MAJOR EXPLOIT: This GIF can Backdoor any Android Phone (sort of)

  Рет қаралды 162,832

Daniel Boctor

Daniel Boctor

Күн бұрын

In this video, we take a deep dive into the inner mechanics of a double free vulnerability within Android OS, allowing attackers to gain complete access to any Android mobile phone with an RCE (remote code execution). This vulnerability was exploited by creating a custom GIF file and sending it to a user in WhatsApp. Whether you're a pen tester, security researcher, or cyber security expert, having a solid foundation in low level languages, especially C, is critical.
0:00 - Overview
0:35 - GIFs
1:02- GIFs within Android
2:10- Memory / Pointers
3:35 - Double Free
6:02 - WhatsApp Payload
8:24 - RCE
WE HAVE A DISCORD NOW! / discord
Original report by security researcher Awakened
awakened1712.github.io/hackin...
Double free within android-gif-drawable
github.com/koral--/android-gi...
MUSIC CREDITS:
LEMMiNO - Cipher
• LEMMiNO - Cipher (BGM)
CC BY-SA 4.0
LEMMiNO - Nocturnal
• LEMMiNO - Nocturnal (BGM)
CC BY-SA 4.0
#programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #bugbounties #ethicalhacking #mobile #android #doublefree #malloc #realloc #GIF #mobilesecurity #lowlevelsecurity #zeroday #zero-day #cybersecurityexplained #bugbounty #compiler #memorymanagement #kernel #operatingsystems #OS

Пікірлер: 374
@DanielBoctor
@DanielBoctor 6 ай бұрын
WE HAVE A DISCORD NOW! discord.gg/WYqqp7DXbm
@ytg6663
@ytg6663 6 ай бұрын
Is this Exploit still exist ? What is the cve ?
@DanielBoctor
@DanielBoctor 6 ай бұрын
@TDS2023 Thank you! I appreciate the words! Glad you liked it 😊
@DanielBoctor
@DanielBoctor 6 ай бұрын
@ytg6663 It is no longer exploitable, as it was fixed both within a WhatsApp patch (2.19.244), and within the android-gif-drawable library. Facebook reserved CVE-2019-11932 for this issue.
@Skinnamarink.
@Skinnamarink. 6 ай бұрын
@@DanielBoctor Why do you speak with upspeak? its fvcking annoying
@joeblowjo
@joeblowjo 6 ай бұрын
​​@@DanielBoctorcan this exploit happen anywhere other That's WhatsApp? I don't use WhatsApp?
@crism8868
@crism8868 6 ай бұрын
Kinda cool, the principles of these kinds of low level exploits are not so different from how speedrunners achieve arbitrary code execution in old games, mess around with pointers until they point to the memory address of the code you want to run next, and they do this by exploiting glitches during gameplay
@oneke4498
@oneke4498 6 ай бұрын
How to obtain bedrock in minecraft:
@jongibson3331
@jongibson3331 6 ай бұрын
very cool, never thought about it like that
@Primu
@Primu 6 ай бұрын
They're both the same thing. Both involve injecting code into memory by exploiting a vulnerability.
@phr3ui559
@phr3ui559 6 ай бұрын
true
@lunarcdr3083
@lunarcdr3083 6 ай бұрын
This was exactly my thought
@memes_gbc674
@memes_gbc674 6 ай бұрын
as soon as i realized the gif struct had a function pointer it was over
@DanielBoctor
@DanielBoctor 6 ай бұрын
LOOOOOOOOL that will do it
@J0R1AN
@J0R1AN 6 ай бұрын
Genuinely, what a great explanation of the double free vulnerability! Really love the detail and this can be very useful for anyone getting into binary exploitation techniques. For me this really solidified the basics I saw here and there, with a nice practical example
@DanielBoctor
@DanielBoctor 6 ай бұрын
Thanks for the wholesome comment, it means a lot
@BillAnt
@BillAnt 3 ай бұрын
​@@DanielBoctor- Complicated exploit but well dissected. BTW you sound a bit like the male version of Christina Hall. hehe
@DanielBoctor
@DanielBoctor 3 ай бұрын
do I really? I can't say I notice the resemblance myself lol. I'm glad your liking my videos, thanks for the support
@BillAnt
@BillAnt 3 ай бұрын
​@@DanielBoctor- Check out the way Christina Hall talks in her "Jacuzzi" commercial,. enunciating the end of words. lol
@quazar-omega
@quazar-omega 6 ай бұрын
Amazing explanation! I like how you managed to dive pretty deep without making the video super long
@TheDanishMaleNurse
@TheDanishMaleNurse 6 ай бұрын
Great comparison between these two channels, got me thinking more about my upcoming videos. And I have asked my self the question you end on I just need to make it more clear who I'm targeting in my titles
@J_i_m_
@J_i_m_ 6 ай бұрын
One of the best explanations ever of an exploit that goes into technical detail!
