REDACTED: $20,000 OAuth Bounty (FT. Nagli)

Sdílet
Vložit
  • čas přidán 25. 02. 2024
  • 📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training
    💵 Support the Channel:
    You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more!
    ☕️ Buy Me Coffee:
    www.buymeacoffee.com/nahamsec
    JOIN DISCORD:
    discordapp.com/invite/ucCz7uh
    🆓 🆓 🆓 $200 DigitalOcean Credit:
    m.do.co/c/3236319b9d0b
    💬 Social Media
    - / nahamsec
    - / nahamsec
    - twitch.com/nahamsec
    - / nahamsec1
    #bugbounty #ethicalhacking #infosec #cybersecurity #redteam #webapp

Komentáře • 48

  • @user-ix4fs3km4v
    @user-ix4fs3km4v Před 4 měsíci +1

    Amazing content, learnt quite a bit and I don't even grasp the fundamental concepts too much, please keep doing the series Naham!

  • @MarkFoudy
    @MarkFoudy Před 4 měsíci

    Nice! Thanks for the content, Nahamsec!

  • @danielregassa9805
    @danielregassa9805 Před 2 měsíci

    Thanks for the amazing video! I really hope you continue this series.

  • @prasadleo1702
    @prasadleo1702 Před 4 měsíci

    Thank you for inviting this incredible man❤

  • @trustedsecurity6039
    @trustedsecurity6039 Před 4 měsíci +8

    WTF!!! It was a CTF, it is a basic oauth open redirect case 😂... That's why old bug hunter earn money, they are all in private program with easy bug like this for $20k... They gave him $6k for testing their patch lol

    • @drot20
      @drot20 Před 3 měsíci

      watch the whole video before commenting... it wasn't a basic oauth code steal through a redirect - he was able to add a new oauth flow that then allowed him to steal the code. I agree about the older hunters having it way easier tho, a bug like this wouldn't last two hours on a public program

    • @trustedsecurity6039
      @trustedsecurity6039 Před 3 měsíci

      That is even more simple than the open redirect case... It was to resume it LMAO

    • @galnagli6221
      @galnagli6221 Před 3 měsíci +2

      It was on a public program and the scope was public for 5 years

    • @Daniel-ng8fi
      @Daniel-ng8fi Před měsícem

      @@galnagli6221 yeah, lots of people don't check easy stuff cuz they figure theres no way its still there because everyone has already checked it.

  • @mohittirkey7889
    @mohittirkey7889 Před 4 měsíci

    Interesting , looks like a scenario of oauth implicit grant type. Thanks for the CTF and the video both.

  • @jaywandery9269
    @jaywandery9269 Před 4 měsíci +2

    clearly a master at work. please @NahamSec be doing this frequently.

  • @bughunter9766
    @bughunter9766 Před 4 měsíci

    We love such content ,,, thanks Ben & Nagli

  • @eyezikandexploits
    @eyezikandexploits Před 4 měsíci

    This is definitely something new im going to be looking for. I am wondering if you could go over prototype pollution, i found one in a vdp but its not really able to execute anything too im not sure if its worth reporting

  • @sharghaas7774
    @sharghaas7774 Před 3 měsíci

    This is awesome!! amazing content

  • @ReligionAndMaterialismDebunked

    Early crew. Shalom.

  • @user-wb1yh8sm1w
    @user-wb1yh8sm1w Před 4 měsíci +1

    what is 5wp how do I sign up for that ? where to look ? could anyone help me ?

  • @soltanali2132
    @soltanali2132 Před 4 měsíci

    thanks Ben & Nagli😍😍

  • @neadlead2621
    @neadlead2621 Před 3 měsíci +2

    but in this case you got the code for the specific application that you've created (client_id=6) when you will take the acceess token and use it in the other app (client_id=1 ) the oauth service should not allow you

    • @Daniel-ng8fi
      @Daniel-ng8fi Před měsícem

      yeah, I don't get it. There'd have to be another vulnerability that doesn't correctly match codes

  • @edavidwaner2187
    @edavidwaner2187 Před 4 měsíci

    thanks man ❤❤

  • @user-pu4rp1qd5n
    @user-pu4rp1qd5n Před 4 měsíci +1

    i have concern about training what we are getting we do practice in dvwa and some other labs we successfully bypass but when we go to the real live testing nothing is working what we learned in training online courses ?

