hobune Channels Contact About Donate

CVE-2020-0601 aka Curveball: A technical look inside the critical Microsoft CryptoAPI vulnerability

Back to video page | Download comments jsonl

Comments (archived 2022-07-03 21:20; 49 top, 69 total comments)

SkipToPlay 2020-01-17 17:39:19

In the event logs of patched systems, warnings with EventID 1 appear when trying to exploit this vulnerability. Pretty useful for a SIEM solution in a company.

18 likes
Replies (1)
babybirdhome 2020-02-14 05:42:54 (edited 2020-02-14 05:43:15 )

SkipToPlay This is only true AFTER the patched system has been rebooted following an attempted exploit, so not as useful as it sounds.

0 likes
Mr Owl 2020-01-17 17:32:07 (edited 2020-01-17 17:53:25 )

Wow. On the one hand it's so scary that vulnerabilities as (comparatively) simple as this one exist in the wild. On the other hand, it gives me hope that one can work in cyber-security, without being part of Google Project Zero. Great video!

4 likes
Replies (1)
Crazy Danish Hacker 2020-01-17 18:14:45

There are plenty of roles to be filled on the offensive and defensive side that are not even close to the level project zero is at. So yes, if you really want to work in cyber security, you can if you're persistent in learning the basics and preferably beyond yourself.

1 like
Luan de Mattos 2020-05-08 16:02:24

Very good and simple explanation, thank you for doing this.

1 like
Z S 2020-01-17 16:47:16

Excellent breakdown. Good job.

18 likes
Seth 2020-12-17 16:06:05

Man you are the best.I studied about ECC in my college subjects but it was only theory heavy never really implemented it,looking at this explanation i am amazed.This is really cool.Please do cryptography stuffs more often.Thank you

0 likes
ChillerDragon 2020-01-18 12:18:02

Great video. Simple and yet detailed explanation.

1 like
LiveOverflow 2020-01-17 17:13:30

going to close my channel down! we found a replacement

296 likes
Replies (10)
GCM 2020-01-17 17:55:49

don't do it. you two are inspirations :)

20 likes
Ciao Bello 2020-01-17 18:49:36

schreib nicht so was, es wird sowieso schon langsam dünn mit dem guten content auf YT...

3 likes
Great Said 2020-01-17 22:46:36

you both are great!

2 likes
An on 2020-01-17 23:08:00

Look forward to your vid on this exploit over flowing into my subscriptions feed

0 likes
Sadeeq Aliyu gumel 2020-01-17 23:29:19

Can't wait to see you colab.

3 likes
Abida Fahd 2020-01-18 16:30:48

ahahahhaha!

0 likes
Himash Himash 2020-01-24 05:46:03

Don't do that bro you are the great one all over the internet

0 likes
kalopseeia 2020-01-25 12:17:52

don't bro please , i'm your fan .

0 likes
Arul Kumar 2020-01-27 18:53:14

is that you Liveoverflow in that video :D He sounds exactly like u

1 like
JellyfishJelly 2020-02-15 22:36:37

Honestly I thought I was watching your video, trough something felt a bit off. Guess there's a vulnerability in my cryptoAPI as well.

0 likes
Clement's Projects 2021-01-12 16:52:01

Well explained ! Good job.

0 likes
Maurice Kalevra 2020-01-17 16:43:18

Great work! Keep it up 👍

3 likes
RmFrZQ 2020-01-17 17:47:43

Very nice explanation. Can you make a video about how Microsoft actually patched CryptoAPI? Did they make it so "public key" couldn't be equal "generator" or something else?

3 likes
Replies (2)
stacksmashing 2020-01-17 17:57:52

That's a good idea! I might have a look at the binary diff!

6 likes
Minkyo Seo 2020-01-22 06:14:28 (edited 2020-01-22 06:18:35 )

Although it's in korean, you can checkout patch diff(hex-rays) from this video : https://youtu.be/FNORkpxVcQI?t=216

0 likes
Searinox Navras 2020-05-10 16:02:47

Can you also do a video on the Wii & NDS SSL certificate trust chain vulnerability that allowed people to spoof the WFC back online after Nintendo shut down the official one?

2 likes
Jitbahan Samanta 2020-01-22 08:58:33

Beautifully explained.!!! Thanks.!!!

1 like
Ale Bored 2020-02-09 17:17:03

Excellent explanation easy to understand

1 like
VoidSurf 2021-11-15 16:38:00

Now I'm certainly no expert... But this exploit seems so basic that it should have been easily caught by the cryptography experts who implemented it. Very strange that it wasn't caught earlier.

0 likes
Reckless Roges 2020-01-17 18:40:20

When three letter agencies step out of the shadows to "correct your homework" you know you have made a huge blunder. Thank for amplifying this Ghidra. #avoidWindows10

6 likes
Enoch Liu 2021-02-21 03:12:39

3:11 In reality Wikipedia actually uses the DigiCert SHA2 High Assurance Server CA.

