Discord Screwed Up… Badly

Поділитися
Вставка
  • Опубліковано 19 чер 2024
  • What happens when you forget to follow the most fundamental thing about building a website? Well you get creative NFT and crypto scammers abusing Discord's incompetence to create the ultimate way to get your Discord account stolen. If you visit a specific page on Discord's website, you instantly get your account stolen. No clicking on phishy (pun intended) links or downloading an exe file. You visit the discord page and it's already over.
    What a completely laughable and preventable event that occurred. Thanks Discord 👎
    LINKS
    -----------------------------------------------------------------------------
    Server Forge Overview
    / 1603515845195472902
    JustCC's ELI5 + upsetness
    / 1603337868428152834
    Vice banger article
    www.vice.com/en/article/wnjwb...
    SOCIALS
    -----------------------------------------------------------------------------
    Discord Server
    / discord
    TIMESTAMPS
    -----------------------------------------------------------------------------
    00:00 - The scam
    01:24 - Explanation
    06:04 - Why this is unforgivable
  • Наука та технологія

КОМЕНТАРІ • 946

  • @Doctorgeo7
    @Doctorgeo7 Рік тому +3098

    Wow... This is a school grade level exploit. Anyone who paid attention to basic website security knows how to prevent this attack. And yet Discord's dev team is so incompetent that it couldn't even prevent something this basic.

    • @0.r0
      @0.r0 Рік тому +232

      discords dev team is 12 year olds what want the badge

    • @pseudoscientist8010
      @pseudoscientist8010 Рік тому +15

      So why it this action not considered as in purpose? If so much money is being stolen, then a kickback is obvious.

    • @DawaBvv
      @DawaBvv Рік тому +2

      @@0.r0 who wants

    • @bitrare7
      @bitrare7 Рік тому +44

      @@0.r0 You seem like you're 12 with that spelling. Discord devs work at discord for money not a badge? And you have to be over 18 to actaully work at discord.

    • @bitrare7
      @bitrare7 Рік тому +13

      Bros the developer police 😭 the devs have hundreds of things to do they aren't able to check every little thing

  • @jackdavenport5011
    @jackdavenport5011 Рік тому +893

    The crazy thing is that React (which Discord is built with) literally has XSS protection built into it, meaning the developers had to deliberately go out of their way to make this exploit possible.

    • @Choroalp
      @Choroalp Рік тому +10

      Discord is made with electron

    • @hovac.
      @hovac. Рік тому

      @@Choroalp youre dumb

    • @Choroalp
      @Choroalp Рік тому

      @@hovac. yes i am(and how do fuck you managed to find me)( some people saying itami might be backdoored)

    • @rice8864
      @rice8864 Рік тому +225

      @@Choroalp electron is the desktop framework, react is the frontend framework which discord is built with

    • @tabiasgeehuman
      @tabiasgeehuman Рік тому +83

      @@Choroalp electron is just repackaged chrome and nodejs. You can use any framework with it, including react, which is what discord does

  • @lior_haddad
    @lior_haddad Рік тому +618

    They use React and still got an XSS issue?! That's honestly unforgivable.

    • @jojo989GD
      @jojo989GD Рік тому +1

      lmaao

    • @jackdavenport5011
      @jackdavenport5011 Рік тому +70

      Lmao someone just likes using dangerouslySetInnerHTML

    • @rednexie
      @rednexie Рік тому +14

      @@jackdavenport5011 lmao they should just change it to innertext and its gone

    • @adrianozuna875
      @adrianozuna875 Рік тому +5

      Do they even code review at this point

    • @adrianozuna875
      @adrianozuna875 Рік тому

      @x41ih10a You're right lmaoo

  • @Brabbs
    @Brabbs Рік тому +755

    God, the absolute leveling that this guy does is addicting.
    This guy feels like one of those parents that would go: "Yeah, school sucks, heres why it sucks-"

  • @rvs570
    @rvs570 Рік тому +895

    Why don't we create a script that generates tokens and sends them to all known token saving sites? Fill up their databases and have them be less effective

    • @rvs570
      @rvs570 Рік тому +145

      Actually, I found my goal for today xD

    • @polaris2707
      @polaris2707 Рік тому +212

      Safer to send junk and not actual tokens. Provided they don't have checking it'll still work and doesn't carry the risk of accidentally sending a legit token.

    • @jsh722
      @jsh722 Рік тому +63

      well there is a chance you can generate a legit token

    • @rvs570
      @rvs570 Рік тому +40

      @@polaris2707 Yea, would probably make sure to add or remove some random part to it to be safe

    • @rick-sanchez
      @rick-sanchez Рік тому +25

      Exactly my thought. You just need to put it trough a service that sends it from different IP addresses first or they can filter it easily.