@DanielBoctor
@DanielBoctor 6 ай бұрын
You are one awesome fella thanks for the support
@cheatertim8232
@cheatertim8232 6 ай бұрын
Good video. the title however is misleading, it's not ANY android phone it's android phones that already have a malicious application installed and whatsapp, additionally the title implies that the exploit can be used right now, even though it was patched years ago by both whatsapp and android
@AlienzOnlyBruh
@AlienzOnlyBruh 6 ай бұрын
I agree but it’s for the views and he deserves the views. Very well put video. Very informative.
@springier6869
@springier6869 6 ай бұрын
@@AlienzOnlyBruhindeed
@tacokoneko
@tacokoneko 6 ай бұрын
also i would argue that this is really just a whatsapp exploit because the reverse shell gained is just the same privileges as whatsapp is currently allowed by android, so access to all user files if the user ever had previously attached something in whatsapp and allowed the permission, also the "android gif library" isn't used by all android apps not by a long shot, it just happened to be imported into whatsapp's source code and be what whatsapp used to render gifs, there isn't any real priviliege escalation exploit here
@KaufDirGeld
@KaufDirGeld 6 ай бұрын
​@@AlienzOnlyBruhme when the judge asks why i robbed the bank
@hoeyd
@hoeyd 6 ай бұрын
​@@AlienzOnlyBruhI mean I'm disliking and leaving 34 seconds in lol
@maternalpick1313
@maternalpick1313 6 ай бұрын
Fantastic video Daniel, I cant wait for the next video!
@DanielBoctor
@DanielBoctor 6 ай бұрын
Thank you
@ALWALEEDALWABEL
@ALWALEEDALWABEL 6 ай бұрын
I like the way you explain, it's amazing and interesting, thank you. 👍🏻
@DanielBoctor
@DanielBoctor 6 ай бұрын
I'm glad you liked it! Means a lot
@hengolubenko2562
@hengolubenko2562 6 ай бұрын
Awesome video🔥 RCE is so cool, tnx for explaining everything!!
@DanielBoctor
@DanielBoctor 6 ай бұрын
I really is lol. Glad you have you here! Thanks for the kind words, keep on doing what you're doing 😊
@meddl8103
@meddl8103 6 ай бұрын
amazing video and very interesting topic, this deserves way more attention! you have my sub, keep up the good work!
@DanielBoctor
@DanielBoctor 6 ай бұрын
Thank you! Glad you have you apart of the community
@TheControlMastr
@TheControlMastr 5 ай бұрын
What a GOAT!!! The way you edit the videos to match as you explain is amazing, specially the “under the hood” explanations! Legend in the making
@DanielBoctor
@DanielBoctor 5 ай бұрын
THANK YOU INIVEK ❤️❤️❤️❤️❤️❤️
@josephs3973
@josephs3973 6 ай бұрын
"for whatever reason they're parsed twice" sounds like intentional backdoor to me.
@temp50
@temp50 6 ай бұрын
More like a 'performance bug' or some thumbnail generation, etc... Let's say you wanna show the first frame of the gif as a preview and the user should tap on the image to actually start playing the gif. You can do it different ways but it is easy to image they choose a method to reread the gif twice. First to acquire an initial frame and a second time when the user want to play the gif.
