video thumbnail 22:12
The Circle of Unfixable Security Issues

2023-10-17

[public] 41.6K views, 5.28K likes, dislikes audio only

channel thumbLiveOverflow

Not every security issues can be fixed. There exist (what I call) "unfixable" bugs, where you can always argue and shift the goal posts. The idea is to only report these kind of issues to create an endless stream of bug bounty money!

Buy my terrible font (ad): https://shop.liveoverflow.com

Learn hacking (ad): https://hextree.io

What is a vulnerability? /youtube/video/866olNIzbrk

hackerone reports:

https://hackerone.com/reports/812754

https://hackerone.com/reports/6883

https://hackerone.com/reports/223337

https://hackerone.com/reports/819930

https://hackerone.com/reports/224460

https://hackerone.com/reports/160109

https://hackerone.com/reports/557154

OWASP: https://owasp.org/www-community/controls/Blocking_Brute_Force_Attacks

Chapters:

00:00 - Intro

00:30 - Denial of Service with loooong passwords

03:18 - Invalid vs. Valid DoS Reports

05:11 - Deployment Differences

06:54 - Denial of Service vs. Bruteforce Protection

09:27 - IP Rate-Limiting "fix"

12:06 - Locking User Accounts?

13:59 - The Circle of Unfixable Security Issues

15:25 - Vulnerability vs. Weakness

16:49 - The Cybersecurity Industry

19:03 - Conclusion: Cybersecurity vs. Hacking

21:34 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow

→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/

→ Streaming: https://twitch.tvLiveOverflow/

→ TikTok: https://www.tiktok.com/@liveoverflow_

→ Instagram: https://instagram.com/LiveOverflow/

→ Blog: https://liveoverflow.com/

→ Subreddit: https://www.reddit.com/r/LiveOverflow/

→ Facebook: https://www.facebook.com/LiveOverflow/


Intro
/youtube/video/lr1KuL8OmJY?t=0
Denial of Service with loooong passwords
/youtube/video/lr1KuL8OmJY?t=30
Invalid vs. Valid DoS Reports
/youtube/video/lr1KuL8OmJY?t=198
Deployment Differences
/youtube/video/lr1KuL8OmJY?t=311
Denial of Service vs. Bruteforce Protection
/youtube/video/lr1KuL8OmJY?t=414
IP Rate-Limiting "fix"
/youtube/video/lr1KuL8OmJY?t=567
Locking User Accounts?
/youtube/video/lr1KuL8OmJY?t=726
The Circle of Unfixable Security Issues
/youtube/video/lr1KuL8OmJY?t=839
Vulnerability vs. Weakness
/youtube/video/lr1KuL8OmJY?t=925
The Cybersecurity Industry
/youtube/video/lr1KuL8OmJY?t=1009
Conclusion: Cybersecurity vs. Hacking
/youtube/video/lr1KuL8OmJY?t=1143
Outro
/youtube/video/lr1KuL8OmJY?t=1294
Hacker Tweets Explained 138,173 views
/youtube/video/3zShGLEqDn8
Support liveoverflow.com
https://liveoverflow.com/support
Bug Bounty by LiveOverflow
/youtube/video/LrLJuyAdoAg