Тёмный

Discord Screwed Up… Badly 

No Text To Speech
Подписаться 1 млн
Просмотров 490 тыс.
50% 1

Опубликовано:

 

25 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 934   
@Doctorgeo7
@Doctorgeo7 Год назад
Wow... This is a school grade level exploit. Anyone who paid attention to basic website security knows how to prevent this attack. And yet Discord's dev team is so incompetent that it couldn't even prevent something this basic.
@0.r0
@0.r0 Год назад
discords dev team is 12 year olds what want the badge
@pseudoscientist8010
@pseudoscientist8010 Год назад
So why it this action not considered as in purpose? If so much money is being stolen, then a kickback is obvious.
@bitrare7
@bitrare7 Год назад
@@0.r0 You seem like you're 12 with that spelling. Discord devs work at discord for money not a badge? And you have to be over 18 to actaully work at discord.
@bitrare7
@bitrare7 Год назад
Bros the developer police 😭 the devs have hundreds of things to do they aren't able to check every little thing
@0.r0
@0.r0 Год назад
@@bitrare7 seem* Just because I don't use grammar does not mean I'm a 12 year old. Also, you could learn how to understand a joke?
@jackdavenport5011
@jackdavenport5011 Год назад
The crazy thing is that React (which Discord is built with) literally has XSS protection built into it, meaning the developers had to deliberately go out of their way to make this exploit possible.
@Choroalp
@Choroalp Год назад
Discord is made with electron
@hovac.
@hovac. Год назад
@@Choroalp youre dumb
@Choroalp
@Choroalp Год назад
@@hovac. yes i am(and how do fuck you managed to find me)( some people saying itami might be backdoored)
@rice8864
@rice8864 Год назад
@@Choroalp electron is the desktop framework, react is the frontend framework which discord is built with
@tabiasgeehuman
@tabiasgeehuman Год назад
@@Choroalp electron is just repackaged chrome and nodejs. You can use any framework with it, including react, which is what discord does
@lior_haddad
@lior_haddad Год назад
They use React and still got an XSS issue?! That's honestly unforgivable.
@jojo989GD
@jojo989GD Год назад
lmaao
@jackdavenport5011
@jackdavenport5011 Год назад
Lmao someone just likes using dangerouslySetInnerHTML
@rednexie
@rednexie Год назад
@@jackdavenport5011 lmao they should just change it to innertext and its gone
@adrianozuna875
@adrianozuna875 Год назад
Do they even code review at this point
@adrianozuna875
@adrianozuna875 Год назад
@@frank8627-v8k You're right lmaoo
@Brabbs
@Brabbs Год назад
God, the absolute leveling that this guy does is addicting. This guy feels like one of those parents that would go: "Yeah, school sucks, heres why it sucks-"
@migs388
@migs388 Год назад
Facts
@probablynotsouth
@probablynotsouth Год назад
Nah it's true tho
@satgurs
@satgurs Год назад
is is
@GamerShyUncut
@GamerShyUncut Год назад
Fun fact. Changing your password doesn't always work. I actually once got hacked on Discord, and instantly changed my password the moment I knew what had happened. Before the scammer even had a chance to do it themselves. They still got control of my account. Next level tomfoolery indeed.
@NotAFanMan88
@NotAFanMan88 Год назад
In token stealing exploits, you may have to explicitly invalidate all your login sessions, which discord does allow you to do. Changing passwords doesn't necessary invalidate all existing login session tokens, though if discord had any sense they should.
@theseangle
@theseangle Год назад
They probably just send an automatic POST request to change the password to the discord server upon receiving the token immediately. Most likely that's why you don't have time to change your password in time
@Willie-2024
@Willie-2024 Год назад
Someone, please make this man a Discord Mod. He does figure out more than discord itself.. Hats off man. Love from India
@clouderino
@clouderino Год назад
NO OH GOD PLEASE DONT MAKE HIM A DISCORD MOD I DONT WANT TO BE HIS KITTEN
@neanni
@neanni Год назад
​@@clouderinospooky
@itsarian.
@itsarian. Год назад
WHY ARE INDIAN PEOPLE EVERYWHERE LITERALLY EVERY COMMENT I SEE IT SAYS "LOVE FROM INDIA" AT THE END
@justaweeb14688
@justaweeb14688 Год назад
@@itsarian. because they had too many kids
@justaweeb14688
@justaweeb14688 Год назад
Why tf you insulting him for? Why do you want him to be a discord mod?