    • @jaywandery9269
      @jaywandery9269 Před 4 měsíci +2

      this is entirely true. Most real world websites are battle hardened targets, I suppose more practice and dedication would do.

    • @user-pu4rp1qd5n
      @user-pu4rp1qd5n Před 4 měsíci

      yes we have to do there is no other option thanks@@jaywandery9269

  • @khneo
    @khneo Před 4 měsíci +1

    Can someone explain me why is it critical and not high ? Its auth bypass that require user interaction right ?

    • @trustedsecurity6039
      @trustedsecurity6039 Před 4 měsíci

      Because it is nagli and live hacking event... I reported the same and wasnt paid that amount (far from it)

  • @shubham_srt
    @shubham_srt Před 4 měsíci

    🐐

  • @nuttygold5952
    @nuttygold5952 Před 4 měsíci +1

    This is more of an open redirect, than an account take over. You would need to exchange the code for a token (know the secret) in order to get an access token for the resourse of a user.
    But hey 20k is 20k

    • @BuildHackSecure
      @BuildHackSecure Před 4 měsíci

      No, in this example Nagli created a new client on the OAuth server, when creating the new client he was given a secret to be used for authenticating the token.

    • @nuttygold5952
      @nuttygold5952 Před 4 měsíci

      @@BuildHackSecure but what is the account take over caused by, which is what is communicated in the video?

  • @npecko
    @npecko Před 4 měsíci

    100% able espaniol 😏

  • @rctech1237
    @rctech1237 Před 4 měsíci +1

    Keep it up

  • @vikasrajput6044
    @vikasrajput6044 Před 4 měsíci

    Good evening sir

  • @h5e
    @h5e Před 4 měsíci

    מעניין מאיפה המבטא שלו🧐

  • @KarahannAe
    @KarahannAe Před 4 měsíci +4

    In this example we are creating a new client and then getting the victim's code for that client. The code generated for one client shouldn't work for another. So I feel like account takeover wouldn't work in this case.

    • @BuildHackSecure
      @BuildHackSecure Před 4 měsíci +1

      It shouldn't but it did, that's the issue, the OAuth site allowed creation of new clients which could work with any users. Yes you'd have to get the user to click a link but then you could exfil the token and create your own session as that user.

    • @NiteshBhatter
      @NiteshBhatter Před 4 měsíci +1

      I agree. the client_id=7 code is not going to work on client_id=1. Since the open redirect he has shown is for client_id 7 where he has an option to set the redirect URL. So I do see there is an issue but this is not one click ATO for the client_id 1 since that redirect URL was very secure. The issue here is you can setup a new client without even having the account as shown in the burp. Also open direct in general for the authorization server since I can setup a URL and if user click it can redirect to attacker controlled site.

  • @rctech1237
    @rctech1237 Před 4 měsíci +1

    First

  • @shashikiran00
    @shashikiran00 Před 4 měsíci +1

    Is it real 20,000 Bounty OAuth

  • @Learning.Something.New.Daily.

    👍🏻

  • @sudoer92
    @sudoer92 Před 4 měsíci +1

    probably he hacked this site using his apple vison pro😅

  • @greeneyedguy
    @greeneyedguy Před 4 měsíci +4

    Can someone translate into English 😖 I can barely understand every other word this guy is saying... Maybe it's time to learn French or something

    • @thenextbigthing1393
      @thenextbigthing1393 Před 4 měsíci +1

      He's speaking English

    • @greeneyedguy
      @greeneyedguy Před 4 měsíci

      @@thenextbigthing1393 You don't say...

    • @sridevis5536
      @sridevis5536 Před 4 měsíci +1

      lol, he spoke English in his own accent, use subs..

    • @h5e
      @h5e Před 4 měsíci

      its isreali accent xd

  • @bakeery
    @bakeery Před 4 měsíci

    So VDP don't really pay? I was invited and I submitted bugs, but they always close it saying it doesn't qualify, first it's not out of scope i show them the impact by using document.cookie to return sessions, they said no, it's within an email sandbox there it doesn't qualify, i bye pass the sandbox and they still close it without any further explanation. Do VDP really behave like that??

  • @alirezashayegan8260
    @alirezashayegan8260 Před 4 měsíci