$130,000+ Learn New Hacking Technique in 2021 - Dependency Confusion - Bug Bounty Reports Explained

Поделиться
HTML-код
  • Опубликовано: 10 окт 2024
  • НаукаНаука

Комментарии • 61

  • @BugBountyReportsExplained
    @BugBountyReportsExplained  3 года назад +6

    Welcome to the comment section!
    First, thanks for watching!
    Make sure you are subscribed if you liked the video!
    ruclips.net/user/BugBountyReportsExplained
    Follow me on twitter:
    twitter.com/gregxsunday
    ✉️ Sign up for the mailing list ✉️
    mailing.bugbountyexplained.com/
    ☕️ Support my channel ☕️
    www.buymeacoffee.com/bountyexplained
    🖥 Get $100 in credits for Digital Ocean 🖥
    m.do.co/c/cc700f81d215

  • @developright7890
    @developright7890 3 года назад +9

    Atleast with NPM you're supposed to use namespaces when installing packages. For example @company/example-package would check within a .npmrc file and check if @company correlates to a pirate registry

  • @piguyalamode164
    @piguyalamode164 2 года назад

    The most interesting part is that the way it is set up makes a lot more sense if say you where part of a group of people doing package maintenance who had a dev version on a private server and a public version on the pip repo. Thus, once you had a full update ready, you could update the one in the repo to a higher version than yours and then automatically have everyone on your team update to the consumer version.

  • @mukundbhuva
    @mukundbhuva 3 года назад +2

    I was eagerly waiting for the video 😍

  • @-bubby9633
    @-bubby9633 3 года назад +1

    So well explained! Very easy to understand. Love it when a new attack vector is found.

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +1

      Thanks Andrew. I am also soo amazed when it seems like it will be a long time before a new impactful vuln and then someone comes up with that.

  • @cybersecurity3523
    @cybersecurity3523 3 года назад +4

    Good job bro

  • @JoaquinRamirez
    @JoaquinRamirez 3 года назад +2

    Amazing job , like always!

    • @TheKing-ul5pw
      @TheKing-ul5pw 3 года назад

      ruclips.net/video/uNSxrWCwUqQ/видео.html

  • @cataAZU47
    @cataAZU47 3 года назад +2

    Hi, I want to congratulate you on your quality content and just wanted to ask where do you find about all those bounty reports, can you give us some links for some daily reading? Thanks and keep up the awesome work!

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +3

      Hi, thanks for your comment. I usually find all reports on intigriti's bug bytes newsletter. There should be a few hours of good reading there ;)

  • @RN-kl4kp
    @RN-kl4kp 3 года назад +1

    Thanks for the video I was lit confused when I read the article on dependency pkg names , thanks to you now I know where to look for . But I won't try it out as I don't know how to retrieve the data from server or write custom malware without a template structure .

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +2

      I think malware is an overstatement for a script that gets username, hostname and path back to your dns server. It's not that hard

    • @mase289
      @mase289 3 года назад

      @@BugBountyReportsExplained Stuck to at coming up with a POC on an issue i found with a NPM package on a bounty program. Do you mind throwing more light on this? Great video as always!

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад

      what exactly are you stuck with?

    • @mase289
      @mase289 3 года назад

      @@BugBountyReportsExplained Creating a node js preinstall script which will phone home to my server once my malicious package is installed on the victim machine. I am basically trying to capture the same details as explained in your video so i can submit a POC.

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +1

      @@mase289 ok, dm me on twitter

  • @YoutubeShorties69
    @YoutubeShorties69 2 года назад

    I discovered this channel recently. You explain things very easly!

  • @abdssamadelbaraghi9477
    @abdssamadelbaraghi9477 3 года назад +1

    great content, keep up the good work.

  • @Xpl0itme921
    @Xpl0itme921 2 года назад

    Can you make a video how to find this vulnerability

  • @ppan
    @ppan 3 года назад

    You sir are my favorite youtuber, no BS no Drama only pure 'Gem' :)

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +1

      thank you a lot vishaesh!