@tairitsu5560
@tairitsu5560 Год назад
I've heard Twitter had a self-retwitting script that works just like this, but that was several years ago. Can't believe this still happens
@Coder_Tavi
@Coder_Tavi Год назад
ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-zv0kZKC6GAM.html
@Knaeckebrotsaege
@Knaeckebrotsaege Год назад
@@Coder_Tavi links get censored by YT (only the poster can see it, nobody else), which might explain why it's showing "2 replies" yet only one shows up
@Archimedes.5000
@Archimedes.5000 Год назад
It was TweetDeck not Twitter as far as I know
@苾
@苾 Год назад
NTTS is a youtuber I actually like to watch nowadays, even tho its about subjects I don't even know much about or affects me
@ItzStardustYT
@ItzStardustYT Год назад
@@stavratum 💀
@izzyxvibes
@izzyxvibes Год назад
@@stavratum if u don’t care then why’d you respond
@苾
@苾 Год назад
@@izzyxvibes cause he is a fan
@KhAnTlol
@KhAnTlol Год назад
@@stavratum we don't care that you don't care
@inspektor66
@inspektor66 Год назад
@@stavratum you seem like an angsty teenager with a "p" addiction.
@rvs570
@rvs570 Год назад
Why don't we create a script that generates tokens and sends them to all known token saving sites? Fill up their databases and have them be less effective
@rvs570
@rvs570 Год назад
Actually, I found my goal for today xD
@polaris2707
@polaris2707 Год назад
Safer to send junk and not actual tokens. Provided they don't have checking it'll still work and doesn't carry the risk of accidentally sending a legit token.
@jsh722
@jsh722 Год назад
well there is a chance you can generate a legit token
@rvs570
@rvs570 Год назад
@@polaris2707 Yea, would probably make sure to add or remove some random part to it to be safe
@rick-sanchez
@rick-sanchez Год назад
Exactly my thought. You just need to put it trough a service that sends it from different IP addresses first or they can filter it easily.
@MaahirMomtaz12
@MaahirMomtaz12 Год назад
This seems to be a monthly thing now. Just don't click links. Simple
@rebane2001
@rebane2001 Год назад
XSS vulnerabilities like this one are very rare.
@stryrok4216
@stryrok4216 Год назад
I dont know if I should say this but I literally saw/knew a guy who said he can just token grab people by just giving a invite link and that was over a year ago ,just how many people have known about it before this vid almost scary
@AANyt
@AANyt Год назад
i mean, this link is looking safe. So the only possibility is, to not use the internet at all or don't use services like discord (what ever this means)
@SurmenianSoldier
@SurmenianSoldier Год назад
@@AANyt or just don't be dumb and have like 3000 layers of protection ezez
@tzarg
@tzarg Год назад
@@SurmenianSoldier or don't be dumb and click on whatever unsuspecting tinyurl links you see pop up
@sluuuudge
@sluuuudge Год назад
I’m honestly astounded that in 2022, Discord of all companies managed to accidentally create an XSS exploit.
@DMack6464
@DMack6464 Год назад
Well Google had one, so why stop the incompetence there?
@testuser1235
@testuser1235 Год назад
Bro u clearly know nothing. 1. They didnt create an XSS Exploit, a person which found the vulnerability created the exploit 2. Even in Google, Nvidia, Apple etc. are xss, and even more dangerous vulnerabilities (like ssrf, or with that RCE) found (daily), so pls dont just talk shit about discord, when u clearly know nothing about this topic. Look at for example Hackerone and see how many reports are daily submitted and resolved.
@sluuuudge
@sluuuudge Год назад
@@testuser1235 I ain't your "bro", either way you're still incorrect. Discord developed the application therefore they created the exploitable surface. Perhaps I didn't make that part of my comment clear. I'm not sure why you're white knighting Discord as if they're gonna give you a job for defending them...
@testuser1235
@testuser1235 Год назад
@@sluuuudge nah, im Not defending them, but I just can‘t stand people who think, Discord is the only Company who has vulnerabilities like that.
@un1que730
@un1que730 Год назад
@@testuser1235 discord is the one company getting fame astoundingly fast ,with mass comes critics
@zephyrprime8
@zephyrprime8 Год назад
Discord try not to create a security vulnerability with every new feature challenge (impossible)
@k.silverpoint
@k.silverpoint Год назад
This is as good as a reminder to everyone to SANITIZE YOUR INPUTS.
@QUASAR098
@QUASAR098 Год назад
xkcd reference
@JaivianDean
@JaivianDean Год назад
@Jimmeh make inputs(what they user types in a text box) basically only work for the purpose you give them, no funky business, lol
@mousepotatoliteratureclub
@mousepotatoliteratureclub Год назад
@@QUASAR098 Happy holidays to Bobby Tables
@williamdrum9899
@williamdrum9899 Год назад
@@jimmydabear Design your website so that if the user types in computer code instead of a password their code doesn't get run.