  • @GamerShyUncut
    @GamerShyUncut Рік тому +72

    Fun fact. Changing your password doesn't always work. I actually once got hacked on Discord, and instantly changed my password the moment I knew what had happened. Before the scammer even had a chance to do it themselves. They still got control of my account.
    Next level tomfoolery indeed.

    • @NotAFanMan88
      @NotAFanMan88 Рік тому +40

      In token stealing exploits, you may have to explicitly invalidate all your login sessions, which discord does allow you to do. Changing passwords doesn't necessary invalidate all existing login session tokens, though if discord had any sense they should.

    • @theseangle
      @theseangle Рік тому +6

      They probably just send an automatic POST request to change the password to the discord server upon receiving the token immediately. Most likely that's why you don't have time to change your password in time

  • @MaahirMomtaz12
    @MaahirMomtaz12 Рік тому +380

    This seems to be a monthly thing now. Just don't click links. Simple

    • @rebane2001
      @rebane2001 Рік тому +36

      XSS vulnerabilities like this one are very rare.

    • @stryrok4216
      @stryrok4216 Рік тому +8

      I dont know if I should say this but I literally saw/knew a guy who said he can just token grab people by just giving a invite link and that was over a year ago ,just how many people have known about it before this vid almost scary

    • @AANyt
      @AANyt Рік тому +6

      i mean, this link is looking safe. So the only possibility is, to not use the internet at all or don't use services like discord (what ever this means)

    • @SurmenianSoldier
      @SurmenianSoldier Рік тому +2

      @@AANyt or just don't be dumb and have like 3000 layers of protection ezez

    • @tzarg
      @tzarg Рік тому

      @@SurmenianSoldier or don't be dumb and click on whatever unsuspecting tinyurl links you see pop up

  • @tairitsu5560
    @tairitsu5560 Рік тому +33

    I've heard Twitter had a self-retwitting script that works just like this, but that was several years ago.
    Can't believe this still happens

    • @Coder_Tavi
      @Coder_Tavi Рік тому

      ua-cam.com/video/zv0kZKC6GAM/v-deo.html

    • @Knaeckebrotsaege
      @Knaeckebrotsaege Рік тому +5

      @@Coder_Tavi links get censored by YT (only the poster can see it, nobody else), which might explain why it's showing "2 replies" yet only one shows up

    • @Archimedes.5000
      @Archimedes.5000 Рік тому +3

      It was TweetDeck not Twitter as far as I know

  • @Sluip69
    @Sluip69 Рік тому +286

    NTTS is a youtuber I actually like to watch nowadays, even tho its about subjects I don't even know much about or affects me

    • @ItzStardustYT
      @ItzStardustYT Рік тому +21

      @@stavratum 💀

    • @izzyxvibes
      @izzyxvibes Рік тому +14

      @@stavratum if u don’t care then why’d you respond

    • @Sluip69
      @Sluip69 Рік тому +1

      @@izzyxvibes cause he is a fan

    • @KhAnTlol
      @KhAnTlol Рік тому +5

      @@stavratum we don't care that you don't care

    • @inspektor66
      @inspektor66 Рік тому

      @@stavratum you seem like an angsty teenager with a "p" addiction.

  • @sluuuudge
    @sluuuudge Рік тому +157

    I’m honestly astounded that in 2022, Discord of all companies managed to accidentally create an XSS exploit.

    • @DMack6464
      @DMack6464 Рік тому +5

      Well Google had one, so why stop the incompetence there?

    • @testuser1235
      @testuser1235 Рік тому +1

      Bro u clearly know nothing.
      1. They didnt create an XSS Exploit, a person which found the vulnerability created the exploit
      2. Even in Google, Nvidia, Apple etc. are xss, and even more dangerous vulnerabilities (like ssrf, or with that RCE) found (daily), so pls dont just talk shit about discord, when u clearly know nothing about this topic.
      Look at for example Hackerone and see how many reports are daily submitted and resolved.

    • @sluuuudge
      @sluuuudge Рік тому +1

      @@testuser1235 I ain't your "bro", either way you're still incorrect. Discord developed the application therefore they created the exploitable surface. Perhaps I didn't make that part of my comment clear.
      I'm not sure why you're white knighting Discord as if they're gonna give you a job for defending them...

    • @testuser1235
      @testuser1235 Рік тому +3

      @@sluuuudge nah, im Not defending them, but I just can‘t stand people who think, Discord is the only Company who has vulnerabilities like that.

