←back to thread

634 points RVRX | 1 comments | | HN request time: 0s | source
Show context
lrvick ◴[] No.43720317[source]
To try to convince my employer at the time to drop Zoom, I decided to see how many security vulns I could find in 2-3 hours.

Found 12 confirmed bugs in that window using only binwalk and osint.

The worst was that I noticed the zoom.us godaddy account password reset email address was the personal gmail account of Eric S Yuan, the CEO.

So, I tried to do a password reset on his gmail account. No 2FA, and only needed to answer two reset questions. Hometown, and phone number. Got those from public data and got my reset link, and thus, the ability to control the zoom.us domain name.

They were unable to find a single English speaking security team member to explain these bugs to, and it took them 3 months to confirm them and pay me $800 in bug bounties, total, for all 12 bugs.

The one bright side is this did convince my employer to drop them.

replies(3): >>43720543 #>>43723875 #>>43726859 #
popcalc ◴[] No.43726859[source]
You're admitting to committing a felony?
replies(1): >>43726899 #
MiguelX413 ◴[] No.43726899[source]
White hat hacking is fine.
replies(1): >>43728413 #
popcalc ◴[] No.43728413{3}[source]
If you password reset my personal Gmail account I will sic the FBI on your tail without a second thought. Not cool.
replies(2): >>43733715 #>>43734244 #
1. lrvick ◴[] No.43733715{4}[source]
You can try, but they will not do anything unless I do actual harm.

https://www.justice.gov/archives/opa/pr/department-justice-a...

If you do not want your gmail password reset, I recommend hardware 2FA.