@maskettaman1488
@maskettaman1488 Год назад
This has nothing to do with input sanitation lmao
@nclsDesign
@nclsDesign Год назад
The only vulnerability that's more unforgivable than XSS is SQL injections... That this happened to a big company like Discord is even worse...
@ItzStardustYT
@ItzStardustYT Год назад
Discord messed up??!?! No way! Impossible!
@Prouf1
@Prouf1 Год назад
-_-
@ezioboiz-ieatchildren-
@ezioboiz-ieatchildren- Год назад
Who could have guessed???
@joelhoon1707
@joelhoon1707 Год назад
This is the first time this has happened in so long, I forgot Discord ever messed up!!!!!
@debargha0_0
@debargha0_0 Год назад
Looks like $800K wasn't that much for Discord, they should be again fined
@uhKilz
@uhKilz Год назад
I appreciate you making these videos. I love waiting to get into a MW2 match and watching discords biggest mistakes.
@jn567
@jn567 Год назад
MW2?
@Likemea
@Likemea Год назад
@@jn567 Modern Warfare 2
@uhKilz
@uhKilz Год назад
@@jn567 jc isn’t really a gamer if he doesn’t know what modern warfare 2 is
@ezioboiz-ieatchildren-
@ezioboiz-ieatchildren- Год назад
@@uhKilz facts, he's probably 9 years old and plays Minecraft.
@cenniebeanie
@cenniebeanie Год назад
there should be (again) in the title 😂
@TomJ211
@TomJ211 Год назад
Lol
@MrFilgueiras.
@MrFilgueiras. Год назад
Following this logic, the next exploit is gonna be "someone accidentaly typed 'DROP DATABASE discord' oops"
@williamdrum9899
@williamdrum9899 Год назад
Or used "gets(password)"
@SamuelLing
@SamuelLing Год назад
IIRC they use nosql database, it would be impossible for that to happen, but xss, yea, those are different
@Arylist
@Arylist Год назад
I'm happy that I never fell for this scam because I got a lot of these DMs but I just ignored them.
@tristanrhodes2789
@tristanrhodes2789 Год назад
i accidentally fell for one before like a month ago XD now im worried
@IllagerCaptain
@IllagerCaptain Год назад
@@tristanrhodes2789 change your password if you haven't already.
@tristanrhodes2789
@tristanrhodes2789 Год назад
@@IllagerCaptain Yeah i did but that isnt the issue they have my account token not my password XD
@SavageMudkip
@SavageMudkip Год назад
damn bro thats crazy, they only did a minor felony this time?
@Trigger4589
@Trigger4589 Год назад
NTTS, you covered this so well! * I don't feel sorry for the idiots that have a lot of money I guess.
@ShadowOcto
@ShadowOcto Год назад
They’re NFT bros, don’t 💀
@Starlightnova111
@Starlightnova111 Год назад
What the guy above me said
@apyr1055
@apyr1055 Год назад
What the guy above the guy above me said
@Memezuii
@Memezuii Год назад
What the guy above the guy above the guy above me said
@DaniZeAlmighty
@DaniZeAlmighty Год назад
What the guy above the guy above the guy above the guy above me said
@trollify2851
@trollify2851 Год назад
Thank you for sharing this important information about the Discord NFT scam link. Your video is helping to educate and protect the community. Keep up the good work in raising awareness about these types of threats
@frostdesigns555
@frostdesigns555 Год назад
As someone that is still learning web development, this stuff kinda scares me. My knowledge on network security as well as vulnerability detection is not that much yet.
@Respectable_Username
@Respectable_Username Год назад
This is why you gotta set your CSP headers. Even if somebody messed up the actual code itself, a good CSP will stop it from actually doing any harm!
@Naleksuh
@Naleksuh Год назад
I'm pretty sure the reason they were embedding the script off RU-vid was because of the CSP. So no, CSP would not have stopped it
@yuvalne
@yuvalne Год назад
man, the last time I saw such a major and easy xss vulnerability was xss in tweetdeck 8 years ago. and that was just a self-retweeting tweet. such incompetence.
@Awesome_Aasim
@Awesome_Aasim Год назад
A few years ago a security researcher found an XSS vulnerability in TweetDeck and used it to make the only self retweeting tweet.
@ciach0_
@ciach0_ Год назад
Thank you NTTS for a birthday gift that is this video
@SupaMC_Gaming
@SupaMC_Gaming Год назад
Thank you for bringing this to light. You’re one of my favorite RU-vidrs
@Bockanator
@Bockanator Год назад
my face when discord's website is vulnerable to the simplest Cross site scripting imaginable.