    • @un1que730
      @un1que730 Рік тому +1

      @@testuser1235 discord is the one company getting fame astoundingly fast ,with mass comes critics

  • @zephyrprime8
    @zephyrprime8 Рік тому +23

    Discord try not to create a security vulnerability with every new feature challenge (impossible)

  • @Willie-2024
    @Willie-2024 Рік тому +506

    Someone, please make this man a Discord Mod. He does figure out more than discord itself.. Hats off man. Love from India

    • @clouderino
      @clouderino Рік тому +94

      NO OH GOD PLEASE DONT MAKE HIM A DISCORD MOD I DONT WANT TO BE HIS KITTEN

    • @neanni
      @neanni Рік тому +3

      ​@@clouderinospooky

    • @itsarian.
      @itsarian. Рік тому +31

      WHY ARE INDIAN PEOPLE EVERYWHERE LITERALLY EVERY COMMENT I SEE IT SAYS "LOVE FROM INDIA" AT THE END

    • @justaweeb14688
      @justaweeb14688 Рік тому +15

      @@itsarian. because they had too many kids

    • @justaweeb14688
      @justaweeb14688 Рік тому +3

      Why tf you insulting him for? Why do you want him to be a discord mod?

  • @k.silverpoint
    @k.silverpoint Рік тому +35

    This is as good as a reminder to everyone to SANITIZE YOUR INPUTS.

    • @QUASAR098
      @QUASAR098 Рік тому +1

      xkcd reference

    • @JaivianDean
      @JaivianDean Рік тому +4

      @Jimmeh make inputs(what they user types in a text box) basically only work for the purpose you give them, no funky business, lol

    • @mousepotatoliteratureclub
      @mousepotatoliteratureclub Рік тому

      @@QUASAR098 Happy holidays to Bobby Tables

    • @williamdrum9899
      @williamdrum9899 Рік тому +1

      @@jimmydabear Design your website so that if the user types in computer code instead of a password their code doesn't get run.

    • @maskettaman1488
      @maskettaman1488 Рік тому

      This has nothing to do with input sanitation lmao

  • @ItzStardustYT
    @ItzStardustYT Рік тому +53

    Discord messed up??!?! No way! Impossible!

    • @Prouf1
      @Prouf1 Рік тому +1

      -_-

    • @ezioboiz-ieatchildren-
      @ezioboiz-ieatchildren- Рік тому +1

      Who could have guessed???

    • @joelhoon1707
      @joelhoon1707 Рік тому

      This is the first time this has happened in so long, I forgot Discord ever messed up!!!!!

  • @debargha0_0
    @debargha0_0 Рік тому +51

    Looks like $800K wasn't that much for Discord, they should be again fined

  • @cenniebeanie
    @cenniebeanie Рік тому +18

    there should be (again) in the title 😂

  • @MrFilgueiras.
    @MrFilgueiras. Рік тому +10

    Following this logic, the next exploit is gonna be "someone accidentaly typed 'DROP DATABASE discord' oops"

    • @williamdrum9899
      @williamdrum9899 Рік тому +2

      Or used "gets(password)"

    • @SamuelLing
      @SamuelLing Рік тому

      IIRC they use nosql database, it would be impossible for that to happen, but xss, yea, those are different

  • @nclsDesign
    @nclsDesign Рік тому +25

    The only vulnerability that's more unforgivable than XSS is SQL injections...
    That this happened to a big company like Discord is even worse...

  • @uhKilz
    @uhKilz Рік тому +38

    I appreciate you making these videos. I love waiting to get into a MW2 match and watching discords biggest mistakes.

    • @jn567
      @jn567 Рік тому

      MW2?

    • @Likemea
      @Likemea Рік тому +1

      @@jn567 Modern Warfare 2

    • @uhKilz
      @uhKilz Рік тому +6

      @@jn567 jc isn’t really a gamer if he doesn’t know what modern warfare 2 is

    • @ezioboiz-ieatchildren-
      @ezioboiz-ieatchildren- Рік тому

      @@uhKilz facts, he's probably 9 years old and plays Minecraft.

  • @SupaMC_Gaming
    @SupaMC_Gaming Рік тому +9

    Thank you for bringing this to light. You’re one of my favorite UA-camrs

  • @SavageMudkip
    @SavageMudkip Рік тому +66

    damn bro thats crazy, they only did a minor felony this time?

  • @Trigger4589
    @Trigger4589 Рік тому +138

    NTTS, you covered this so well!
    * I don't feel sorry for the idiots that have a lot of money I guess.

