will see

  • @rickmonarch4552
    @rickmonarch4552 Год назад

    why do pentesters have the most random accounts?

  • @CallousCoder
    @CallousCoder Год назад

    130k for god knows who much time, is a bad pay. A good security engineer who goes freelance will turn that over in a year, here in NL and D. And unlike bug bounties this income js a continuous income source.

    • @LiveOverflow
      @LiveOverflow  Год назад +8

      The winner did this work as an employee at paloaltonetworks. So this is just an extremely juicy bonus ;)

    • @CallousCoder
      @CallousCoder Год назад

      @@LiveOverflow then it’s nice yeah 😄Until Der Steuerambt drops by I heard that in Germany it’s also as bad as here in NL these days. With the governments basically stealing income from its citizens without proper representation. 😏

    • @AGryphonTamer
      @AGryphonTamer Год назад

      This is just a bonus prize. Google paid 12 mill in bounties this year, Some going for hundreds of thousands. So that top prize probably made them 800-900k.

    • @CallousCoder
      @CallousCoder Год назад

      @@AGryphonTamer my point is that it’s not a guaranteed income and also pays relatively poorly. You can hunt for months and only land 17k. Where’s of your are that good in security work and you do hire yourself out you’ll earn that guaranteed in a month. If you do it as a hobby next to your job it’s okay. But I’ve heard of kids trying to do this to pay for college. Than it’s a poor investment of your time.

  • @manashalder1206
    @manashalder1206 Год назад

    This month I reported 2 bugs in Google products, both were Triaged, 1. P4 to P3 2. P2 . But they came with final result that, they want some serious impact on that..still working on those and one more I reported few days ago which sleep SQLI injection.. hope this one will get Triaged and will get my reward 😢 also had one bug which was Triaged, more than 2 months ago in Microsoft, they are taking so much time.

  • @AGryphonTamer
    @AGryphonTamer Год назад

    FYI These are just bonus prizes. Google pays hundreds of thousands for top bounties, this is just extra.

  • @NameName-rk6ov
    @NameName-rk6ov Год назад

    Can you do a video on deleting Google drive. This guy I used to date keeps gaining access to my computer and phone and I can't get help bc he's an expert. The police literally don't do anything because they don't understand... Please post a video on this.

  • @helbertgascon
    @helbertgascon Год назад

    Hello there fellow VRP Hall of Famers! 😅
    Although I don't think they label us as HoF anymore though.

  • @RandomKSandom
    @RandomKSandom Год назад

    Kudos to Google for doing this, and for the researchers for participating

  • @arg_mark
    @arg_mark Год назад

    5:20 wtf. Literally.

  • @ste1747
    @ste1747 Год назад

    Organisations, developers should learn from google :)

  • @stellabckw2033
    @stellabckw2033 Год назад

    fell victim of one of those oauth thing a long time ago

  • @TheSkepticSkwerl
    @TheSkepticSkwerl Год назад

    Google should write more code in rust. 😂

  • @productiveinefficiency
    @productiveinefficiency Год назад +2

    noice!

  • @bruteforce7746
    @bruteforce7746 Год назад

    I was always wary of cloud console from the day i used it and keep telling myself how many bugs that would have.
    You know that weaknesses under the hood but nevertheless you use it because it is convenient and lazy.
    What socked me is how secure SLDC practices, pentests etc can not find such major holes

  • @motdde
    @motdde Год назад

    Makes me wanna take out KCAD away from my resume.

  • @vincistradivarius7381
    @vincistradivarius7381 Год назад

    Daemon set trampolines...

  • @aswins7781
    @aswins7781 Год назад

    Sreeram KL ♥

  • @clickbaitlover8590
    @clickbaitlover8590 Год назад

    why are those prizes all weird numbers? lol

  • @tg7943
    @tg7943 Год назад

    Push!

  • @MikeHawk-xl4xd
    @MikeHawk-xl4xd Год назад

    let us hold a minute's silence for the 7 poor people who lost their jobs

  • @LexiLominite
    @LexiLominite Год назад

    Honestly, I didnt understand so many things in this video. This gives me Imposter Syndrome. I should develop myself!

  • @attention_shopping
    @attention_shopping Год назад

    so gr8

  • @Freakinkat
    @Freakinkat Год назад +1

    I was SOOOO MF CLOSE!!! SOO FLIPPING CLOSE!!!!!!!!!! Meh :|

  • @nick-pu4zae
    @nick-pu4zae Год назад

    i use it as a ide

  • @TheStrandedAlliance
    @TheStrandedAlliance Год назад

    Leet bounties.

  • @LauriePrescott
    @LauriePrescott 11 месяцев назад

    I dont know how i would owe $100

  • @nocapstoast
    @nocapstoast Год назад +2

    LETSS GOO!

  • @Popunkwillneverdie
    @Popunkwillneverdie Год назад

    👋

  • @thetrends5670
    @thetrends5670 Год назад

    Thankfully, you didn't participate; otherwise, no one will have won.

  • @nictibbetts
    @nictibbetts Год назад +2

    I work for big tech and I knowingly introduce zero day exploits.

  • @stewiegriffin6503
    @stewiegriffin6503 Год назад

    regarding small rewards, I would rename the contest to "Google's annual intellectual prostitution awards".

  • @Mordinel
    @Mordinel Год назад

    Feels weird seeing such high payouts for the kind of stuff I find at work on a weekly basis

    • @fr5229
      @fr5229 Год назад

      Doubt it

    • @Mordinel
      @Mordinel Год назад

      @@fr5229 not the last one, not without a team. Most of these bugs are quite simple all things considered, very reminiscent of stuff I find at my day job.

    • @sudhanshurajbhar9635
      @sudhanshurajbhar9635 Год назад

      Finding the same bug at Google is a different thing than any random xyz target.

    • @Mordinel
      @Mordinel Год назад

      @@sudhanshurajbhar9635 Did you even watch the video?

  • @siimtulev1759
    @siimtulev1759 Год назад

    o.O

  • @Cracko298
    @Cracko298 Год назад +2

    First

    • @ees4.
      @ees4. Год назад +1

      not

  • @drewmcbride3027
    @drewmcbride3027 Год назад

    *Promo sm*

  • @methylamine5491
    @methylamine5491 Год назад

    Wanna get off google cloud.. Can you do a video explanation on how you can make the copy of your data that they send back to its original file type?

  • @BusinessWolf1
    @BusinessWolf1 Год назад

    that thumbnail is garbage, this videos was easily a 200k view one with a better thumbnail

  • @ProPlayerkdjxus
    @ProPlayerkdjxus Год назад

    Russian

  • @stewiegriffin6503
    @stewiegriffin6503 Год назад

    That's the problem with IT today. People will do anything for few dollar or little bit fame.
    Real businessman would never give this info for free or cheap.

  • @Creator_JK
    @Creator_JK Год назад

    Sprichts du Deutsch...?

  • @kim15742
    @kim15742 Год назад

    I am certain with his knowledge, LiveOverflow could get a job paying the equivalent of $133k. It seems he does not and chose a job that brings him more joy. I respect that

  • @Doninhas
    @Doninhas Год назад

    How can you hate kubernetes. It's just awesome :D

  • @vick7042
    @vick7042 Год назад

    So now Ed Sheeran is a tech expert?

  • @ROBOTRIX_eu
    @ROBOTRIX_eu Год назад

  • @m0j0x00
    @m0j0x00 Год назад +2

    I just got a motivation that if a google can have basic issues, i can find them too in hackerone programs. :( ultimately i struggle to focus because i just want a quick win :(