@springier6869
@springier6869 6 ай бұрын
epic video, didn’t understand it much but it was cool, maybe even better than your previous one
@DanielBoctor
@DanielBoctor 6 ай бұрын
LOL, it do be like that sometimes
@25_26
@25_26 6 ай бұрын
How the researcher discovered gifs were rendered twice in whatsapp is very interesting. I mean i know some people who does reversing on major android apps or iphone app ipa files but i dont know they do the research with that depth of knowlege.
@Mavrik9000
@Mavrik9000 6 ай бұрын
Interesting, but a six-year-old vulnerability is not "zero-day."
@AlecMaly
@AlecMaly 6 ай бұрын
Just found your channel. Great stuff!!
@DanielBoctor
@DanielBoctor 6 ай бұрын
Glad to have you here!
@PlaneToTheBrainES
@PlaneToTheBrainES 6 ай бұрын
Your videos are great! Thanks so much.
@DanielBoctor
@DanielBoctor 6 ай бұрын
Thanks! Glad you liked it 😊
@petros_adamopoulos
@petros_adamopoulos 6 ай бұрын
I'll fix the title for you "This GIF can't Backdoor ANY Android Phone"
@HowsDaJello
@HowsDaJello 6 ай бұрын
Well at the last second you took away its powers by explaining that the user would have needed to basically download a virus first. But I could see this working for a malicious company that creates popular apps with the goal being to use the app as the “virus” agent to get that local address saved and get the user’s phone number through a sign up or something. And with the local address and the phone number, sending them a gif on WhatsApp (if they have WhatsApp) would work. Seems like it would work best if you had a huge database of potential victims. Thx for explaining this stuff bro. edit: I was wrong about how this works
@DanielBoctor
@DanielBoctor 6 ай бұрын
It's actually a lot easier than that. I didn't mean to take away from the vulnerability too much. As mentioned in the video, the required memory addresses are constant values, and ONLY change during system reboots. Any application has access to these addresses. An app would not even need to harvest the targets phone number, NOR send the user a GIF in the first place. It could merely craft the GIF itself, and save it to the phones file system locally. That's it. The next time the victim opens their media gallery in WhatsApp, the GIF will be rendered directly, without the need to even receive a message. Thanks for watching, and I'm glad you enjoyed!
@HowsDaJello
@HowsDaJello 6 ай бұрын
that's crazy bro lol sorry I misunderstood@@DanielBoctor
@PlaneToTheBrainES
@PlaneToTheBrainES 6 ай бұрын
@@DanielBoctor But should the person run an old version of whatsapp or not to do this?
@DanielBoctor
@DanielBoctor 6 ай бұрын
The vulnerability is actually 3-fold: 1. Android OS returning the same memory address twice after a double free 2. The android-gif-drawable library causing a double free in the first place 3. WhatsApp double parsing GIFs, enabling any real harm to be caused from the double free You would need all three of these conditions to be present for this to be exploitable. Just using an old version of WhatsApp would not be enough, as both WhatsApp and the GIF library were both patched.
@cxarra
@cxarra 6 ай бұрын
This wasn’t mentioned in the video, but the presented vulnerability is merely an example of what can be done. OP mentions that there are potentially more complicated methods to leak relative addresses allowing us to do ROP to mitigate read-only pages. Without getting too far into it, the deterministic way android handles double frees enables us to, within the same gif, leak a valid instruction pointer and then use different techniques with that executable memory location to execute our shellcode
@BitwiseMobile
@BitwiseMobile 6 ай бұрын
I went to college in 1990, and they were still teaching C for first year programming. Java was still new to the game, so you had a choice of Pascal or C. I remember the professor told us that after the 3rd week we can expect half the class to drop. The 3rd week is when he introduced pointers. He wasn't wrong. This is a great video that helps illustrate the concept behind pointers. I think part of the problem was the professor, but I wasn't going to say anything. I taught myself assembler when I was 14, so pointers to me were already natural and I had no issue understand them. Half the class struggled immensely and wound up dropping before the first mid-term.
@Ninja-lu4dg
@Ninja-lu4dg 6 ай бұрын
Great video. Looking forward to seeing future content.