    • @ShadowOcto
      @ShadowOcto Рік тому +27

      They’re NFT bros, don’t 💀

    • @Testing123-Ore7
      @Testing123-Ore7 Рік тому +5

      What the guy above me said

    • @apyr1055
      @apyr1055 Рік тому +1

      What the guy above the guy above me said

    • @MemezuiiSangkanskje
      @MemezuiiSangkanskje Рік тому +1

      What the guy above the guy above the guy above me said

    • @DaniZeAlmighty
      @DaniZeAlmighty Рік тому +1

      What the guy above the guy above the guy above the guy above me said

  • @Arylist
    @Arylist Рік тому +15

    I'm happy that I never fell for this scam because I got a lot of these DMs but I just ignored them.

    • @tristanrhodes2789
      @tristanrhodes2789 Рік тому

      i accidentally fell for one before like a month ago XD now im worried

    • @IllagerCaptain
      @IllagerCaptain Рік тому +1

      @@tristanrhodes2789 change your password if you haven't already.

    • @tristanrhodes2789
      @tristanrhodes2789 Рік тому

      @@IllagerCaptain Yeah i did but that isnt the issue they have my account token not my password XD

  • @shidosensei.
    @shidosensei. Рік тому +4

    Thanks for letting us know man, I hope you stay safe out there

  • @trollify2851
    @trollify2851 Рік тому +19

    Thank you for sharing this important information about the Discord NFT scam link. Your video is helping to educate and protect the community. Keep up the good work in raising awareness about these types of threats

  • @Bockanator
    @Bockanator Рік тому +6

    my face when discord's website is vulnerable to the simplest Cross site scripting imaginable.

  • @wolfypro
    @wolfypro Рік тому

    Your videos are getting better & better! I follow you since you had 50k subs. Great job!!

  • @timedeos4320
    @timedeos4320 Рік тому +2

    I found someone that’s been doing this to get people’s tokens and selling their tokens since the QR code scam, I’ve always thought this was possible but never had a sample to work with like you did, good job man!

  • @ciach0_
    @ciach0_ Рік тому +5

    Thank you NTTS for a birthday gift that is this video

  • @Awesome_Aasim
    @Awesome_Aasim Рік тому +3

    A few years ago a security researcher found an XSS vulnerability in TweetDeck and used it to make the only self retweeting tweet.

  • @frostdesigns555
    @frostdesigns555 Рік тому +2

    As someone that is still learning web development, this stuff kinda scares me. My knowledge on network security as well as vulnerability detection is not that much yet.

  • @RyanTheTechMan
    @RyanTheTechMan Рік тому +2

    Hey, I have been watching for a long while, and I only now just realized that I was never subscribed! Your videos have always been recommended to me :)

  • @Respectable_Username
    @Respectable_Username Рік тому +4

    This is why you gotta set your CSP headers. Even if somebody messed up the actual code itself, a good CSP will stop it from actually doing any harm!

    • @Naleksuh
      @Naleksuh Рік тому

      I'm pretty sure the reason they were embedding the script off UA-cam was because of the CSP. So no, CSP would not have stopped it

  • @comet.x
    @comet.x Рік тому +6

    i didn't even know what this was called but as soon as i saw the html i knew exactly what was going on.
    like no way did they let you just write html in a text description like that

  • @yuvalne
    @yuvalne Рік тому +1

    man, the last time I saw such a major and easy xss vulnerability was xss in tweetdeck 8 years ago. and that was just a self-retweeting tweet.
    such incompetence.

  • @Dude29
    @Dude29 Рік тому

    Spectacular analysis. Thank you!

  • @Leep226
    @Leep226 Рік тому +3

    Fantastic video to inform us all about it but to be honest if you just stick to the rule of never clicking on any links before asking around or anything is the safest way to go
    Do not let your curiosity or greed get the better of you as those are usually how you fall for any scams
    Always ask yourself what could happen or simply why do I have to click on something someone sent me in dm which I have never spoken to before.
    Always have a certain level of distrust as come on this is the internet unless you know them personally irl you should always that certain level of awareness as anything could happen such as even your best friend on internet for years could turn on you for personal benefits

  • @0xNe
    @0xNe Рік тому +17

    Im gonna sleep very well tonight knowing that NFT are losing money again

    • @user-ku9vx6uj4o
      @user-ku9vx6uj4o Рік тому +1

      And probably you are using NFTs in products without even knowing. But yeah, be stupid. And no, NFTs aren't JPG's.

