Welcome to the comment section! First, thanks for watching! Make sure you are subscribed if you liked the video! ua-cam.com/users/BugBountyReportsExplained Follow me on twitter: twitter.com/gregxsunday ✉️ Sign up for the mailing list ✉️ mailing.bugbountyexplained.com/ ☕️ Support my channel ☕️ www.buymeacoffee.com/bountyexplained 🖥 Get $100 in credits for Digital Ocean 🖥 m.do.co/c/cc700f81d215
No Really Patrick :/ I don't know much about it besides what I learnt for purposes of this video. I even had some friends with better knowledge verify this one before publishing.
why not pad, truncate or resize the frames. pad where a black border is placed that is what what happens with 16:9 so it is compatible with 4:3. truncate is where part of the frame is cut off another option to make 16:9 compatible with 4:3 that is what the movie industry did when picture tube based tvs was the standard they printed up 16:9 and 4:3 versions. resize that is where the frame is stretched to fit many slideshow programs do that. images from the 80s will look like doom video game. problem solved...
Thanks for the video! Did you consider sometimes actually exploiting the vulnerability along the explanation? While it might be too tricky for some exploits like this one (i assume it's hard to get such an old whatsapp version) However, for some this might be feasible
yeah I'd love to do it, but usually it's hard to get the vulnerable version of an application and even harder when I'm doing website's bug bounty. But I will do it when I can.
Welcome to the comment section!
First, thanks for watching!
Make sure you are subscribed if you liked the video!
ua-cam.com/users/BugBountyReportsExplained
Follow me on twitter:
twitter.com/gregxsunday
✉️ Sign up for the mailing list ✉️
mailing.bugbountyexplained.com/
☕️ Support my channel ☕️
www.buymeacoffee.com/bountyexplained
🖥 Get $100 in credits for Digital Ocean 🖥
m.do.co/c/cc700f81d215
I really appreciate low level bugs covered here ! Keep up the great work, thanks !
thank you bro!
Awesome contents as usual! keep it up.
good luck bro. great work
thx, always new things to learn here
thanks 👍🏻 pls create more vdos on all reports, test cases, scenarios, vulnerabilities.
Wow fantastic explanation! Memory exploitation isn't my forte but was able to understand it perfectly anyway! Great content thanks
Thanks! Trust me, low level it's not my strong side as well ;)
it would be nice to make videos about how to fuzz specific vulnerabilities and where to look for them.
thank you for your suggestion. I will consider
it was an interesting vuln..😁😃❤️
It is still intresting brother 😂😂😂😂
You are really genius bro...
the credit goes to the author of the vulnerability
Superb content 👌
great video!
Great work
I think there is a mistake at 3:04, should the last image be 6x0 if we want to reallocate based on the if condition in 2:25 ?
right, nice catch!
Good job bro
ok, no haters. now I can see why
Amazing👋
Interesting!
Love your detailed explanation❤️
You earned a sub!
welcome!
2000iq, insane job
Looks more like a backdoor
Very helpful
Thanks for the video and clear explanation. Can you spend some more time demoing the vulnerability next time?
Sure, I will try
In which software do I need to perform this
Hey Greg can you please recommend some good Assembly tutorial/book ?
No Really Patrick :/ I don't know much about it besides what I learnt for purposes of this video. I even had some friends with better knowledge verify this one before publishing.
Awesome :)
I think this vulnerability has already been exploited by someone. But not repaired
it was patched at the whatsapp version 2.19 I guess.
it was fixed in WhatsApp 2.19.244 as per the blogpost
can you make RCE on paypal? its on hackerone
yes, my next video will be about it
Check out my latest video mate
@@BugBountyReportsExplained bro i was one of the first viewers, VERY COOL VID., keep it up you are helping this community
@@hanko1 thank you buddy
Researcher that searchs for low vuln really built different huh
good job
love ur accent bro haha🔥
awesome bro!
@@BugBountyReportsExplained is it Russian or Icelandic?
@@juboo4451 it's a Polish one
@@BugBountyReportsExplained nice! I very much like the Polish.
why not pad, truncate or resize the frames.
pad where a black border is placed that is what what happens with 16:9 so it is compatible with 4:3.
truncate is where part of the frame is cut off another option to make 16:9 compatible with 4:3 that is what the movie industry did when picture tube based tvs was the standard they printed up 16:9 and 4:3 versions.
resize that is where the frame is stretched to fit many slideshow programs do that.
images from the 80s will look like doom video game.
problem solved...
Nice.
This is amasing.This bug need port forwarding?
I don't think it needs port forwarding
Interesting.....
Thanks for the video! Did you consider sometimes actually exploiting the vulnerability along the explanation? While it might be too tricky for some exploits like this one (i assume it's hard to get such an old whatsapp version) However, for some this might be feasible
yeah I'd love to do it, but usually it's hard to get the vulnerable version of an application and even harder when I'm doing website's bug bounty. But I will do it when I can.
Awesome
Live finding bug & report live
wow ❤️
Great
Nice
great
❤️❤️❤️
❤💜
kohee giyath innwa neh
Nethuwa nethuwa 😁
ur awsm
Bro can i talk to you...... Please
yep, write your problem to greg at bugbountyexplained.com
Gg WhatsApp 😹
Russian accent 😂
nope. but close.