$31,337 Google Cloud blind SSRF + HANDS-ON labs

Описание к видео $31,337 Google Cloud blind SSRF + HANDS-ON labs

Access hands-on labs where you can write your own script to exploit this bug:
https://mailing.bugbountyexplained.co...

📧 Subscribe to BBRE Premium: https://bbre.dev/premium
✉️ Sign up for the mailing list: https://bbre.dev/nl
📣 Follow me on Twitter: https://bbre.dev/tw


This video is an explanation of a vulnerability from Google bug bounty program. The bug was blind SSRF (Server-side request forgery) and the exploitation led to leaking the service account access token. The researcher, David Nechuta was awarded $31k bounty for it.

🖥 Get $100 in credits for Digital Ocean 🖥
https://m.do.co/c/cc700f81d215

✎Sign up for Pentesterlab from my referral✎
https://pentesterlab.com/referral/Vtc...

Report:
https://nechudav.blogspot.com/2020/11...
Reporter's twitter:
  / david_nechuta  

Follow me on twitter:
  / gregxsunday  

Timestamps:
00:00 Intro
00:35 Detecting the SSRF vulnerability
02:11 Basic data exfiltration
04:46 Overcoming load-balancing
07:01 Speeding-up the process by smart regexes
08:47 Try to exploit this vulnerability yourself with hands-on labs

Комментарии

Информация по комментариям в разработке