    • @0xNe
      @0xNe Рік тому

      @@user-ku9vx6uj4o AHAHAHAHAHAHAHAHAHAH

    • @user-ku9vx6uj4o
      @user-ku9vx6uj4o Рік тому

      @@0xNe NFTs are used in cars from Alfa Romeo for example. NFTs are for metadata storage, and yeah, a lot of people (mostly scammers) use it to store a link to a image to sell it. But NFTs aren't images or something. This metadata can be anything and can be used for a lot of things (car maintenance info, keys to your car, event tickets, subscriptions, in-game characters or items, login info etc).

    • @0xNe
      @0xNe Рік тому

      @@user-ku9vx6uj4o no shit, wheres ur prev comment? and where did i ask what are nfts? i know what they are, and I, in fact, know that people who bought into nfts are dumbest people in existence and most of them lost money, so every time they lose again, its a good news

    • @0xNe
      @0xNe Рік тому +1

      @@user-ku9vx6uj4o ye i dont see yours too i only see the one from 1hour ago, others are only on notifs, we will argue some other day since theres no point if we cant see comments, have a nice day sir

  • @NoMerCyNL
    @NoMerCyNL Рік тому

    Thanks for the information, Shared in my discord server

  • @NiftRex
    @NiftRex Рік тому +1

    This happened to me. I got offered to be paid to "test" a service or something similar and be invited to a server. I just simply ignored those DMs. They were persistent and would try one or two more times, I still never clicked on them.

  • @twilighttales-
    @twilighttales- Рік тому +10

    That cherry server really went through a lot of pain mainly thier owner🤣🤣🤣

    • @twilighttales-
      @twilighttales- Рік тому +1

      Abee 👁 👁 😂
      👄

    • @jalkarna
      @jalkarna Рік тому

      @@twilighttales-kya bol raha hai bhai

  • @darthvader8744
    @darthvader8744 Рік тому +10

    The moment I hear "This was against NFT groups" I immediately agree with the exploiters

  • @PinkManGuy
    @PinkManGuy Рік тому +2

    A friend of mine lost his account to this. Luckily we were able to recover it, but it was scary for a while there.

  • @nanopi
    @nanopi Рік тому

    I've been using that new string type quite a bit lately. It's very useful.

  • @_kzr
    @_kzr Рік тому +3

    i’m genuinely surprised this was overlooked, literally no validation checks or encoding on the html to make sure that scrips aren’t being executed.. it’s unsurprising coming from discord though

    • @_kzr
      @_kzr Рік тому

      @@zydn it’s discord 😂 they always find a way to make something worse

    • @NicoPlyley
      @NicoPlyley Рік тому

      @@zydn Yes that’s true when using JSX. But this exploit was done through the state management software. When someone loads the page it get exploited before the page even renders out html. If it was in the JSX it would have been sanitized

    • @hi-kt3qr
      @hi-kt3qr Рік тому

      @@zydn React takes some steps to protect against simple xss attacks and html input vector rendering. displaying script tags, for instance, or other things. The exploit in this case is trickier than you might expect because it only guards against DOM-based XSS assaults, although XSS comes in a variety of forms. Having said that, data sanitization might have easily avoided this.

  • @Knaeckebrotsaege
    @Knaeckebrotsaege Рік тому +4

    brainfart: could people theoretically spam the blueh and/or hawkemedia links with fake/random tokens via scripts to throw some sand in their gearbox? obviously not all from the same IP so it's not as easy for them to filter out. they'd have to figure out if the tokens they collected are actually valid, and i guess would be kinda pissed if 99% aren't lol 🤔

  • @ms.awesome
    @ms.awesome Рік тому +1

    i remember when tweetdeck had a xss self retweeting tweet a long time ago. How so many people don't see this issue with their websites is crazy to me

  • @Vlame
    @Vlame Рік тому +3

    To be honest, I'm not even suprised anymore that Discord has another exploit. If they fix one, someone will find another one 😅

  • @Dyanosis
    @Dyanosis Рік тому +4

    This shows how little testing they have. If they'd had more testing, especially for such a simple webpage, this would have never made it to live.
    Xss is very simple to prevent and, as many people have posted many times before, is very simple to escape a user's input.
    Apparently Discord doesn't know/follow the "never trust user input" rule.
    Also, with Discord being as big as it is, you'd think they'd do vulnerability testing that would have told them about this problem long before it got out of dev.