@0xNe
@0xNe Год назад
Im gonna sleep very well tonight knowing that NFT are losing money again
@user-ku9vx6uj4o
@user-ku9vx6uj4o Год назад
And probably you are using NFTs in products without even knowing. But yeah, be stupid. And no, NFTs aren't JPG's.
@0xNe
@0xNe Год назад
@@user-ku9vx6uj4o AHAHAHAHAHAHAHAHAHAH
@user-ku9vx6uj4o
@user-ku9vx6uj4o Год назад
@@0xNe NFTs are used in cars from Alfa Romeo for example. NFTs are for metadata storage, and yeah, a lot of people (mostly scammers) use it to store a link to a image to sell it. But NFTs aren't images or something. This metadata can be anything and can be used for a lot of things (car maintenance info, keys to your car, event tickets, subscriptions, in-game characters or items, login info etc).
@0xNe
@0xNe Год назад
@@user-ku9vx6uj4o no shit, wheres ur prev comment? and where did i ask what are nfts? i know what they are, and I, in fact, know that people who bought into nfts are dumbest people in existence and most of them lost money, so every time they lose again, its a good news
@0xNe
@0xNe Год назад
@@user-ku9vx6uj4o ye i dont see yours too i only see the one from 1hour ago, others are only on notifs, we will argue some other day since theres no point if we cant see comments, have a nice day sir
@timedeos4320
@timedeos4320 Год назад
I found someone that’s been doing this to get people’s tokens and selling their tokens since the QR code scam, I’ve always thought this was possible but never had a sample to work with like you did, good job man!
@darthvader8744
@darthvader8744 Год назад
The moment I hear "This was against NFT groups" I immediately agree with the exploiters
@RyanTheTechMan
@RyanTheTechMan Год назад
Hey, I have been watching for a long while, and I only now just realized that I was never subscribed! Your videos have always been recommended to me :)
@comet.x
@comet.x Год назад
i didn't even know what this was called but as soon as i saw the html i knew exactly what was going on. like no way did they let you just write html in a text description like that
@williamdrum9899
@williamdrum9899 Год назад
That's like a fox guarding the henhouse
@rickytheraccoon6102
@rickytheraccoon6102 Год назад
Sucks that it happened, but at least it was a bunch of crypto nerds and not actual human beings
@williamdrum9899
@williamdrum9899 Год назад
That's a bit harsh. I don't even do crypto
@_kzr
@_kzr Год назад
i’m genuinely surprised this was overlooked, literally no validation checks or encoding on the html to make sure that scrips aren’t being executed.. it’s unsurprising coming from discord though
@_kzr
@_kzr Год назад
@@zydn it’s discord 😂 they always find a way to make something worse
@NicoPlyley
@NicoPlyley Год назад
@@zydn Yes that’s true when using JSX. But this exploit was done through the state management software. When someone loads the page it get exploited before the page even renders out html. If it was in the JSX it would have been sanitized
@hi-kt3qr
@hi-kt3qr Год назад
@@zydn React takes some steps to protect against simple xss attacks and html input vector rendering. displaying script tags, for instance, or other things. The exploit in this case is trickier than you might expect because it only guards against DOM-based XSS assaults, although XSS comes in a variety of forms. Having said that, data sanitization might have easily avoided this.
@BeastGamingHD
@BeastGamingHD Год назад
I think what's crazy is that people are just now figuring out about this exploit which has actually been around for nearly 2 years now. Also most of the people hijacking accounts are focusing on people with og or "leets" for username and account age so that they can keep it and or sell it. A "leet" would be a username like root#0001 for example.
@shidosensei.
@shidosensei. Год назад
Thanks for letting us know man, I hope you stay safe out there
@TS_Mind_Swept
@TS_Mind_Swept Год назад
This is why you don't click links. Even if it's from someone you think you know, try to engage them in a conversation (esp if you haven't heard from them in a minute); if they talk different than normal, you know
@Jazztache
@Jazztache Год назад
This is why it's a good idea to use Element instead, Discord just keeps on getting these weird instabilities.
@Jazztache
@Jazztache Год назад
@C00L3R Not really. It's like saying Slack is *just* for companies. The only companies on Element in my vicinity is the company of the lads. Also, with Guilded... Roblox Corporation. Enough said. Plus, it's free (libre) and open source, which should be the norm for communications/chat apps.
@PinkManGuy
@PinkManGuy Год назад
A friend of mine lost his account to this. Luckily we were able to recover it, but it was scary for a while there.
