Comments on: Advanced Flash Vulnerabilities in Youtube – Part 1 /2017/08/advanced-flash-vulnerabilities-in-youtube/?utm_source=rss&utm_medium=rss&utm_campaign=advanced-flash-vulnerabilities-in-youtube Open mind Security and Crypto! Fri, 30 Jul 2021 20:07:09 +0000 hourly 1 https://wordpress.org/?v=6.0.11 By: nick /2017/08/advanced-flash-vulnerabilities-in-youtube/#comment-52 Thu, 05 Oct 2017 03:16:44 +0000 /?p=8#comment-52 In reply to Engue Gillier.

Thank you, Enguerran~
It’s very helpful advice. I’m very beginner in this area. as you said, I think I’m gonna start with old website 🙂

Thank you again. Have a nice day~:)

]]>
By: Engue Gillier /2017/08/advanced-flash-vulnerabilities-in-youtube/#comment-51 Tue, 03 Oct 2017 08:04:06 +0000 /?p=8#comment-51 In reply to nick.

The process is almost always the same:
– First, explore the app from the outside. List the entry points (url is not the only way in, think postMessage for iframe for example), read the doc, google it, read any blog or stackoverflow topic about it, understand the app features and the business purpose it solves
– Then debug! Browsers make it very easy to debug web apps. Use all the console tabs to see how the app is working. Modify some variables and see how the app reacts, use external tools like Burp Suite or browser extensions to modify and debug the app more in-depth.
– Read the source code. If it’s open source, grab the source. If it’s compiled, decompile the binaries. If it’s minified or obfuscated like javascript, modify the code to make it more readable. Try to understand the security features in the code and see how you can bypass them. Think about what the developers could have missed or misunderstood.

If you’re a beginner in this, don’t go after Google or Facebook right away. Start with easier targets. Large, old websites are good targets, like Yahoo and Paypal 😉

]]>
By: nick /2017/08/advanced-flash-vulnerabilities-in-youtube/#comment-49 Tue, 03 Oct 2017 07:19:06 +0000 /?p=8#comment-49 Thank you for great article 🙂

I’m wondering … how to find Youtube Flash api flow ?
I think you did reverse engineering. but what do I have to do to know all about the api flow like you ? 😛

]]>
By: Gopal Singh /2017/08/advanced-flash-vulnerabilities-in-youtube/#comment-32 Fri, 15 Sep 2017 13:09:51 +0000 /?p=8#comment-32 I am still waiting for your Write-up on the facebook stored XSS bug i hope you write it soon

]]>
By: reeseXmoonstar88 /2017/08/advanced-flash-vulnerabilities-in-youtube/#comment-28 Wed, 13 Sep 2017 18:24:51 +0000 /?p=8#comment-28 Man!!!! Best write-up so far!!!

]]>
By: Engue Gillier /2017/08/advanced-flash-vulnerabilities-in-youtube/#comment-18 Tue, 05 Sep 2017 07:05:31 +0000 /?p=8#comment-18 In reply to subramanya sai.

Thank you for your questions. I didn’t publish many write-ups yet. There is a public bug report for Vimeo at https://hackerone.com/reports/136481 and I will disclose some of my findings on Facebook soon.
Regarding Flash pentesting, here are the main resources I use :
– Decompilation tools : Sothink SWF Decompiler, JPEXS Free Flash Decompiler, AS3 Sorcerer
– Flash security docs : Official Doc, Security Domains, OWASP Cross Site Flashing
– Write-ups: Finding XSS vulnerabilities in flash files, XSS and CSRF via SWF, WordPress Flash XSS
Happy hunting!

]]>
By: subramanya sai /2017/08/advanced-flash-vulnerabilities-in-youtube/#comment-15 Mon, 04 Sep 2017 18:35:11 +0000 /?p=8#comment-15 Good article with #POC on the Flash vulnerabilities!! Where could the other vulnerability #POCS for face-book,stripe,paypal etc mentioned in article be found and what are best sources to refer subject to flash pen- testing??

]]>