    • @ppan
      @ppan 3 года назад

      @@BugBountyReportsExplained I was unable to visit www.buymeacoffee.com/bountyexplained, is there another way to support you? :)

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +1

      @@ppan That's very kind and I feel really appreciated ;) at the moment there's no way to support me. I decided that if I want to receive money from viewers, it will be in exchange for some more content from me - I don't want to receive it just like that. So I'm working on a BBRE premium where I will create more (details soon) for paid subscriptions. It's planned to launch in August ;)

    • @ppan
      @ppan 3 года назад

      @@BugBountyReportsExplained sounds sincere and great! I look forward to it :)

  • @BinaryByte
    @BinaryByte 3 года назад

    Thanks for the video. Nice explanation.

  • @theologos3705
    @theologos3705 3 года назад +1

    Can i ask you something else?
    I found on a website an error that says Jade Compiler Exception and contains different informations.Have you ever heard about this?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +1

      jade is template engine for npm. You can try to trigger server-side template injection.

  • @Thunder-dp7du
    @Thunder-dp7du 3 года назад +1

    Well explain thanks bro

    • @TheKing-ul5pw
      @TheKing-ul5pw 3 года назад

      ruclips.net/video/uNSxrWCwUqQ/видео.html

  • @0xrugb
    @0xrugb 3 года назад

    Thanks man

  • @sanya2311
    @sanya2311 3 года назад

    When for example an automated system installs our package instead of the official one, then the application may crash right? Isn't that a problem, when doing bug bounties? Maybe I misunderstood something, please explain me. (Anyway fantastic video as always:) )

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +2

      That's a very valid question. That's the risk. However, I hope that most systems will build QA/test/staging environment first and once it fails because of that then the change will not be pushed to the production env, so customers won't be affected.

  • @theologos3705
    @theologos3705 3 года назад

    Can i make you a question?Do you know if cisco gives any bounty or certificate,if you find bug?Thanks!!

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад

      you should email psirt@cisco.com
      Cisco has wide-used solutions so you might even get a CVE

    • @theologos3705
      @theologos3705 3 года назад

      @@BugBountyReportsExplained Do you know if they are giving CVE for exposed log files?Thanks!!

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад

      @@theologos3705 I dont know, but I think you should report it anyway

  • @Cyber-jv8ve
    @Cyber-jv8ve 3 года назад

    If i report this time dependency confusion bug will it get accepted?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад

      You will be better off by reading the program rules. If you prove the impact it should be accepted but it's not hard to break something with this vulnerability so watch out.

    • @Cyber-jv8ve
      @Cyber-jv8ve 3 года назад

      @@BugBountyReportsExplained can you maybe give me a scirpt to show the impact?

  • @ПашаМороз-з5ч
    @ПашаМороз-з5ч 3 года назад +3

    Mr. Author, I have a one question
    Is DevOps a good main job to learn pentest as a hobby?
    P.s.
    The video is amazing

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +4

      Hi, thanks for the question. DevOps and pentesting are correlated and knowledge from both areas can help in the other one. There's also a new trend called DevSecOps, where Sec stands for security. For example, such person has to build secure pipeline and integrate security tools in the process. If you are interested in both areas this might be a good direction for you.

    • @ПашаМороз-з5ч
      @ПашаМороз-з5ч 3 года назад

      @@BugBountyReportsExplained Thanks for the answer

  • @zTech300
    @zTech300 3 года назад

    Super.

  • @MohitSharma-xf9wp
    @MohitSharma-xf9wp 3 года назад

    appreciated

  • @ronakkatariya3575
    @ronakkatariya3575 3 года назад

    Sir how can i start bug bounty ?
    Expecting a detail answer

  • @MuhammadHamzah
    @MuhammadHamzah 3 года назад

    nice 😲

  • @SrTCOT
    @SrTCOT 3 года назад +2

    🔥🔥🔥🔥

  • @eXfilPr4tik
    @eXfilPr4tik 3 года назад +2

    😮😮

  • @unkn0wn238
    @unkn0wn238 3 года назад

    ❤️

  • @patrickleon9337
    @patrickleon9337 3 года назад +4

    Very happy 😍💋 💝💖♥️❤️

    • @TheKing-ul5pw
      @TheKing-ul5pw 3 года назад

      ruclips.net/video/uNSxrWCwUqQ/видео.html