@twilighttales-
@twilighttales- Год назад
That cherry server really went through a lot of pain mainly thier owner🤣🤣🤣
@twilighttales-
@twilighttales- Год назад
Abee 👁 👁 😂 👄
@jalkarna
@jalkarna Год назад
@@twilighttales-kya bol raha hai bhai
@StolenJoker84
@StolenJoker84 Год назад
I actually had my Discord account stolen a while ago - after signing into what I thought was a Discord page. They changed my password (which is how I learned that the account was hijacked). They deleted everything, logged my account into a bunch of random servers, then game my account back. When I contacted Discord, they told me that it was impossible for my account to have been stolen. After I got my account back (no help from Discord on this front, since they insisted that it wasn’t even possible), I asked them if they could tell me where my account was accessed from. I never got a reply back from them. I found out on my own, using Discords own tools, what countries (yes, more than one) my account had been accessed from between the time it was stolen and the time it was “returned”.
@Knaeckebrotsaege
@Knaeckebrotsaege Год назад
brainfart: could people theoretically spam the blueh and/or hawkemedia links with fake/random tokens via scripts to throw some sand in their gearbox? obviously not all from the same IP so it's not as easy for them to filter out. they'd have to figure out if the tokens they collected are actually valid, and i guess would be kinda pissed if 99% aren't lol 🤔
@bruisedbug
@bruisedbug Год назад
im not a security engineer or anything, but didnt this exact same thing happen with Flash? Like this is one of the most simplest things to avoid.
@alex59292
@alex59292 Год назад
Yes xss is literally thought in schools, that's how basic it is to do
@Dyanosis
@Dyanosis Год назад
This shows how little testing they have. If they'd had more testing, especially for such a simple webpage, this would have never made it to live. Xss is very simple to prevent and, as many people have posted many times before, is very simple to escape a user's input. Apparently Discord doesn't know/follow the "never trust user input" rule. Also, with Discord being as big as it is, you'd think they'd do vulnerability testing that would have told them about this problem long before it got out of dev.
@williamdrum9899
@williamdrum9899 Год назад
"Surprise penetration testing"
@NiftRex
@NiftRex Год назад
This happened to me. I got offered to be paid to "test" a service or something similar and be invited to a server. I just simply ignored those DMs. They were persistent and would try one or two more times, I still never clicked on them.
@Vlame
@Vlame Год назад
To be honest, I'm not even suprised anymore that Discord has another exploit. If they fix one, someone will find another one 😅
@xyhasanamazingalt9583
@xyhasanamazingalt9583 Год назад
it’s insane discord never patched this, i literally used it in 5th grade to mess with my friends on websites they made
@Leep226
@Leep226 Год назад
Fantastic video to inform us all about it but to be honest if you just stick to the rule of never clicking on any links before asking around or anything is the safest way to go Do not let your curiosity or greed get the better of you as those are usually how you fall for any scams Always ask yourself what could happen or simply why do I have to click on something someone sent me in dm which I have never spoken to before. Always have a certain level of distrust as come on this is the internet unless you know them personally irl you should always that certain level of awareness as anything could happen such as even your best friend on internet for years could turn on you for personal benefits
@MightyDantheman
@MightyDantheman Год назад
This is why I stay logged out in my browsers
@Sopitive
@Sopitive Год назад
It is possible to do a lot of input sanitization, CORS policy changes and CSP changes to circumvent a lot of XSS, but in the end you probably won't get everything. Hackers will reverse a site and try to find a bypass to the filter you set in place. It isn't necessarily Discord's fault because it took hackers this long to discover it. It just goes to show that nothing you do as a security researcher and engineer will truly patch a vulnerability fully, but instead just makes it harder for a hacker to exploit it. Discord does have a bug bounty, but if crypto scams will yield more money than the reward money from the bug bounty, it makes more sense for hackers to exploit it rather than responsibly disclosing it.
@JaivianDean
@JaivianDean Год назад
this is a new feature that just came out with discord that got XSS'ed
@Sopitive
@Sopitive Год назад
@@JaivianDean Even then, reflected XSS is one of the least serious types of XSS. If it were to have been stored XSS, we would have had a huge problem (worse than this one). This still required a little social engineering and user interaction to pull off. Though that kinda makes sense, they should have probably checked for something like that before they pushed an update.
@blenderbachcgi
@blenderbachcgi Год назад
Like I said, the only way to stop this, is to deal with the hackers one on one. Trying to patch up a broken wall, to hide from them, is only delaying the inevitable, because they will ALWAYS find you. Sadly, everyone chooses to literally allow them to do these things.
