The Hacker who could turn on ANYONE'S Zoom Camera [Zero-Day]

Поділитися
Вставка
  • Опубліковано 14 січ 2025

КОМЕНТАРІ • 146

  • @DanielBoctor
    @DanielBoctor  Рік тому +8

    JOIN THE COMMUNITY ➤ discord.gg/WYqqp7DXbm
    ♥ thank you for all of the support ♥

  • @chriss3404
    @chriss3404 Рік тому +89

    Classic SQL injection and a nice explanation to go with it!
    Text encoding was def not the first thing on my mind when thinking about possible escapes, and I guess it wasn't on the mind of the person that tried to manually sanitize SQL input either!

    • @mudi2000a
      @mudi2000a 11 місяців тому +5

      They just should use parameters. Then you don’t need to sanitize anything because you can’t inject anything. Not using parameters is a classic beginners mistake. Also I think this should be caught by static code analysis tools which maybe they should have used at Zoom.

  • @eyephpmyadmin6988
    @eyephpmyadmin6988 Рік тому +45

    "Cant read the source code" Ghidra has entered the chat

    • @DanielBoctor
      @DanielBoctor  Рік тому +16

      yep, that's actually what the researcher used to locate the SQLite functions 🤯

    • @MaxCE
      @MaxCE 10 місяців тому +5

      ghidra still can't tell you the function names

    • @king_james_official
      @king_james_official 9 місяців тому +1

      that's not source code

  • @amaankhan8436
    @amaankhan8436 Рік тому +28

    Criminally underrated channel. Keep up the good work man you'll make it big

    • @DanielBoctor
      @DanielBoctor  Рік тому +2

      That's the dream 🚀 Thanks for the support

  • @capability-snob
    @capability-snob Рік тому +46

    We tend not to ship debug symbols by default with open source programs either - they tend to be much larger than the compiled program itself.

  • @0xgordo350
    @0xgordo350 Рік тому +39

    Great video! That explanation of unicode was perfect.

    • @DanielBoctor
      @DanielBoctor  Рік тому +3

      Thanks for the support! Glad you liked it 😊

    • @BillAnt
      @BillAnt 11 місяців тому +2

      ​@@DanielBoctor- Loved it with the great explanation. :)

    • @DanielBoctor
      @DanielBoctor  11 місяців тому +2

      @@BillAnt Thank you!

  • @nournote
    @nournote Рік тому +25

    Very well explained. Lots of small things to learn, not only a story telling content. Just keep up.
    Subscribed.

  • @gh0stm0nst3r6
    @gh0stm0nst3r6 Рік тому +14

    Oh my goodness. This is such fantastic knowledge. You explain things phenomenally. Thanks so much.

    • @DanielBoctor
      @DanielBoctor  Рік тому +2

      LOOOOOL I'm glad it was helpful! Glad you have you here! Thanks for the support ❤️

  • @junosoft
    @junosoft Рік тому +9

    Seems very well explained. Still didn't finish the video, but so far so good. Keep it up

    • @DanielBoctor
      @DanielBoctor  Рік тому +2

      Will do! More is on the way 🚀. Thank you for the support

  • @m4rt_
    @m4rt_ Рік тому +10

    4:33 and if you want it be more of a hell for people who want to reverse engineer your stuff, you can tell the compiler to generate a stripped binary.
    On Linux you can do this using the "strip" command. You could use it like this "strip binary -o stripped_binary"
    or you can do it with the "-s" flag if you are using GCC.

    • @mudi2000a
      @mudi2000a 11 місяців тому +1

      Stripped binary is also much smaller and thus always a good thing.

    • @davikad-quirkies
      @davikad-quirkies 10 місяців тому

      yup I love using Linux

    • @restoreleader
      @restoreleader 6 місяців тому

      So whats the catch? Why is it not used by default by everyone?

  • @ByronShingo
    @ByronShingo 11 місяців тому +2

    Another eloquent description of a fascinating piece of software security history, brilliant as always.

  • @b33thr33kay
    @b33thr33kay Рік тому +163

    Wow! Very well explained, thank you!
    EDIT: my only complaint is the title. It's makes it look like a recent exploit, which is clickbaity and not very nice. I don't think you need to resort to that. 🙂

    • @cooldestroyer1
      @cooldestroyer1 Рік тому +11

      A channel can only upload about this type of stuff when it gets patched.

