$130,000+ Learn New Hacking Technique in 2021 - Dependency Confusion - Bug Bounty Reports Explained

Поділитися
Вставка

КОМЕНТАРІ • 61

  • @BugBountyReportsExplained
    @BugBountyReportsExplained  3 роки тому +6

    Welcome to the comment section!
    First, thanks for watching!
    Make sure you are subscribed if you liked the video!
    ua-cam.com/users/BugBountyReportsExplained
    Follow me on twitter:
    twitter.com/gregxsunday
    ✉️ Sign up for the mailing list ✉️
    mailing.bugbountyexplained.com/
    ☕️ Support my channel ☕️
    www.buymeacoffee.com/bountyexplained
    🖥 Get $100 in credits for Digital Ocean 🖥
    m.do.co/c/cc700f81d215

  • @mukundbhuva
    @mukundbhuva 3 роки тому +2

    I was eagerly waiting for the video 😍

  • @piguyalamode164
    @piguyalamode164 2 роки тому

    The most interesting part is that the way it is set up makes a lot more sense if say you where part of a group of people doing package maintenance who had a dev version on a private server and a public version on the pip repo. Thus, once you had a full update ready, you could update the one in the repo to a higher version than yours and then automatically have everyone on your team update to the consumer version.

  • @JoaquinRamirez
    @JoaquinRamirez 3 роки тому +2

    Amazing job , like always!

    • @TheKing-ul5pw
      @TheKing-ul5pw 3 роки тому

      ua-cam.com/video/uNSxrWCwUqQ/v-deo.html

  • @cybersecurity3523
    @cybersecurity3523 3 роки тому +4

    Good job bro

  • @developright7890
    @developright7890 3 роки тому +9

    Atleast with NPM you're supposed to use namespaces when installing packages. For example @company/example-package would check within a .npmrc file and check if @company correlates to a pirate registry

  • @abdssamadelbaraghi9477
    @abdssamadelbaraghi9477 3 роки тому +1

    great content, keep up the good work.

  • @-bubby9633
    @-bubby9633 3 роки тому +1

    So well explained! Very easy to understand. Love it when a new attack vector is found.

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому +1

      Thanks Andrew. I am also soo amazed when it seems like it will be a long time before a new impactful vuln and then someone comes up with that.

  • @BinaryByte
    @BinaryByte 3 роки тому

    Thanks for the video. Nice explanation.

  • @Thunder-dp7du
    @Thunder-dp7du 3 роки тому +1

    Well explain thanks bro

    • @TheKing-ul5pw
      @TheKing-ul5pw 3 роки тому

      ua-cam.com/video/uNSxrWCwUqQ/v-deo.html

  • @cataAZU47
    @cataAZU47 3 роки тому +2

    Hi, I want to congratulate you on your quality content and just wanted to ask where do you find about all those bounty reports, can you give us some links for some daily reading? Thanks and keep up the awesome work!

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому +3

      Hi, thanks for your comment. I usually find all reports on intigriti's bug bytes newsletter. There should be a few hours of good reading there ;)

  • @0xrugb
    @0xrugb 3 роки тому

    Thanks man

  • @ppan
    @ppan 3 роки тому

    You sir are my favorite youtuber, no BS no Drama only pure 'Gem' :)

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому +1

      thank you a lot vishaesh!

    • @ppan
      @ppan 3 роки тому

      @@BugBountyReportsExplained I was unable to visit www.buymeacoffee.com/bountyexplained, is there another way to support you? :)

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому +1

      @@ppan That's very kind and I feel really appreciated ;) at the moment there's no way to support me. I decided that if I want to receive money from viewers, it will be in exchange for some more content from me - I don't want to receive it just like that. So I'm working on a BBRE premium where I will create more (details soon) for paid subscriptions. It's planned to launch in August ;)

    • @ppan
      @ppan 3 роки тому

      @@BugBountyReportsExplained sounds sincere and great! I look forward to it :)

  • @Xpl0itme921
    @Xpl0itme921 2 роки тому

    Can you make a video how to find this vulnerability

  • @theologos3705
    @theologos3705 3 роки тому +1

    Can i ask you something else?
    I found on a website an error that says Jade Compiler Exception and contains different informations.Have you ever heard about this?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому +1

      jade is template engine for npm. You can try to trigger server-side template injection.