@SamuelLing
@SamuelLing Год назад
@@Sopitive or just be smart, don’t click on those links, if you want do it in a incognito mode or a vm (though, this is not really practical)
@fractal6929
@fractal6929 Год назад
these security exploits are really making guilded look like a feasible option
@luviana_
@luviana_ Год назад
Guilded is owned by Roblox. Don't move to an equally trash platform. Pick something open source, like Element or Signal
@sctjkc01
@sctjkc01 Год назад
Stealing a Discord token is incredibly bad. If you lose the token and the recipient has any sort of scripting set up, you can expect to have the entire account stolen inside of 30 seconds. I'd fallen for a phish where I was asked to test a game distributed over Itch. It stole my Discord token from my Discord desktop client, logged me out, and closed the client. And despite having 2FA on my account, I was unable to log back in again, as the token thief managed to strip 2FA AND change the password AND change the email address on it. Without any sort of request for 2FA tokens from my phone or passwords. I'd asked Discord support over Twitter for assistance, and they'd reverted the email address back to mine... but presumably the token never got reset or the token stealer was still running on my machine, because it was stolen and yanked away from me yet again. And yes, I was a paying Nitro user with saved payment information. Thankfully, because I paid via PayPal, I was able to tell PayPal to never send any money toward Discord and saved myself ~US$150 of fraudulent purchases.
@corn738
@corn738 Год назад
I really hope you get to be a discord mod. You do more than the discord staff at this point. PLEASE LET ME BE YOUR KITTEN 😳😳😳
@vilact0
@vilact0 Год назад
what the hell
@williamdrum9899
@williamdrum9899 Год назад
Took me a minute to get that reference
@ms.awesome
@ms.awesome Год назад
i remember when tweetdeck had a xss self retweeting tweet a long time ago. How so many people don't see this issue with their websites is crazy to me
@Madison1676
@Madison1676 Год назад
Keep slaying no text to speech
@andistive
@andistive Год назад
SLAY QUEEN 💅💅💅💅💅💅💅💅💅💅
@fcantil
@fcantil Год назад
that's crazy. well on the slightly bright side, at least it's fixed now...
@rtzgf67games7
@rtzgf67games7 Год назад
I can't believe that discord forgot about it! It's legit on the OWASP top 10 web app vulnerabilities. A lot of these big companies forget about web app security 101 and it's sad.
@maskettaman1488
@maskettaman1488 Год назад
They outsource things like frontend to their diversity-hire tokens or to overseas workers entirely. Many major companies do it. It's why websites like RU-vid and Discord are getting progressively worse and worse from an interface perspective
@Dolphin002
@Dolphin002 Год назад
Even I, someone who makes tiny Github websites with no actual security risks, patch XSS. How did Discord forget?
@MalwareTheHunter
@MalwareTheHunter Год назад
I see everyone hating on discord. I am a bug bounty hunter and we gotta understand that all of us are humans, everyone makes mistakes, way bigger companies are getting hacked daily with way stupider vulnerabilities and you gotta remember there are millions of places where you have to check for vulnerabilities. Of course it sounds stupid that it had such a stupid vulnerability because it was found and sounds like ‘holly shit everybody could find it’ it’s actually not working like that 😂
@ImDuck42
@ImDuck42 Год назад
That with the worm is talked about with interview on darknet diarys
@mu11668B
@mu11668B Год назад
Whoa! Some classic XSS just became a 0-day on Discord. How unexpected! 😂
@Nicknero
@Nicknero Год назад
Moral of the story: STOP... CLICKING... RANDOM... LINKS... Kthx
@410Here
@410Here Год назад
how on earth do they not endlessly dom-purify the shit out of everything user generated?
@siomek101
@siomek101 Год назад
"Discord messed up server discovery" - i already thought about xss
@sothesalamilidwontfit
@sothesalamilidwontfit Год назад
how is discord so shitty that there are 392829 ways to get a totally well protected and hidden token that can access your entire account
@skylark.kraken
@skylark.kraken Год назад
With modern JS frameworks the threat of XSS is lessened. React makes it obvious when you might have issues by making you type out "dangerouslySetInnerHTML" when you're doing something that is likely dumb. In React if you pass a "" to anything else it will be interpreted as text. This makes developers less aware of threats because XSS hasn't been a concern to them, until there's SSR and the browser is no longer told to interpret "" as text but it looks like it should be an element. It's super simple to avoid, but at the same time it's easy for developers to forget that it's a concern.
@orngng
@orngng Год назад
These vulnerabilities look as bad as the ones on the Roblox website lol
@mat_name_whatever
@mat_name_whatever Год назад
It's stupid that Discord did that, but it is also astounding that redux put the vulnerable code on their website, with only a comment in the snippet saying "hey check this link for security issues", instead of including the two function calls that make it safe. And then I wonder why Discord server side renders/ templates it in there in the first place, js can access the query param itself... Truthfully as a developer I have to say that unfortunately I have had many less than competent colleagues, and combined with pressure and negligence from management that has lead to very similar and worse issues a number of times. These issues don't come out of nowhere.
