Hacking Google Cloud?
Every year Google celebrates the best security issues found in Google Cloud. This year we take a look at the 7 winners to see if we could have found these issues too. Will I regret not having hacked Google last year?
This video is sponsored by Google VRP:
Follow GoogleVRP Twitter: https://twitter.com/GoogleVRP
The GCP Prize Winners of 2022:
https://security.googleblog.com/2023/06/google-cloud-awards-313337-in-2022-vrp.html
1. Prize - $133,337: Yuval Avrahami https://unit42.paloaltonetworks.com/gke-autopilot-vulnerabilities/
2. Prize - $73,331: Sivanesh Ashok and Sreeram KL https://blog.stazot.com/ssh-key-injection-google-cloud/
3. Prize - $31,337: Sivanesh Ashok and Sreeram KL https://blog.stazot.com/auth-bypass-in-google-cloud-workstations/
4. Prize - $31,311: Sreeram KL and Sivanesh Ashok https://blog.geekycat.in/client-side-ssrf-to-google-cloud-project-takeover/
5. Prize - $17,311: Yuval Avrahami and Shaul Ben Hai https://www.paloaltonetworks.com/resources/whitepapers/kubernetes-privilege-escalation-excessive-permissions-in-popular-platforms Talk: https://www.youtube.com/watch?v=PGsJ4QTlKlQ
6. Prize - $13,373: Obmi https://obmiblog.blogspot.com/2022/12/gcp-2022-few-bugs-in-google-cloud-shell.html
7. Prize - $13,337: Bugra Eskici https://bugra.ninja/posts/cloudshell-command-injection/
Previous Winners:
GPC Prize 2019: https://www.youtube.com/watch?v=J2icGMocQds
GPC Prize 2020: https://www.youtube.com/watch?v=g-JgA1hvJzA
GPC Prize 2021: https://www.youtube.com/watch?v=GvO2Xtx8p9w
Chapters:
00:00 - Intro
01:28 - Python Command Injection (Prize 7)
03:01 - XSS, CSRF and NEL Backdoor (Prize 6)
07:04 - Excessive Permissions in k8s DaemonSets (Prize 5)
09:13 - SSRF auth Authorization Token (Prize 4)
10:46 - OAuth Issue (Prize 3)
12:07 - SSH authorized_key Injection (Prize 2)
14:45 - Kubernetes Engine Privilege Escalation (Prize 1)
18:11 - Discussing the Winner
19:25 - What did I learn from the GCP 2022?
20:51 - Outro
=[ ❤️ Support ]=
Get my handwritten font https://shop.liveoverflow.com (advertisement)
Checkout our courses on https://hextree.io (advertisement)
Support these videos: https://liveoverflow.com/support/
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
2nd Channel: https://www.youtube.com/LiveUnderflow
=[ 🐕 Social ]=
→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
Other Videos By LiveOverflow
2023-11-20 | Reinventing Web Security |
2023-10-17 | The Circle of Unfixable Security Issues |
2023-10-05 | Binary Exploitation vs. Web Security |
2023-09-19 | Hacker Tweets Explained |
2023-08-29 | Zenbleed (CVE-2023-20593) |
2023-08-18 | The Discovery of Zenbleed ft. Tavis Ormandy |
2023-08-01 | Asking Android Developers About Security at Droidcon Berlin |
2023-07-22 | Local Root Exploit in HospitalRun Software |
2023-07-13 | Android App Bug Bounty Secrets |
2023-07-03 | Generic HTML Sanitizer Bypass Investigation |
2023-06-22 | Hacking Google Cloud? |
2023-06-11 | Trying to Find a Bug in WordPress |
2023-05-31 | Authentication Bypass Using Root Array |
2023-05-22 | My YouTube Financials - The Future of LiveOverflow |
2023-05-11 | Defending LLM - Prompt Injection |
2023-04-27 | Accidental LLM Backdoor - Prompt Tricks |
2023-04-14 | Attacking LLM - Prompt Injection |
2023-04-01 | Our Future As Hackers Is At Stake! |
2023-03-29 | Cyber Security Challenge Germany (2023) |
2023-03-20 | Cybercrime is Not Hacking! |
2023-03-11 | Attacking Language Server JSON RPC |