WhatsApp - a malicious GIF that could execute code on your smartphone - Bug Bounty Reports Explained

Поділитися
Вставка
  • Опубліковано 3 січ 2025

КОМЕНТАРІ • 73

  • @BugBountyReportsExplained
    @BugBountyReportsExplained  3 роки тому +1

    Welcome to the comment section!
    First, thanks for watching!
    Make sure you are subscribed if you liked the video!
    ua-cam.com/users/BugBountyReportsExplained
    Follow me on twitter:
    twitter.com/gregxsunday
    ✉️ Sign up for the mailing list ✉️
    mailing.bugbountyexplained.com/
    ☕️ Support my channel ☕️
    www.buymeacoffee.com/bountyexplained
    🖥 Get $100 in credits for Digital Ocean 🖥
    m.do.co/c/cc700f81d215

  • @khneo
    @khneo 3 роки тому +18

    I really appreciate low level bugs covered here ! Keep up the great work, thanks !

  • @FahadAlQallaf
    @FahadAlQallaf 3 роки тому +2

    Awesome contents as usual! keep it up.

  • @dularapramod1443
    @dularapramod1443 3 роки тому

    good luck bro. great work

  • @megazrexalpha
    @megazrexalpha 3 роки тому +2

    thx, always new things to learn here

  • @satyajitdas1249
    @satyajitdas1249 3 роки тому +1

    thanks 👍🏻 pls create more vdos on all reports, test cases, scenarios, vulnerabilities.

  • @-bubby9633
    @-bubby9633 3 роки тому +1

    Wow fantastic explanation! Memory exploitation isn't my forte but was able to understand it perfectly anyway! Great content thanks

  • @diabawii
    @diabawii 3 роки тому +2

    it would be nice to make videos about how to fuzz specific vulnerabilities and where to look for them.

  • @BinaryByte
    @BinaryByte 3 роки тому +15

    it was an interesting vuln..😁😃❤️

    • @dedsec7543
      @dedsec7543 3 роки тому

      It is still intresting brother 😂😂😂😂

  • @joelitle6167
    @joelitle6167 3 роки тому

    You are really genius bro...

  • @melvin16
    @melvin16 3 роки тому

    Superb content 👌

  • @IsarEdits
    @IsarEdits 3 роки тому

    great video!

  • @siddharth__pandey
    @siddharth__pandey 3 роки тому

    Great work

  • @AnPham-uz3td
    @AnPham-uz3td 3 роки тому

    I think there is a mistake at 3:04, should the last image be 6x0 if we want to reallocate based on the if condition in 2:25 ?

  • @cybersecurity3523
    @cybersecurity3523 3 роки тому

    Good job bro

  • @ankitkaushal442
    @ankitkaushal442 3 роки тому +1

    ok, no haters. now I can see why

  • @gayanc6193
    @gayanc6193 Рік тому

    Amazing👋

  • @blair49
    @blair49 3 роки тому +1

    Interesting!
    Love your detailed explanation❤️
    You earned a sub!

  • @blablablabla29382
    @blablablabla29382 3 роки тому

    2000iq, insane job

  • @Rundik
    @Rundik 11 місяців тому

    Looks more like a backdoor

  • @googlemonkey7746
    @googlemonkey7746 3 роки тому

    Very helpful

  • @y.vinitsky6452
    @y.vinitsky6452 3 роки тому

    Thanks for the video and clear explanation. Can you spend some more time demoing the vulnerability next time?

  • @nirudhyogidaridram4517
    @nirudhyogidaridram4517 3 роки тому

    In which software do I need to perform this

  • @patrickslomian7423
    @patrickslomian7423 3 роки тому

    Hey Greg can you please recommend some good Assembly tutorial/book ?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому +1

      No Really Patrick :/ I don't know much about it besides what I learnt for purposes of this video. I even had some friends with better knowledge verify this one before publishing.

  • @rrazer7114
    @rrazer7114 3 роки тому

    Awesome :)

  • @27_syauqiilhamramadhan9
    @27_syauqiilhamramadhan9 3 роки тому

    I think this vulnerability has already been exploited by someone. But not repaired

  • @hanko1
    @hanko1 3 роки тому

    can you make RCE on paypal? its on hackerone

  • @antimatter6728
    @antimatter6728 3 роки тому

    Researcher that searchs for low vuln really built different huh

  • @ahmedtcp3029
    @ahmedtcp3029 3 роки тому

    good job

  • @bughunter1731
    @bughunter1731 3 роки тому

    love ur accent bro haha🔥

  • @ejonesss
    @ejonesss 2 роки тому

    why not pad, truncate or resize the frames.
    pad where a black border is placed that is what what happens with 16:9 so it is compatible with 4:3.
    truncate is where part of the frame is cut off another option to make 16:9 compatible with 4:3 that is what the movie industry did when picture tube based tvs was the standard they printed up 16:9 and 4:3 versions.
    resize that is where the frame is stretched to fit many slideshow programs do that.
    images from the 80s will look like doom video game.
    problem solved...

  • @rishabhanand4029
    @rishabhanand4029 3 роки тому

    Nice.

  • @mr.roboter
    @mr.roboter 3 роки тому

    This is amasing.This bug need port forwarding?

  • @b07x
    @b07x 3 роки тому

    Interesting.....

  • @mikek4637
    @mikek4637 3 роки тому

    Thanks for the video! Did you consider sometimes actually exploiting the vulnerability along the explanation? While it might be too tricky for some exploits like this one (i assume it's hard to get such an old whatsapp version) However, for some this might be feasible

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому +1

      yeah I'd love to do it, but usually it's hard to get the vulnerable version of an application and even harder when I'm doing website's bug bounty. But I will do it when I can.

  • @p.kay_____
    @p.kay_____ 3 роки тому

    Awesome

  • @arunsec
    @arunsec 3 роки тому

    Live finding bug & report live

  • @unknownuser1806_
    @unknownuser1806_ 3 роки тому

    wow ❤️

  • @TheWiseExpress
    @TheWiseExpress 3 роки тому

    Great

  • @laggybot1327
    @laggybot1327 3 роки тому

    Nice

  • @zedeleyici.1337
    @zedeleyici.1337 3 роки тому

    great

  • @freyeahshah4494
    @freyeahshah4494 3 роки тому +1

    ❤️❤️❤️

  • @kavindunimesh9049
    @kavindunimesh9049 3 роки тому +1

    ❤💜

  • @anonCharlies
    @anonCharlies 3 роки тому

    ur awsm

  • @shivnarayan718
    @shivnarayan718 3 роки тому +1

    Bro can i talk to you...... Please

  • @m_peter1514
    @m_peter1514 3 роки тому

    Gg WhatsApp 😹

  • @thespecialchannel
    @thespecialchannel 3 роки тому

    Russian accent 😂