@Squ_iddy
@Squ_iddy Год назад
Honestly nevermind the NFT and cryptobros, this could've been a lot worse and the lack of transparency about it is kinda unsettling
@Wirby.
@Wirby. Год назад
Funny how I got a discord ad at the start
@SWinxyTheCat
@SWinxyTheCat Год назад
Does Discord not have a blue team? It sounds like they don't from the presence of these scams and exploits.
@kateaplus
@kateaplus Год назад
literally 101 stuff at that level
@thecwd8919
@thecwd8919 Год назад
I like how they're just using a default nginx forbiden page like "damn this is so easy we dont even need to make it look like its not a scam!"
@ali-1000
@ali-1000 Год назад
LOL, how ironic that hackers are stealing discord tokens, yet they couldnt be bothered to update their version of nginx (which is old and very insecure)
@CaptainMonkeyFez
@CaptainMonkeyFez Год назад
Bobby Tables would be proud... or maybe disappointed.
@Noob-gx6yf
@Noob-gx6yf Год назад
Another day, another scammer heist. On Discord ofcourse!
@decayedargon6765
@decayedargon6765 Год назад
Sometimes, it's the implementation of XSS prevention which is vulnerable. There was evidence of existing XSS prevention in the audit that was made. Don't flame them too hard.
@jadelily18
@jadelily18 Год назад
i feel so bad for the people who had their accounts stolen but holy fuck is that funny lmao. It's such an easy thing to fix and I don't know how it's ever a thing in 2022
@beyem6377
@beyem6377 Год назад
So glad I've been sick the last few days
@JaMaMaa1
@JaMaMaa1 Год назад
What did you do to your firefox to make it look like that? the coloration of boxes and lines around the tabs to be specific.
@SpidermanArda
@SpidermanArda Год назад
He explained that a few videos earlier. İ don't remember which video was it
@thelegendaryorb5745
@thelegendaryorb5745 Год назад
You can group tabs together
@JaMaMaa1
@JaMaMaa1 Год назад
@@thelegendaryorb5745 Maybe in 2016... because they absolutely do not do that.
@AdianAntilles
@AdianAntilles Год назад
What one could do in case of these dead ends mentioned in the video, it is always possible to look where the servers are hosted and what they are doing with them. ping, traceroute and nmap are your friends.
@curtispritchard5938
@curtispritchard5938 Год назад
How the hell does a junior developer like myself understand how to prevent xss better than discord. This honestly screams of gross negligence and laziness
@SamuelLing
@SamuelLing Год назад
Even if you prevented it, sometimes xss prevention itself is a flaw, there are nearly infinite ways where a input can be sanitized, it’s a even in a good system, it’s a matter of time where it’s bound to happen
@Penguin_Spy
@Penguin_Spy Год назад
ok so a bunch of people are saying stuff about React or DOMPurify, but what it looks like actually happened is they literally inserted the user-generated text INSIDE a script element before running it (either serverside or with .unsafeHTML). this is because the first part of the visible script we see is an end-script tag, so the injected script first needs to end the real discord script element (to avoid syntax errors), start its own with the token stealing, and then end it's and start a new one for the rest of discord's script. this is literally the MOST OBVIOUS xxs i've EVER SEEN, its literally fucking inserting text _from the user_ IN THE MIDDLE OF YOUR JAVASCRIPT literally wtf discord
@williamdrum9899
@williamdrum9899 Год назад
So it's basically the classic '); DROP TABLE x --; trick
@1ch0r41
@1ch0r41 Год назад
I was around the hacking space when this vulnerability was found. My friend tested it on me and we thought it was a cool little gimmick but nothing worth using against anyone except enemies. That was 6 years ago I believe, if it’s really been this long and they haven’t patched it, that’s extremely sad. Honestly a low level exploit as well.
@sumoddball
@sumoddball Год назад
Where's my "I love you bye bye!" 😭best part of your videos.
@masterdementer
@masterdementer Год назад
Your discord token will automatically change within 6-8 hours I think or maybe 12. It doesn't stay the same forever. They can send automated requests using that. But they can't change your password or access the full discord account. Unless they know the Server ID, Channel ID in which they want to send the message in. So they would have that info probably of only one server in which you were with the guy that sent you the link.
@ulize.