    • @aurilly_
      @aurilly_ Рік тому +4

      @@cooldestroyer1yea and it was patched in june 2020

    • @SlitheringDemon
      @SlitheringDemon Рік тому +3

      ​@@cooldestroyer1but still makes it look like it's recent

    • @B1ADE99
      @B1ADE99 Рік тому +1

      Obviously worked on you

    • @cooldestroyer1
      @cooldestroyer1 Рік тому

      @@B1ADE99 I stopped watching very early:/

  • @Isaac-se6ye
    @Isaac-se6ye Рік тому +2

    great explanation and editing!

    • @DanielBoctor
      @DanielBoctor  Рік тому +1

      Thanks for the support, I appreciate it 😊

  • @cancerino666
    @cancerino666 Рік тому +5

    Why a new company like Zoom decided to use SQL with all of it's string-based vulnerabilities baffles me.

    • @mattm7378
      @mattm7378 Рік тому

      It wasn't a mistake. Zoom has been caught out working with gov agencies to essentially steal info from both individuals and organizations. Essentially is a gov tool for blackmail and info stealing (source twitter files)

  • @dcquence
    @dcquence Рік тому +7

    Very interesting. I cannot get over the upward inflection on every sentence though

    • @DanielBoctor
      @DanielBoctor  Рік тому +4

      Ughhhhhhh I know, I do it while I'm filming without realizing it . I'm trying to fix it though.

    • @qps9380
      @qps9380 9 місяців тому +1

      @@DanielBoctor Honestly man, wasn't an issue for me at all. Super interesting video!

  • @whoman0385
    @whoman0385 Рік тому +2

    I honestly thought I was watching from a big channel, your so underrated, keep it going!

    • @DanielBoctor
      @DanielBoctor  Рік тому +1

      THANK YOU! I appreciate the support! More is on the way 🚀🚀🚀

  • @mbhv-ll9lq
    @mbhv-ll9lq Рік тому +2

    How do you not have more than million subscribers? What. you deserve more. keep up the great work!

    • @DanielBoctor
      @DanielBoctor  Рік тому +1

      Thank you! You are a highly awesome fella keep on spreading that positivity

  • @altaccount648
    @altaccount648 Рік тому +1

    jokes on you i don't have a camera

  • @vanzylv
    @vanzylv Рік тому +1

    Very interesting and technically informative. You have a elegant way of explaining things. Thanks!

    • @DanielBoctor
      @DanielBoctor  Рік тому +2

      Glad you found it helpful! Thanks for the support I appreciate it 😊

  • @SteveProjectX
    @SteveProjectX 6 місяців тому

    Great content man. Thank you.

  • @accountaccount3840
    @accountaccount3840 Рік тому +1

    Great explanation. Thanks for these videos 😊😊😊

    • @DanielBoctor
      @DanielBoctor  Рік тому +1

      Glad you liked it! Thanks for watching 😊

  • @AlexandreGTavares
    @AlexandreGTavares Рік тому +1

    Happy this was on my recommended, nice one

  • @VG-or1nu
    @VG-or1nu Рік тому +2

    I typically find myself frustrated, or have little patience for videos that fail to delve deeply… (as in all the over-hyped/dumbed-down clickbait that plagues this site)… Luckily this video was a pleasant surprise with its depth and steady quality. 👍

    • @DanielBoctor
      @DanielBoctor  Рік тому +2

      Glad you liked it! Thanks for the support

  • @flipflopsn
    @flipflopsn 10 місяців тому

    Great video, directly subscribed to your channel.
    Keep on doing great videos like these!
    ----
    EDIT:
    Maybe mention tools like IDA or BinaryNinja for reverse engineering. It's not about giving the "bad guys" more information (because we assume they already have them), it's about spreading knowledge across the good guys (White-Hats) to expand their knowledge and being faster/quicker in finding new vulns than the opposition.
    ----
    Nevertheless you did a great job related to the reversing procedure (e.g. the short analysis of the sqlite lib)!

  • @John-ix6iw
    @John-ix6iw Рік тому

    kind of like that one darkweb movie when the charons joined the call 💀

  • @Anthonyfromtheuk-g3j
    @Anthonyfromtheuk-g3j Рік тому +1

    Internation man is Hereeer? 🎉

  • @Impracticallypractical
    @Impracticallypractical Рік тому +4

    Great video! Well explained! Only correction is that SQL doesn’t use `//` for comments. It uses `--`.