@DanielBoctor
@DanielBoctor 6 ай бұрын
Glad you liked it! More is on the way 🚀🚀🚀
@daveyhodge
@daveyhodge 6 ай бұрын
I think a malicious actor must've hacked your voice box and spammed question marks all throughout your sentences.
@csilva8785
@csilva8785 Ай бұрын
Underrated comment 😂
@XeZrunner
@XeZrunner 6 ай бұрын
Nicely explained!
@TeamUnpro
@TeamUnpro 6 ай бұрын
You did a very solid job explaining everything. That's awesome man, ty for the vid
@DanielBoctor
@DanielBoctor 6 ай бұрын
Thank you for being apart of it! Glad to have you here 😊
@TeamUnpro
@TeamUnpro 6 ай бұрын
Heck yeah~ this made me curious what other kind of exploits there are, so I start to look at the standard linux kernel 6.6 and instantly I noped tf out of there Not because I wouldn't eventually be able to get a grasp on the madness that's called code (tho it is organized), but because I already have too many coding projects lol @@DanielBoctor
@alexdelarge1845
@alexdelarge1845 5 ай бұрын
I love the technical details usually you.dont get to see such detailed explanations for needs like us . Thkx amazing content
@DanielBoctor
@DanielBoctor 5 ай бұрын
Glad you liked it!
@bravojr
@bravojr 6 ай бұрын
I was instantly taken back to how I exploited Pokemon games back in the day.
@sulavadhikari5843
@sulavadhikari5843 5 ай бұрын
damn thats sick, love your content. its really hard to find videos this detailed.♥
@DanielBoctor
@DanielBoctor 5 ай бұрын
THANK YOU ♥
@yulose9
@yulose9 6 ай бұрын
MAN YOUR CHANNEL IS INTERESTING! KEEP IT UP!
@DanielBoctor
@DanielBoctor 6 ай бұрын
THANK YOU!!! GLAD TO HAVE YOU HERE 😊
@vanievors2476
@vanievors2476 6 ай бұрын
Damn as a Cybersecurity reasercher this video was dope!
@randomstring2i9r41p
@randomstring2i9r41p 6 ай бұрын
good for me that i understand C lingo. this is so cool to know.
@sevenredundent7256
@sevenredundent7256 6 ай бұрын
I waited all the way to the end to find out I couldn't do this to myself to give me root.
@mbhv-ll9lq
@mbhv-ll9lq 6 ай бұрын
Very informative.
@DanielBoctor
@DanielBoctor 6 ай бұрын
Thanks!!
@Finnel12
@Finnel12 6 ай бұрын
Would the reverse shell and commands sent to it have the same permissions as Whatsapp in this case?
@DanielBoctor
@DanielBoctor 6 ай бұрын
It would. All commands would be executed within WhatsApp context, allowing one to steal files from the WhatsApp sandbox, including the message database, as Awakened mentioned in his original report. I should have explained this in more detail within the video.
@JustAnotherAlchemist
@JustAnotherAlchemist 6 ай бұрын
ROP is certainly a fun way to program.
@aaron6807
@aaron6807 6 ай бұрын
But doesn't this exploit require the page where the gif is stored to have code execution access? and it most likely will only have read-write
@user-ki4of8ne2d
@user-ki4of8ne2d 6 ай бұрын
Wich version of android is vulnerable of this RCE?
@coffinplayz
@coffinplayz 6 ай бұрын
Can this exploit work on other messaging application that are not patched yet ? and where i found that gif exploit.
@tomtravis858
@tomtravis858 6 ай бұрын
Maybe I'm stupid, why does it let you define a zero width/height? What possible use case would that serve?
@deepspecial1161
@deepspecial1161 5 ай бұрын
Nice video i am new to your channel and i am very interested in this types of topics, but i am not pro in doing these things practically can we get practical video to craft melecius. Gif abd get reverse shell
@user-tp1hn4pb2v
@user-tp1hn4pb2v 25 күн бұрын
The thing about double free is that it allows you to edit a free chunk, in glibc (I am not sure if its in android kernel) free chunks are linked via fd & bk pointers which is pretty much a double-linked list (this also depends on the size of the free chunk which is categorized to which bin list) , modifying these pointer in a free chunk can allowed you to malloc in arbitrary address since malloc related operation retrieve chunks in the free list if exist rather than creating a new one
@LolWutMikehSM
@LolWutMikehSM 6 ай бұрын
Does comp sci teach that the word asterisk is asterix or something. Beautiful video. Smart lad, amazing explanation, clearly understand hardware and software and programming languages super well. And then asterix. You get my sub, but my question as well.