  • @rickytheraccoon6102
    @rickytheraccoon6102 Рік тому +2

    Sucks that it happened, but at least it was a bunch of crypto nerds and not actual human beings

  • @BeastGamingHD
    @BeastGamingHD Рік тому +1

    I think what's crazy is that people are just now figuring out about this exploit which has actually been around for nearly 2 years now.
    Also most of the people hijacking accounts are focusing on people with og or "leets" for username and account age so that they can keep it and or sell it. A "leet" would be a username like root#0001 for example.

  • @Madison1676
    @Madison1676 Рік тому +22

    Keep slaying no text to speech

    • @andistive
      @andistive Рік тому +4

      SLAY QUEEN 💅💅💅💅💅💅💅💅💅💅

  • @Jazztache
    @Jazztache Рік тому +4

    This is why it's a good idea to use Element instead, Discord just keeps on getting these weird instabilities.

    • @C00L3R
      @C00L3R Рік тому

      that's for companies... just use guilded if you really dislike discord
      (i don't use guilded it sux)

    • @Jazztache
      @Jazztache Рік тому +1

      @@C00L3R Not really. It's like saying Slack is *just* for companies.
      The only companies on Element in my vicinity is the company of the lads.
      Also, with Guilded... Roblox Corporation. Enough said.
      Plus, it's free (libre) and open source, which should be the norm for communications/chat apps.

  • @TS_Mind_Swept
    @TS_Mind_Swept Рік тому +1

    This is why you don't click links. Even if it's from someone you think you know, try to engage them in a conversation (esp if you haven't heard from them in a minute); if they talk different than normal, you know

  • @ImDuck42
    @ImDuck42 Рік тому

    That with the worm is talked about with interview on darknet diarys

  • @corn738
    @corn738 Рік тому +6

    I really hope you get to be a discord mod. You do more than the discord staff at this point. PLEASE LET ME BE YOUR KITTEN 😳😳😳

  • @Sopitive
    @Sopitive Рік тому +4

    It is possible to do a lot of input sanitization, CORS policy changes and CSP changes to circumvent a lot of XSS, but in the end you probably won't get everything. Hackers will reverse a site and try to find a bypass to the filter you set in place. It isn't necessarily Discord's fault because it took hackers this long to discover it. It just goes to show that nothing you do as a security researcher and engineer will truly patch a vulnerability fully, but instead just makes it harder for a hacker to exploit it. Discord does have a bug bounty, but if crypto scams will yield more money than the reward money from the bug bounty, it makes more sense for hackers to exploit it rather than responsibly disclosing it.

    • @JaivianDean
      @JaivianDean Рік тому +1

      this is a new feature that just came out with discord that got XSS'ed

    • @Sopitive
      @Sopitive Рік тому +1

      @@JaivianDean Even then, reflected XSS is one of the least serious types of XSS. If it were to have been stored XSS, we would have had a huge problem (worse than this one). This still required a little social engineering and user interaction to pull off. Though that kinda makes sense, they should have probably checked for something like that before they pushed an update.

    • @blenderbachcgi
      @blenderbachcgi Рік тому

      Like I said, the only way to stop this, is to deal with the hackers one on one. Trying to patch up a broken wall, to hide from them, is only delaying the inevitable, because they will ALWAYS find you. Sadly, everyone chooses to literally allow them to do these things.

    • @SamuelLing
      @SamuelLing Рік тому

      @@Sopitive or just be smart, don’t click on those links, if you want do it in a incognito mode or a vm (though, this is not really practical)

  • @sumoddball
    @sumoddball Рік тому

    Where's my "I love you bye bye!" 😭best part of your videos.

  • @natec1
    @natec1 Рік тому

    That’s really really bad. The fact that this is even a possibility in this day and age is insane

    • @blenderbachcgi
      @blenderbachcgi Рік тому +2

      It wouldn't have been a thing in this day and age if we'd gotten rid of the hackers a long time ago. But we don't. We just keep gluing a cracked wall together with raisins and mud hoping that someone can't just bust it down and get to you.

  • @fractal6929
    @fractal6929 Рік тому +13

    these security exploits are really making guilded look like a feasible option

    • @luviana_
      @luviana_ Рік тому +4

      Guilded is owned by Roblox.
      Don't move to an equally trash platform. Pick something open source, like Element or Signal

  • @rtzgf67games7
    @rtzgf67games7 Рік тому +6

    I can't believe that discord forgot about it! It's legit on the OWASP top 10 web app vulnerabilities. A lot of these big companies forget about web app security 101 and it's sad.