  • @girlypoptransistor
    @girlypoptransistor Рік тому +1

    this is basically a Kevin Fang video

    • @DanielBoctor
      @DanielBoctor  Рік тому +2

      Never heard of him before, but you're definitely right - we even both use LEMMiNO's music LOL

  • @joseville
    @joseville 5 місяців тому

    Another great video!!!

  • @vnc.t
    @vnc.t Рік тому +1

    isn't it a sqlite bug as the utf-8 encoder assumes the 10xxxxxx instead of checking for it and raising an error if the first 2 bits weren't 1 and 0? why was it reported to zoom?

    • @DanielBoctor
      @DanielBoctor  Рік тому +2

      Yeah, that definitely shouldn't have happened, but it's technically up to SQLite how they want to treat their encodings ¯\_(ツ)_/¯
      The deeper source of the vulnerability was the discrepancy in the way that Zoom and SQLite handled encodings. Zoom treated input as plaintext, while SQLite treated the backslash (\) as an escape, indicating that the following hexadecimal sequence was Unicode. Regardless how how SQLite handled those encodings, it was the discrepancy at the end of the day that enabled any of this to be possible, and the onus is on Zoom to deal with that.

  • @larry1851
    @larry1851 Рік тому +2

    Such a great video. Glad i found you! Keep going and you shall succeed.

    • @DanielBoctor
      @DanielBoctor  Рік тому +1

      Thank you for the support! Glad you have you apart of the community

    • @larry1851
      @larry1851 Рік тому +1

      @@DanielBoctor somehow evertime I ask myself something while you explain something somehow you clear it up right the next second. It’s a pleasure to watch and I learned a lot.

    • @DanielBoctor
      @DanielBoctor  Рік тому +1

      That's awesome LOL. I appreciate all of the support, and I'm glad you're able to learn from them! It's the reason why I make these videos

  • @przemeu1353
    @przemeu1353 Рік тому +1

    Great job you getting my sub.

  • @thisismygascan4730
    @thisismygascan4730 Рік тому +1

    is there any reason zoom would have decided to manually implement the input sanitization

  • @Jango1989
    @Jango1989 11 місяців тому +1

    Brilliant video

  • @RoterFruchtZwerg
    @RoterFruchtZwerg 10 місяців тому

    Nice 👍 I thought the whole reason why utf-8 subsequent bytes have to start with 1 is to prevent exactly this - a utf-8 start byte eating away ASCII characters. So the utf-8 decoder is also at fault here? It should have stopped decoding...

  • @Grinwa
    @Grinwa Рік тому +1

    Absolutely wonderful ❤
    And that was super genius method to trick sql once again

  • @Jiyoon02
    @Jiyoon02 10 місяців тому

    Wow... Vulnerabilities like this one convince just how important it is to implement a web-cam cover and a physical mic on/off togle, just for a percussion. A simple step like that goes quite a long way, it seems.

  • @kodzisko-gd7fc
    @kodzisko-gd7fc Рік тому +1

    great video

  • @hgbugalou
    @hgbugalou 10 місяців тому

    I now understand unicode encoding.

  • @ahndeux
    @ahndeux Рік тому +1

    That is why I put electrical tape over all cameras on laptops. That will never be hacked.

    • @Hauketal
      @Hauketal Рік тому

      Sometimes the camera is actually wanted. There are laptops providing a mechanical slider, or one can 3D-print a clamp to put over the lens. Easy to reverse and doesn't leave gooey residue.

    • @mudi2000a
      @mudi2000a 11 місяців тому

      You can buy a Lenovo they have a built in mechanical cover for the webcam so you can easily cover it when not in use.

    • @everyhandletaken
      @everyhandletaken 11 місяців тому

      You had better do the same for the microphone then too 😂

  • @ntrq
    @ntrq Рік тому +1

    nice man

  • @bigbilly29
    @bigbilly29 Рік тому +1

    Great breakdown, thanks for the video!

  • @happyjohn1656
    @happyjohn1656 Рік тому

    This was a great vid

  • @HydratedBeans
    @HydratedBeans 9 місяців тому

    I love your channel, but also hate realizing that there’s no real way to defend against these things proactively.

  • @m4rt_
    @m4rt_ Рік тому +5

    Damn that UTF-8 trick is clever.

  • @pabloenriquegorga4222
    @pabloenriquegorga4222 Рік тому +2

    Outstanding ! cool video !

