✉️ Sign up for the mailing list ✉️ This video is a description of way to escape a privileged docker container. It’s a technology that’s getting more and more...
Home
✉️ Sign up for the mailing list ✉️ ☕️ Support my channel ☕️ This video is about IDOR vulnerability in YouTube that existed in integration of YouTube with Google Ads. It...
$130,000+ Learn New Hacking Technique in 2021 – Dependency Confusion – Bug Bounty Reports Explained
Today’s Bug Bounty Report Explained covers dependency confusion – a new bug bounty hacking technique that earned the researcher at least $130,000 bounties...
WhatsApp – a malicious GIF that could execute code on your smartphone – Bug Bounty Reports Explained
This video is an explanation of double-free vulnerability that allowed the attacker prepare a malicious GIF image that could execute remote commands on victim’s...
$15,000 Playstation Now RCE via insecure WebSocket connection – Bug Bounty Reports Explained
This video presents a bug bounty report from Hackerone, from Playstation program. The vulnerability was an insecure WebSockets server and led to remote code execution in...
Stealing all your cookies from your mobile Firefox browser – Bug Bounty Reports Explained
This video describes a security vulnerability found by Pedro Oliveira in Android Firefox browser. It allowed to steal cookies of a user that visited the attacker’s...
MS Teams – One message that can install malware on your computer – Bug Bounty Reports Explained
This video is about the RCE vulnerability in desktop clients of Microsoft Teams application. In describes multiple techniques like XSS via AngularJS client-side template...
Very creative way to turn Prototype Pollution into RCE in kibana – Bug Bounty Reports Explained
This video is an explanation of prototype pollution vulnerability in kibana that, in a super cool and very creative way, was used to achieve remote code execution in...
This video is about an RCE vulnerability in Github pages. The report on hackerone was rewarded $25,000. The issue exploited a YAML file used to configure Jekyll website...
Zoom – turning on someone’s camera using SQL injection vulnerability – Bug Bounty Reports Explained
This video is about local SQLinjection vulnerability in Linux and MacOS desktop applications of Zoom – conference app that gained even more popularity as remote...