    • @maskettaman1488
      @maskettaman1488 Рік тому

      They outsource things like frontend to their diversity-hire tokens or to overseas workers entirely. Many major companies do it. It's why websites like UA-cam and Discord are getting progressively worse and worse from an interface perspective

  • @Dolphin002
    @Dolphin002 Рік тому +1

    Even I, someone who makes tiny Github websites with no actual security risks, patch XSS. How did Discord forget?

  • @xyhasanamazingalt9583
    @xyhasanamazingalt9583 Рік тому +1

    it’s insane discord never patched this, i literally used it in 5th grade to mess with my friends on websites they made

  • @gentoolinuxuser4387
    @gentoolinuxuser4387 Рік тому

    You should really look into being a security researcher, great work!

    • @Naleksuh
      @Naleksuh Рік тому

      No Text To Speech should or the person who found it should? All they did was read the work of others so I don't see why a parrot should be a security researcher

  • @1ch0r41
    @1ch0r41 Рік тому

    I was around the hacking space when this vulnerability was found. My friend tested it on me and we thought it was a cool little gimmick but nothing worth using against anyone except enemies. That was 6 years ago I believe, if it’s really been this long and they haven’t patched it, that’s extremely sad. Honestly a low level exploit as well.

  • @MightyDantheman
    @MightyDantheman Рік тому +1

    This is why I stay logged out in my browsers

  • @d1g1t4l_bl00d
    @d1g1t4l_bl00d Рік тому

    really cool video!
    can you tell me what explorer do you use? or what theme do you use to make it look that way?
    i been trying to find a cool browser and yours is really cool.

  • @bruisedbug
    @bruisedbug Рік тому +1

    im not a security engineer or anything, but didnt this exact same thing happen with Flash? Like this is one of the most simplest things to avoid.

    • @alex59292
      @alex59292 Рік тому +1

      Yes xss is literally thought in schools, that's how basic it is to do

  • @AdianAntilles
    @AdianAntilles Рік тому

    What one could do in case of these dead ends mentioned in the video, it is always possible to look where the servers are hosted and what they are doing with them. ping, traceroute and nmap are your friends.

  • @sothesalamilidwontfit
    @sothesalamilidwontfit Рік тому +1

    how is discord so shitty that there are 392829 ways to get a totally well protected and hidden token that can access your entire account

  • @StolenJoker84
    @StolenJoker84 Рік тому

    I actually had my Discord account stolen a while ago - after signing into what I thought was a Discord page. They changed my password (which is how I learned that the account was hijacked). They deleted everything, logged my account into a bunch of random servers, then game my account back.
    When I contacted Discord, they told me that it was impossible for my account to have been stolen. After I got my account back (no help from Discord on this front, since they insisted that it wasn’t even possible), I asked them if they could tell me where my account was accessed from. I never got a reply back from them. I found out on my own, using Discords own tools, what countries (yes, more than one) my account had been accessed from between the time it was stolen and the time it was “returned”.

  • @mu11668B
    @mu11668B Рік тому +1

    Whoa! Some classic XSS just became a 0-day on Discord. How unexpected! 😂

  • @beyem6377
    @beyem6377 Рік тому

    So glad I've been sick the last few days

  • @Wirby.
    @Wirby. Рік тому

    Funny how I got a discord ad at the start

  • @Kitalula
    @Kitalula Рік тому

    I'm wondering if that's what happened to me yesterday or something new, cuz someone else was on my account for a bit, but instead of sending links they went into a vc as me and yelled slurs.

  • @fcantil
    @fcantil Рік тому

    that's crazy. well on the slightly bright side, at least it's fixed now...

  • @SWinxyTheCat
    @SWinxyTheCat Рік тому +1

    Does Discord not have a blue team? It sounds like they don't from the presence of these scams and exploits.

  • @masterdementer
    @masterdementer Рік тому +1

    Your discord token will automatically change within 6-8 hours I think or maybe 12. It doesn't stay the same forever. They can send automated requests using that. But they can't change your password or access the full discord account. Unless they know the Server ID, Channel ID in which they want to send the message in. So they would have that info probably of only one server in which you were with the guy that sent you the link.

    • @ulize.
      @ulize. Рік тому

      Two wrongs in this message. Firstly, the Discord token does not expire until you change your password or change two-factor authentication settings. Secondly, you are able to access the full account, it's very simple to log into an account using the token. Don't spread false security tips, it helps no one

  • @spythere
    @spythere Рік тому

    Wait, they hold the session token in the local storage? Did they made this with some random ass tutorial on the internet?

  • @SomeKittyCat
    @SomeKittyCat Рік тому

    are those coloured tab groups a chrome plugin on is that a build in feature of chrome?