@DanielBoctor
@DanielBoctor 6 ай бұрын
LOL, didn't really think of the pronunciation while I was filming. Thanks for the feedback!
@encrypted_for
@encrypted_for 2 ай бұрын
What if I want to use Obelix instead?
@besusbb
@besusbb 6 ай бұрын
awesome video with clear explanations thank you
@patchbyte6856
@patchbyte6856 6 ай бұрын
Really good video!
@DanielBoctor
@DanielBoctor 6 ай бұрын
Thanks! Glad you liked it 😊. Keep on spreading that positivity
@YeloPartyHat
@YeloPartyHat Ай бұрын
Holy crap. This is very elaborate!
@crlfff
@crlfff 6 ай бұрын
Amazing explanation
@DanielBoctor
@DanielBoctor 6 ай бұрын
Thank you
@goodygiggles5410
@goodygiggles5410 6 ай бұрын
Did you absolutely have to select the valley girl voice for the narration?
@altaccount648
@altaccount648 6 ай бұрын
We should really start thinking about virtualizing apps on every platform...
@25_26
@25_26 6 ай бұрын
More virtualization needs more memory
@altaccount648
@altaccount648 6 ай бұрын
@@25_26 you'd think we have plenty... I wouldn't mind spending extra $50 knowing my phone is secure
@user-ro1cc8tz6d
@user-ro1cc8tz6d 6 ай бұрын
great and clear explanation
@DanielBoctor
@DanielBoctor 6 ай бұрын
Thanks! Means a lot
@cexeodus
@cexeodus 6 ай бұрын
Similar to how originals of edited jpeg images were recovered in an exploit that manipulated leftover space inside a buffer to reconstruct the bits of the original. For the most part you would recover only the later bits corresponding to pixels of the original because of how the file would be saved coupled with the top-down rendering of your device. The jpeg once saved after editing/cropping/redactions could therefore still have the information, but this gif exploit would basically take that one step further in regards to abusing the rendering method, by re-filling up the empty space with (insert any smol footprint exploit payload) And the beauty of gif, is that can be looped. Which can also be a bigger issue if the gif allows itself to talk directly into terminal with certain commands. Persistence can be achieved and hidden (in perpetuity) if done correctly.
@Alkaris
@Alkaris 6 ай бұрын
Rooting Android phones should use this method, because each phone being nearly impossible to unlock and install a custom ROM I would rather use an exploit like this to root the device, and removing vendor locks placed on the device so you have complete control and access to everything the device has.
@es_zyg
@es_zyg 6 ай бұрын
I've also thinking the same
@andrashajdu
@andrashajdu 6 ай бұрын
Wow, awesome 🙂
@stash2823
@stash2823 5 ай бұрын
Wow i didnt understand anything but it was very informative , thank you
@AlexanderMeier-iw7bz
@AlexanderMeier-iw7bz 6 ай бұрын
#Intriguing would this fall under software development and\or IT Security? I ask because I am looking to invest into a second major; and I very much would like to learn how to read and write computer code. Thank you.
@DFPercush
@DFPercush 6 ай бұрын
IT security is probably going to focus more on firewalls, network monitoring, toolkits that you can deploy as an network admin, that kind of stuff. Writing code that uses malloc and free properly is going to be a software engineering issue, or maybe computer science. Every software developer needs to have a basic understanding of the most common security exploits and how to avoid them. It helps if you use a language that does not require you to manage malloc() and free() yourself. C is great for things like embedded systems, but you have to be very careful. C++ is better imho, because you can use paradigms like RAII, where you release resources and free memory in destructors, you have standard containers that allocate memory for you, so you really don't have to touch new/malloc and delete/free that often. Of course the evangelical memory safe language is Rust, and you will find no shortage of people to tell you why... there's also garbage collected languages like Java and C#, and that's great until an exploit like log4j comes out and affects everything running Java. But it also got patched pretty quickly. There's a term in software development called "not my problem" lol... just make sure the libraries you depend on are actively maintained. Good luck in your educational efforts. School won't teach you everything, but it's a good way to get started. Keep learning every day.