@ulize. Год назад
Two wrongs in this message. Firstly, the Discord token does not expire until you change your password or change two-factor authentication settings. Secondly, you are able to access the full account, it's very simple to log into an account using the token. Don't spread false security tips, it helps no one
@micamaster100
@micamaster100 Год назад
I swear my account one got hacked, and it did something worse than take my money. It blocked all my friends, while sending them a false hate message! Im better now, and yes it was the QR code thing
@Mikasks
@Mikasks Год назад
The junior developer who wrote that: oops.. 👀
@morgandraegar7301
@morgandraegar7301 Год назад
Nobody's perfect, accidents happen, live and learn. But seriously, they better fix their schitt.
@PartyBrudeeeer
@PartyBrudeeeer Год назад
Crazy bro these days you just gotta click on a invite link and meanwhile u don't even know ur already fucced 😂
@tacticalpowered
@tacticalpowered Год назад
It probably got in their DB, and then the page just loaded the values from their DB, which they did not sanitize properly. Kinda makes you wonder if the server is even verifying input properly before posting data in the database.. SQL Injections..
@Deimos001
@Deimos001 Год назад
Well it's like some say "one's man's trash,another's trash"
@lasselinow9558
@lasselinow9558 Год назад
This might be a really stupid question, but why do Discord Tokens exist? Most scamming attempts seem to try and get your Token. What do we need it for? Cant we just always have our account bound with username password and 2fa?
@thecrazyinsanity
@thecrazyinsanity Год назад
A token is a long string of text stored in your browser that it sends to the server, to let it know who you are instead of just sending your username and password every time as that would require storing your password in plaintext somewhere or making a brand new system which is unnecessary, without a token a server couldnt verify who you are and would require you to log in every single time you want to do literally anything
@williamdrum9899
@williamdrum9899 Год назад
@@thecrazyinsanity So if I get this right, a token is sort of like getting your hand stamped at an amusement park if you want to leave and come back
@NicoPlyley
@NicoPlyley Год назад
@@williamdrum9899 yes and honestly that is a perfect analogy for simplifying it. I’m gonna use that for now on
@williamdrum9899
@williamdrum9899 Год назад
@@NicoPlyley And getting your token stolen is like in the spy movies using a dead man's hand to open a fingerprint lock
@NicoPlyley
@NicoPlyley Год назад
@@williamdrum9899 😂
@natec1
@natec1 Год назад
That’s really really bad. The fact that this is even a possibility in this day and age is insane
@blenderbachcgi
@blenderbachcgi Год назад
It wouldn't have been a thing in this day and age if we'd gotten rid of the hackers a long time ago. But we don't. We just keep gluing a cracked wall together with raisins and mud hoping that someone can't just bust it down and get to you.
@mikeberger6035
@mikeberger6035 Год назад
This is why sensitive information is better saved in cookies instead of in session. This info isn't accessible by scripts if you are using HTTP-only cookies
@Aquilz.
@Aquilz. Год назад
the light mod thumbnail BRUHHH
@Arylist
@Arylist Год назад
This is somehow like the Roblox XSS method a few months ago to steal accounts and instantly get them terminated
@phantomfoxfunky9438
@phantomfoxfunky9438 Год назад
True!
@phantomfoxfunky9438
@phantomfoxfunky9438 Год назад
Crosswoods incident.
@Arylist
@Arylist Год назад
@@phantomfoxfunky9438 shhh
@filipetrujeira3359
@filipetrujeira3359 Год назад
@@phantomfoxfunky9438 Crosswoods was not an XSS vulnerability...
@phantomfoxfunky9438
@phantomfoxfunky9438 Год назад
@@filipetrujeira3359 I just tried to say that it's a bit similar but not exactly an XSS vulnerability.
Далее
Scambaiting Fake Discord Support!
9:35
Просмотров 440 тыс.
MEE6 Thought I Wouldn’t Notice… (Discord didn't)
10:45
Artist 4-Mavsum 20-son FINAL  (21.09.2024)
2:20:46
Просмотров 492 тыс.
Discord Wont Ban These Scammers... why?
9:34
Просмотров 354 тыс.
I Became a Discord Simp and got Scammed!
8:34
Просмотров 202 тыс.
Is AI Really Just If-Else Statements?
2:56
Discord’s Biggest Fails of 2023
16:17
Просмотров 198 тыс.
Discord Support Scammers Reported Me...
9:42
Просмотров 768 тыс.
Big Discord Servers are Getting Hacked!
9:10
Просмотров 1,1 млн
This Roblox Scam Infects the Roblox Website...
14:59
Просмотров 1,6 млн
The Discord Server that Scams Amazon!
12:02
Просмотров 1,1 млн
The Tragic Fall Of µTorrent
24:42
Просмотров 2,5 млн
These 6 Discord Scams are EVERYWHERE!
18:22
Просмотров 507 тыс.