  • @jerichaux9219
    @jerichaux9219 Рік тому

    I'd thought I'd recognized Lemmino's music there

  • @TheTankiPlayer
    @TheTankiPlayer Рік тому

    Cool video, just wanted to add that debug symbols are not necessary for debugging

  • @RonaldTrumpOfficial
    @RonaldTrumpOfficial Рік тому

    Well, to this hackers dismay I’m too poor to afford a webcam!

  • @CheckmateRubik
    @CheckmateRubik Рік тому +1

    Great Explanation!

  • @rebelape4257
    @rebelape4257 3 місяці тому

    I like the part the funny man mention computer words

  • @bigyoshi4555
    @bigyoshi4555 Рік тому

    i do not know what most of the things are or mean but i still watch it anyway cuz it sounds interesting

  • @TheControlMastr
    @TheControlMastr Рік тому

    Make a reverse engineering video tutorial, geniuenly interested!!!!

  • @s0kulite
    @s0kulite Рік тому +2

    I can’t help to say that you’re pronouncing SQLite with an extra L, it’s “Ess-Queue-Lite”, without that extra L.

    • @DanielBoctor
      @DanielBoctor  Рік тому +2

      I didn't even think of it that way LOL

  • @gorg212
    @gorg212 Рік тому +1

    You sound exactly like code with lewis lol

    • @DanielBoctor
      @DanielBoctor  Рік тому +1

      LOOOOOOOOOL I NEVER HEARD OF HIM BEFORE BUT I ACTUALLY DO

  • @WackoMcGoose
    @WackoMcGoose Рік тому +1

    _taps forehead_ Can't turn on my camera if I never have it plugged in...

  • @NahImPro
    @NahImPro Рік тому

    Find some verifiable sources to link on the next one

  • @Tavern_Talk
    @Tavern_Talk Рік тому +2

    Fr

  • @chengong388
    @chengong388 9 місяців тому

    I don’t program but I know you can debug binary because I know how to do some basic binary editing with cheat engine.

  • @ankk98
    @ankk98 Рік тому +1

    Good explanation

  • @sekiro_19
    @sekiro_19 Рік тому

    Lost to sql injection 😂

  • @BanglaBitTheAi
    @BanglaBitTheAi Рік тому +1

    Well explained

  • @novelhawk
    @novelhawk Рік тому

    This is full of inaccuracies

  • @dogedev12
    @dogedev12 Рік тому

    bro April 7th is my birthday lol

  • @eyephpmyadmin6988
    @eyephpmyadmin6988 Рік тому +1

    I have a self sqli on a android app for a bug bounty. Im not sure how to make it viable. It is using sqlite too. Trying to find any other vuln to chain with it. Been sitting on it for a month

  • @VVVutov
    @VVVutov 11 місяців тому

    Shit. I watch it but suddenly i figured thats the guy with the "girl with a attitude voice" Dude, find somebody to do a voiceover for you

    • @DanielBoctor
      @DanielBoctor  11 місяців тому

      this was actually my last video with this issue, if you check out my subsequent ones, they should be fine

  • @parthsahni8952
    @parthsahni8952 Рік тому +1

    Very nice vid

  • @matthewkeen6281
    @matthewkeen6281 10 місяців тому

    nice

  • @mikee.
    @mikee. Рік тому

    Great video, horrible clickbait.

  • @1st_ProCactus
    @1st_ProCactus Рік тому

    This is not easy to listen too.. are you drunnnnnk ?

  • @bigbilly29
    @bigbilly29 Рік тому +1

    If you get a nebula account ill drop a sub to it

    • @DanielBoctor
      @DanielBoctor  Рік тому +1

      It's an honour to be considered nebula worthy LOL

  • @iseverynametakenwtf1
    @iseverynametakenwtf1 Рік тому +2

    the way you are changing the way you talk is bad, just go with your natural tone, it will come off easier to listen to. I had to stop

    • @DanielBoctor
      @DanielBoctor  Рік тому +2

      I think I finally fixed my intonation in my most recent video

    • @iseverynametakenwtf1
      @iseverynametakenwtf1 Рік тому +1

      will be checking it out, you are interesting @@DanielBoctor

    • @DanielBoctor
      @DanielBoctor  Рік тому +1

      thank you LOL you are one awesome fella

  • @aoe4_kachow
    @aoe4_kachow 10 місяців тому

    Nice topic but boring because you explain too many noob details

  • @metalwellington
    @metalwellington Рік тому +2

    upspeak. come on.