@Subcode
@Subcode 6 ай бұрын
This GIF COULD.. thank you very much...
@meirbookatz8304
@meirbookatz8304 5 ай бұрын
Wow that is brilliant!
@DanielBoctor
@DanielBoctor 5 ай бұрын
I know lol 🤯
@stabilini
@stabilini 6 ай бұрын
amazing, it's sooo old school tech movie getting control of a device with a gif... I can't beleive it hahaha
@Mannard74
@Mannard74 6 ай бұрын
Can you disable automatic GIF looping in Whatsapp as a workaround? I don't use FB or Whatsapp
@ChloeCake
@ChloeCake 6 ай бұрын
You said function pointer and I literally went WHAT IN THE LIVING SECURITY HOLE IS THIS SHIT Needed to say no more, I instantly understood the gravity of this exploit
@DanielBoctor
@DanielBoctor 6 ай бұрын
yep, that will do it LOL
@pabloenriquegorga4222
@pabloenriquegorga4222 6 ай бұрын
great video ! thanks for it !
@DanielBoctor
@DanielBoctor 6 ай бұрын
Thanks!! Glad you have you here!
@Napert
@Napert 6 ай бұрын
"this gif can backdoor any android phone!*" * as long as the phone is this specific model made between these 2 specific dates with this specific version of android and needs to have this specific version of a specific app installed and needs a cosmic ray to flip a specific bit in a specific part of memory at this specific time
@Napert
@Napert 6 ай бұрын
or at least that's how I see most "brand new 0 day 0 click (some other fancy words) exploits that will kill your dog"
@sycix1
@sycix1 6 ай бұрын
Sometimes, but first of all if you spread it to thousands of devices you're going to hit a lot, and second of all this one just needs your firmware + whatsapp version to be older than newest. But I have to admit this shell is pretty much useless without privilege escalation
@BlacKi-nd4uy
@BlacKi-nd4uy 6 ай бұрын
sheesh, thats a lot of information^^
@user-lm3hl3cp7t
@user-lm3hl3cp7t 6 ай бұрын
ah its crazy internation dude 🎉
@arduinoguru7233
@arduinoguru7233 6 ай бұрын
Honesty theses people who found this vulnerability first are very consistent
@NoxernPL
@NoxernPL 6 ай бұрын
Classic, not the first time realloc breaks something
@DanielBoctor
@DanielBoctor 6 ай бұрын
yup, gotta love C
@procactus9109
@procactus9109 6 ай бұрын
Good video, strange voice.
@POLARTTYRTM
@POLARTTYRTM 6 ай бұрын
I couldn't understand this even if this was drawn and explained to me 1 million times in a row.
@Sypaka
@Sypaka 6 ай бұрын
Reminds me of those funny adult ads in gif format..
@michaeldoherty6380
@michaeldoherty6380 2 ай бұрын
It seems like rather than backdooring ANY Android phone it can only backdoor phones with both WhatsApp AND a second, specifically malicious app already installed?
@Mempler
@Mempler 6 ай бұрын
but it will not give you root access, only sandboxed access to the application that has the rce, which makes it pretty much useless. there needs to be another step before an attacker gets access to your phone, it needs a root shell.
@ChickenCaeser
@ChickenCaeser 6 ай бұрын
I remember when a picture would backdoor any android phone..ahh how the times have changed
@94Pattycake
@94Pattycake 6 ай бұрын
I don't know why I clapped when I finished watching the video. What an amazing explanation. Im still learning but this was a lot of fun!