0 likes
Jan Scheer 2020-01-17 20:45:04

Excellent explanation. (bitte mehr davon)

2 likes
Daniel O 2020-02-29 12:53:10

it should be noted that elliptic curve is not an algorithm, elliptic curve is a cryptographic technique that also works on symmetric cryptography ;) ECDSA would be an algorithm

0 likes
Lino1259 2020-01-17 21:38:47

Never clicked so fast on a video. Nice explanation indeed!

3 likes
twerkituntilyoumakeit 2021-03-27 17:33:12

you could probably get some green eco carbon credits for using much lower resources to accomplish a benign exercise in algorithm execution that we've assigned magic values to

0 likes
mid Jhelins 2020-02-07 11:19:51

BRILIANT EXPLANATION!

0 likes
Magnus 2020-01-17 17:50:59

Very good explanation

1 like
むわ00 2020-01-18 00:36:04

Great explanation!

1 like
0xtz 2020-01-18 11:40:56

Good explaining thanks man

1 like
Replies (1)
0xtz 2020-01-18 11:43:22

you are my idol

1 like
Kevin Wydler 2020-04-14 00:15:40

Love your channel!

0 likes
Gernhard Reinholzen 2020-01-17 17:19:26 (edited 2020-01-17 17:19:47 )

so this can be also used to exploit code signing, right?
so we could sign binaries with a fake microsoft cert and get applications running like they were from microsoft?
would this also effect boot stage? like signing drivers without testinging enabled?
(of course while using unpatched dll)

3 likes
Replies (1)
RmFrZQ 2020-01-17 18:10:08

You still can do it. You just have to also install rogue CA certificate with name "Microsoft" on it.

0 likes
Andrea 2020-01-17 22:14:06

Waiting for reversing wannacry part 2 (so hyped) :)

16 likes
PwnFunction 2020-01-17 19:40:33

Wow, loved it!

3 likes
Kavita Sah 2021-02-04 19:07:04

All bits explained!

0 likes
Cristi Neagu 2021-02-08 20:29:21

Am i the only one that finds it weird that the NSA is reporting vulnerabilities in Windows? Isn't that incredibly ironic?

0 likes
go dash 2021-05-29 20:24:02

Does anyone have a research paper on this POC or anyone have done a research paper on this vulnerability? I have a project report to complete within 2 days. so if you have or if you know a source please let me know. the research paper must contain the POC of CVE-2020-0601 and mitigation techniques as well. This is a really critical moment for me. so please help me and I really appreciate all the supports, as well as I, look forward to supporting you. Thank you.

0 likes
Great Said 2020-01-17 22:47:21

very nice! thanks

1 like
MAT\x48 2020-01-17 19:20:55

Very Nice Video!!!

1 like
PierreVEVO Studio 2020-02-09 21:59:39

A video on mitm attack with Cain or responder will be interesting (I you have too much time 😂)

0 likes
Daniel Fernandes 2022-03-14 13:04:49

Thank you!

0 likes
Dr Dre 2020-01-18 04:26:05

Great video

1 like
dracenmarx 2020-05-11 19:11:20

How does the fix by Microsoft work?

2 likes
Name Geheim 2020-01-17 16:25:51

Any one remembers the 601 error in "The Andromeda Strain" from 1971?

0 likes
Replies (1)
F1 Jackman 2020-01-17 16:40:23

what is that?

3 likes
коронавирус 2020-01-18 08:36:40

Теперь я знаю криптографию на эллиптических кривых ... lol

1 like
go dash 2021-06-03 05:57:48

how to use dump command in this 8:32. please help

0 likes
Roman Ext 2021-05-13 19:03:14 (edited 2021-05-13 19:04:04 )

To all whitehats at NSA: thank you!

0 likes
GCM 2020-01-17 17:29:09

so deceptively simple

12 likes
Secret Furry 2020-04-15 16:11:16

What theme are you usinh for ubuntu there?

0 likes
Replies (2)
stacksmashing 2020-04-15 20:25:51

It’s the default theme :)

0 likes
Secret Furry 2020-04-15 21:18:53

@stacksmashing wierd it doesnt look like it for mey maybe because of my small phone screen, sell thx

0 likes
Geoffrey Cai 2021-05-20 23:07:04

Nice

0 likes
BoLuDeNcIo 2020-02-16 12:48:40

Why Am I here, I don't even know how to program in Raptor xD

0 likes
BenjaminGames 731 2020-06-01 19:57:53

i have windous 10 ;-;

0 likes
lilmayu 2020-01-17 21:25:12

neat

2 likes
y2 equals x3 plus ax plus b 2020-04-25 12:26:02

Ruby is beautiful

1 like
geist453 2020-01-26 05:10:54

i dont think you script kiddies realize how big of a vulnerability this is, sigh

2 likes
Replies (1)
Eavy Eavy 2020-02-15 00:00:37

Okay nsa

1 like