  • @thecwd8919
    @thecwd8919 Рік тому

    I like how they're just using a default nginx forbiden page like "damn this is so easy we dont even need to make it look like its not a scam!"

  • @siomek101
    @siomek101 Рік тому +1

    "Discord messed up server discovery" - i already thought about xss

  • @qbcd
    @qbcd Рік тому +1

    You can use burp suite to check what it is doing in detail

  • @Aquilz.
    @Aquilz. Рік тому

    the light mod thumbnail BRUHHH

  • @kateaplus
    @kateaplus Рік тому +1

    literally 101 stuff at that level

  • @spazmcat3853
    @spazmcat3853 Рік тому

    When i saw the video title i thought: yeah do they actual do good things instead of hurting its users and platform like i have never seen that discord does something good

  • @sephstar-offical
    @sephstar-offical Рік тому

    the thing is, how are you supposed to know theirs a volubility in something intill it gets found?

  • @lorics7322
    @lorics7322 Рік тому

    Wich Browser are you using? It Looks so cool with the rounded edges

  • @410Here
    @410Here Рік тому +1

    how on earth do they not endlessly dom-purify the shit out of everything user generated?

  • @JaMaMaa1
    @JaMaMaa1 Рік тому +1

    What did you do to your firefox to make it look like that? the coloration of boxes and lines around the tabs to be specific.

    • @SpidermanArda
      @SpidermanArda Рік тому

      He explained that a few videos earlier. İ don't remember which video was it

    • @thelegendaryorb5745
      @thelegendaryorb5745 Рік тому

      You can group tabs together

    • @JaMaMaa1
      @JaMaMaa1 Рік тому

      @@thelegendaryorb5745 Maybe in 2016... because they absolutely do not do that.

  • @sctjkc01
    @sctjkc01 Рік тому +1

    Stealing a Discord token is incredibly bad. If you lose the token and the recipient has any sort of scripting set up, you can expect to have the entire account stolen inside of 30 seconds.
    I'd fallen for a phish where I was asked to test a game distributed over Itch. It stole my Discord token from my Discord desktop client, logged me out, and closed the client.
    And despite having 2FA on my account, I was unable to log back in again, as the token thief managed to strip 2FA AND change the password AND change the email address on it. Without any sort of request for 2FA tokens from my phone or passwords.
    I'd asked Discord support over Twitter for assistance, and they'd reverted the email address back to mine... but presumably the token never got reset or the token stealer was still running on my machine, because it was stolen and yanked away from me yet again.
    And yes, I was a paying Nitro user with saved payment information. Thankfully, because I paid via PayPal, I was able to tell PayPal to never send any money toward Discord and saved myself ~US$150 of fraudulent purchases.

  • @mstieferman
    @mstieferman Рік тому

    Why does the outro always catch me off guard?

  • @user-tr2dh4xx6u
    @user-tr2dh4xx6u Рік тому

    Wow I was wondering all the warnings saying not to click links lmao

  • @decayedargon6765
    @decayedargon6765 Рік тому +1

    Sometimes, it's the implementation of XSS prevention which is vulnerable. There was evidence of existing XSS prevention in the audit that was made. Don't flame them too hard.

  • @orngng
    @orngng Рік тому +2

    These vulnerabilities look as bad as the ones on the Roblox website lol

  • @NeuralSensei
    @NeuralSensei Рік тому

    I was planning to use discord login built into opera gx to use alt account from the main program, but this seems like such a big security flaw now

  • @MikeyD594
    @MikeyD594 Рік тому

    There was a similar /script exploit on twitter a few years back, it wasn't malicious but it easily could have been
    All it did was as soon as a tweet was loaded, it would automatically make you retweet the heart emoji and anyone who loaded that tweet would also do it

  • @ris_kis
    @ris_kis Рік тому

    Thanks for the interesting video.

  • @mat_name_whatever
    @mat_name_whatever Рік тому

    It's stupid that Discord did that, but it is also astounding that redux put the vulnerable code on their website, with only a comment in the snippet saying "hey check this link for security issues", instead of including the two function calls that make it safe. And then I wonder why Discord server side renders/ templates it in there in the first place, js can access the query param itself...
    Truthfully as a developer I have to say that unfortunately I have had many less than competent colleagues, and combined with pressure and negligence from management that has lead to very similar and worse issues a number of times. These issues don't come out of nowhere.

  • @neo_uwuowo
    @neo_uwuowo Рік тому

    i have used react for a while now. i have tested using script elements in text placed on the site. it never runs. how did discord mess up that bad? you have to specify it to render html in react