@DanielBoctor
@DanielBoctor 6 ай бұрын
What a wholesome comment LOL. Means a lot
@whohan779
@whohan779 6 ай бұрын
Call me dumb or ignorant but why is it even allowed to have exactly one dimension be 0? Wouldn't you need two integers of at least 1 to even display anything? As I understand it this bug would be a non-issue if there's only one possible "aspect ratio" (if you can even call it that for 1-dimension) involving 0. The fix could literally be (pseudo-code) if(height0); assuming we derive a binary (single digit) boolean from the arithmetic operation denoting if the other dimension exists/>0 with either 1 or 0, we can just multiply it (dunno if it's actually faster with the if, otherwise replicate the last line switching height & width).
@wrathofainz
@wrathofainz 5 ай бұрын
Your intonation has "burger king foot-lettuce" vibes 💀
@DanielBoctor
@DanielBoctor 5 ай бұрын
yeah ik but I think i finally fixed it in my most recent video
@Julianiolo
@Julianiolo 3 ай бұрын
Am I missing something? Reallocing with size 0 should never return the same pointer? (as mentioned in 5:15)
@DanielBoctor
@DanielBoctor 3 ай бұрын
I see, sorry for the confusion! To clarify, under regular circumstances in a regular environment, this is absolutely correct, as mentioned @ 4:35. It is Android itself that caused the predetermined realloc behaviour, as mentioned @ 5:00 and 5:30. The vulnerability is actually 3-fold: 1. Android OS returning the same memory address twice after a double free 2. The android-gif-drawable library causing a double free in the first place 3. WhatsApp double parsing GIFs, enabling any real harm to be caused from the double free You would need all three of these conditions to be present for this to be exploitable. The Android behaviour you are pointing out is actually contributing to the exploit (which should NOT be happening).
@Julianiolo
@Julianiolo 3 ай бұрын
@@DanielBoctor Sorry, it might be that my question was unclear. As per standard realloc should always return a pointer, that can be passed to free/realloced with size 0. That means that, as long as you use the pointer returned by realloc (and don't reuse the pointer you passed to realloc) you could call realloc infinitely often. Even with size 0.
@Julianiolo
@Julianiolo 3 ай бұрын
@@DanielBoctor ooh, I looked at the commit that it was patched. The problem is, that realloc returning NULL is valid behaviour for size 0 realloc. This however gets interpreted as an error bc of low memory. In that case, the pointer doesn't get updated and will be passed again to realloc the next frame (but it was already freed).
@garymuller9771
@garymuller9771 2 ай бұрын
How is a Human able to find such a specific interaction of multiple exploit? Do they really search for them or do they find them by chance?
@U20E0
@U20E0 2 ай бұрын
Basically by guessing from experience what can happen and then trying everything. And of course you can also analyse the actual code.
@randomdamian
@randomdamian 6 ай бұрын
That's why I use Signal and Matrix, and I have any auto download media disabled on my phone.
@williambrasky3891
@williambrasky3891 6 ай бұрын
Commenting for the algorithm. Love the low level explanation of these vulnerabilities.
@DanielBoctor
@DanielBoctor 6 ай бұрын
My first 'commenting for the algorithm' comment LOOOOOOOL. Thank you for the support!! Means a lot 😊
@philalex7256
@philalex7256 2 ай бұрын
If the data is sandboxed it should not be a problem right something like grapheneos should be able to deal with this.
@orisphera
@orisphera 6 ай бұрын
I wonder why they changed that instead of leaving it as it was in upstream
@SB-qm5wg
@SB-qm5wg 6 ай бұрын
The people that find these are on another level 🧠
@DanielBoctor
@DanielBoctor 6 ай бұрын
I know, it really is incredible 🤯
@KaufDirGeld
@KaufDirGeld 6 ай бұрын
crazy how the title is a lie.
@ijk8055
@ijk8055 6 ай бұрын
LEMMiNO background music is 🔥
@DanielBoctor
@DanielBoctor 6 ай бұрын
I couldn't agree with you more. LEMMiNO is the GOAT.
@Kevinsmithns
@Kevinsmithns 5 ай бұрын
Where can i get the tool to try this out myself
@Jango1989
@Jango1989 3 ай бұрын
Very cool
@DanielBoctor
@DanielBoctor 3 ай бұрын
not as cool as you
@guiller2371
@guiller2371 5 ай бұрын
Assembly, memory allocation, graphics programming, for an attack? Are you kidding me? Who is going to go for all this trouble? It has to be some government or a large interprise.