  • @RN-kl4kp
    @RN-kl4kp 3 роки тому +1

    Thanks for the video I was lit confused when I read the article on dependency pkg names , thanks to you now I know where to look for . But I won't try it out as I don't know how to retrieve the data from server or write custom malware without a template structure .

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому +2

      I think malware is an overstatement for a script that gets username, hostname and path back to your dns server. It's not that hard

    • @mase289
      @mase289 3 роки тому

      @@BugBountyReportsExplained Stuck to at coming up with a POC on an issue i found with a NPM package on a bounty program. Do you mind throwing more light on this? Great video as always!

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому

      what exactly are you stuck with?

    • @mase289
      @mase289 3 роки тому

      @@BugBountyReportsExplained Creating a node js preinstall script which will phone home to my server once my malicious package is installed on the victim machine. I am basically trying to capture the same details as explained in your video so i can submit a POC.

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому +1

      @@mase289 ok, dm me on twitter

  • @theologos3705
    @theologos3705 3 роки тому

    Can i make you a question?Do you know if cisco gives any bounty or certificate,if you find bug?Thanks!!

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому

      you should email psirt@cisco.com
      Cisco has wide-used solutions so you might even get a CVE

    • @theologos3705
      @theologos3705 3 роки тому

      @@BugBountyReportsExplained Do you know if they are giving CVE for exposed log files?Thanks!!

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому

      @@theologos3705 I dont know, but I think you should report it anyway

  • @sanya2311
    @sanya2311 3 роки тому

    When for example an automated system installs our package instead of the official one, then the application may crash right? Isn't that a problem, when doing bug bounties? Maybe I misunderstood something, please explain me. (Anyway fantastic video as always:) )

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому +2

      That's a very valid question. That's the risk. However, I hope that most systems will build QA/test/staging environment first and once it fails because of that then the change will not be pushed to the production env, so customers won't be affected.

  • @Cyber-jv8ve
    @Cyber-jv8ve 3 роки тому

    If i report this time dependency confusion bug will it get accepted?

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому

      You will be better off by reading the program rules. If you prove the impact it should be accepted but it's not hard to break something with this vulnerability so watch out.

    • @Cyber-jv8ve
      @Cyber-jv8ve 3 роки тому

      @@BugBountyReportsExplained can you maybe give me a scirpt to show the impact?

  • @MohitSharma-xf9wp
    @MohitSharma-xf9wp 3 роки тому

    appreciated

  • @zTech300
    @zTech300 3 роки тому

    Super.

  • @ПашаМороз-з5ч
    @ПашаМороз-з5ч 3 роки тому +3

    Mr. Author, I have a one question
    Is DevOps a good main job to learn pentest as a hobby?
    P.s.
    The video is amazing

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 роки тому +4

      Hi, thanks for the question. DevOps and pentesting are correlated and knowledge from both areas can help in the other one. There's also a new trend called DevSecOps, where Sec stands for security. For example, such person has to build secure pipeline and integrate security tools in the process. If you are interested in both areas this might be a good direction for you.

    • @ПашаМороз-з5ч
      @ПашаМороз-з5ч 3 роки тому

      @@BugBountyReportsExplained Thanks for the answer

  • @ronakkatariya3575
    @ronakkatariya3575 3 роки тому

    Sir how can i start bug bounty ?
    Expecting a detail answer

  • @SrTCOT
    @SrTCOT 3 роки тому +2

    🔥🔥🔥🔥

  • @hamzahcoc
    @hamzahcoc 3 роки тому

    nice 😲

  • @patrickleon9337
    @patrickleon9337 3 роки тому +4

    Very happy 😍💋 💝💖♥️❤️

    • @TheKing-ul5pw
      @TheKing-ul5pw 3 роки тому

      ua-cam.com/video/uNSxrWCwUqQ/v-deo.html

  • @eXfilPr4tik
    @eXfilPr4tik 3 роки тому +2

    😮😮

  • @unkn0wn238
    @unkn0wn238 3 роки тому

    ❤️