Hacking Google Cloud?

Channel:
Subscribers:
921,000
Published on ● Video Link: https://www.youtube.com/watch?v=uOvizKc1WZY



Duration: 21:59
124,071 views
4,712


Every year Google celebrates the best security issues found in Google Cloud. This year we take a look at the 7 winners to see if we could have found these issues too. Will I regret not having hacked Google last year?

This video is sponsored by Google VRP:
Follow GoogleVRP Twitter: https://twitter.com/GoogleVRP

The GCP Prize Winners of 2022:
https://security.googleblog.com/2023/06/google-cloud-awards-313337-in-2022-vrp.html

1. Prize - $133,337: Yuval Avrahami https://unit42.paloaltonetworks.com/gke-autopilot-vulnerabilities/
2. Prize - $73,331: Sivanesh Ashok and Sreeram KL https://blog.stazot.com/ssh-key-injection-google-cloud/
3. Prize - $31,337: Sivanesh Ashok and Sreeram KL https://blog.stazot.com/auth-bypass-in-google-cloud-workstations/
4. Prize - $31,311: Sreeram KL and Sivanesh Ashok https://blog.geekycat.in/client-side-ssrf-to-google-cloud-project-takeover/
5. Prize - $17,311: Yuval Avrahami and Shaul Ben Hai https://www.paloaltonetworks.com/resources/whitepapers/kubernetes-privilege-escalation-excessive-permissions-in-popular-platforms Talk: https://www.youtube.com/watch?v=PGsJ4QTlKlQ
6. Prize - $13,373: Obmi https://obmiblog.blogspot.com/2022/12/gcp-2022-few-bugs-in-google-cloud-shell.html
7. Prize - $13,337: Bugra Eskici https://bugra.ninja/posts/cloudshell-command-injection/

Previous Winners:
GPC Prize 2019: https://www.youtube.com/watch?v=J2icGMocQds
GPC Prize 2020: https://www.youtube.com/watch?v=g-JgA1hvJzA
GPC Prize 2021: https://www.youtube.com/watch?v=GvO2Xtx8p9w

Chapters:
00:00 - Intro
01:28 - Python Command Injection (Prize 7)
03:01 - XSS, CSRF and NEL Backdoor (Prize 6)
07:04 - Excessive Permissions in k8s DaemonSets (Prize 5)
09:13 - SSRF auth Authorization Token (Prize 4)
10:46 - OAuth Issue (Prize 3)
12:07 - SSH authorized_key Injection (Prize 2)
14:45 - Kubernetes Engine Privilege Escalation (Prize 1)
18:11 - Discussing the Winner
19:25 - What did I learn from the GCP 2022?
20:51 - Outro

=[ ❤️ Support ]=

Get my handwritten font https://shop.liveoverflow.com (advertisement)
Checkout our courses on https://hextree.io (advertisement)

Support these videos: https://liveoverflow.com/support/

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
google cloud
gke
kubernetes engine
autopilot
gcp
gcp prize 2022
google vrp
vulnerability reward
bug bounty
bug bounties
bug hunter
hacking google
google hacked
google kubernetes
oauth vuln
xss
csrf
google xss
google csrf
ssrf
key injection