@psp.youtube
@psp.youtube 6 ай бұрын
amazing vide0
@localgamerz..
@localgamerz.. 6 ай бұрын
this is kind of bad ass
@gunmanwhy657
@gunmanwhy657 5 ай бұрын
Please Please sir how can I brutforce gmail account because hydra it doesn't work
@swedishguy83
@swedishguy83 6 ай бұрын
It’s pronounced “Jif” like the peanut butter according to Steve Wilhite, creator of GIF.
@sproga_265
@sproga_265 6 ай бұрын
Fadcinating to hear music made by one KZfaqr (lemmino's cicaida) in another KZfaqr's video
@DanielBoctor
@DanielBoctor 6 ай бұрын
Yep, he posts all of his music publicly and lets other creators use them. Gotta love LEMMiNO. It's credited in my description too - I used 2 of his songs in this video.
@ankk98
@ankk98 6 ай бұрын
subscribed
@freedustin
@freedustin 6 ай бұрын
lol why did they re-implement rendering a gif anyways? seems intentional.
@paljain01
@paljain01 6 ай бұрын
more reasons to use rust
@ahndeux
@ahndeux 6 ай бұрын
I'm FREE! FREE! Oh crap, its a double free statement.
@tossancuyota7848
@tossancuyota7848 6 ай бұрын
bruh this is like 2022 gif incident on discord ... reboot
@amyshaw893
@amyshaw893 2 ай бұрын
so to get this vulnerability which allows you to gain access to the phone, first you have to gain access to the phone to get the function addresses, got it
@abizernaseem2046
@abizernaseem2046 6 ай бұрын
Hey what's the CVE number of this exploit?
@DanielBoctor
@DanielBoctor 6 ай бұрын
Facebook reserved CVE-2019-11932 for this issue.
@Nine_Divines
@Nine_Divines Ай бұрын
It's like on Anchorman but on his telepromptor every sentence ends with a question mark ❓" I'm Ron Burgandy?"🤷
The Hacker who could turn on ANYONE'S Zoom Camera [Zero-Day]
14:17
Daniel Boctor
Рет қаралды 75 М.
When you Accidentally Compromise every CPU on Earth
15:59
Daniel Boctor
Рет қаралды 648 М.
Glow Stick Secret (part 2) 😱 #shorts
00:33
Mr DegrEE
Рет қаралды 47 МЛН
GADGETS VS HACKS || Random Useful Tools For your child #hacks #gadgets
00:35
Мы играли всей семьей
00:27
Даша Боровик
Рет қаралды 5 МЛН
Android App Bug Bounty Secrets
20:14
LiveOverflow
Рет қаралды 92 М.
Dev Loses $440 Million in 28 minutes, Chaos Ensues
10:17
Daniel Boctor
Рет қаралды 195 М.
Android Vulnerabilities, Exploits, and Malware Explained
38:31
Android and Chrome Enterprise
Рет қаралды 1,5 М.
Zero Click Exploits Explained: Technical
10:23
RealTime Cyber
Рет қаралды 32 М.
How Google Analytics was used to Breach Virtually any Website
11:51
Daniel Boctor
Рет қаралды 182 М.
everything is open source if you can reverse engineer (try it RIGHT NOW!)
13:56
Low Level Learning
Рет қаралды 1,2 МЛН
17 Hacker Tools in 7 Minutes - ALL Hak5 Gear
6:54
Hak5
Рет қаралды 362 М.
Remotely Control Any Phone and PC with this Free tool!
17:15
Loi Liang Yang
Рет қаралды 679 М.
Переходник для IPhone • 181649538                         Делюсь обзорами в профиле @lykofandrei
0:15
APPLE УБИЛА ЕГО - iMac 27 5K
19:34
ЗЕ МАККЕРС
Рет қаралды 98 М.
Apple Event - May 7
38:32
Apple
Рет қаралды 6 МЛН
Как я сделал домашний кинотеатр
0:41