HSTS - HTTP Strict Transport Security - Protect against SSL Stripping attack - Practical TLS

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 พ.ย. 2024

ความคิดเห็น • 59

  • @PracticalNetworking
    @PracticalNetworking  2 ปีที่แล้ว +8

    📢 *Black Friday / Cyber Monday Promotion*
    👉 Practical TLS for only $50 (originally $297)
    💻 Use code *BFCM2024* --> pracnet.net/tls
    📅 Offer expires Dec 6

  • @scottspa74
    @scottspa74 2 ปีที่แล้ว +15

    I just sent this to my computer info systems and digital forensics current instructors to point out to them how much they're failing us. You, Ed, are doing the greatest work, you're a hero

    • @PracticalNetworking
      @PracticalNetworking  2 ปีที่แล้ว

      Ha. Thank you Scott. I appreciate the shares =). Hope they sign up for my course!

  • @Jamesaepp
    @Jamesaepp 2 ปีที่แล้ว +6

    Followed this from reddit, binged the whole playlist. Just wanted to comment that this is incredibly well done.
    * I love the fading pen marks. I imagine this is great for learners for whom English is not a primary language, and it's great for when I'm reviewing/filling in small gaps while watching at 2x. :)
    * THANK YOU for including a couple episodes with actual math. You explained this more concisely and with better examples/context than the computerphile videos. I'll be recommending your series to anyone I know in the future who wants to better understand digital cryptography.

    • @PracticalNetworking
      @PracticalNetworking  2 ปีที่แล้ว

      Hi James. Thank you for the kind words. I'm really happy you enjoyed this content as much as you did =).
      Yes, I love the math! Not math itself, granted, but the simpler Crypto examples really helped it click for me when I first learned all this, so I was eager to do the same to others watching the video.
      Do me a favor... if you're willing, do you mind posting a link or two to some of the other videos on Reddit? Self promotion is always looked at with suspicion, but a fellow Sysadmin referring good content is typically well received. No pressure either way. Thanks again for the kind words =).

  • @Larry-nx8ho
    @Larry-nx8ho 2 ปีที่แล้ว +1

    I've seen this make many wifi guest portals not be able to redirect, too. Great video, as always!

  • @wildmanjeff42
    @wildmanjeff42 2 ปีที่แล้ว +3

    Thanks for the video, very informative and easy to understand

  • @shahdharmik1919
    @shahdharmik1919 ปีที่แล้ว +1

    In this case of using HSTS, use of following is still vulnerable?
    1. Browser extensions interception just like M-I-M attack? The manually installed ones!
    2. Use of any non-standard browsers, i.e tor, lunaspace, uc browser, brave?
    Just curious to knw

  • @kotemanoble1734
    @kotemanoble1734 2 ปีที่แล้ว +2

    Interesting, thanks for putting this out there.

  • @jeremiahm5487
    @jeremiahm5487 2 ปีที่แล้ว +1

    Been a while since we heard from you.
    Fantastic video BTW.

  • @chartypes
    @chartypes หลายเดือนก่อน

    OMG what a such amazing video ! Thank you so much for this content and the resources as well. 🙌🏻

  • @navinreddy-xx1vo
    @navinreddy-xx1vo 10 หลายเดือนก่อน +1

    no words, awesome videos, Thanks for video

  • @Alexanderslaxis
    @Alexanderslaxis 2 ปีที่แล้ว +3

    Hey man, your tutorials are brilliant. Can you please create a new series to discuss optical networks and their components?(SONET/SDH, TDM,WDM,ROADM,RAMAN,WSS, G.709 OTN, FEC, OTN Alarms, OTN TCM, TTI, etc).

    • @PracticalNetworking
      @PracticalNetworking  2 ปีที่แล้ว

      Hi Alexander, glad you're enjoying these.
      You listed a lot =). That is a big ask. ^_^
      Regrettably, none of the acronyms seem to be within my expertise to teach =/

  • @1Esteband
    @1Esteband 10 หลายเดือนก่อน

    Excellent presentation. Thank you!

  • @DonatoProce
    @DonatoProce 2 ปีที่แล้ว +1

    excellent description - thanks!!

  • @sonyphilipp3345
    @sonyphilipp3345 2 ปีที่แล้ว +1

    Brilliant work

  • @michawojcik1519
    @michawojcik1519 2 ปีที่แล้ว +1

    Very informative mate, thanks a lot

  • @etpienaar
    @etpienaar 4 หลายเดือนก่อน

    really well thought out and explained :)

  • @thriveniraghav4356
    @thriveniraghav4356 2 ปีที่แล้ว +2

    All your videos are very informative. Thank you.
    Can you make videos on SD-WAN technology.

    • @PracticalNetworking
      @PracticalNetworking  2 ปีที่แล้ว

      You're welcome, Thriveni. SD-WAN isn't in my expertise to teach on, I'm afraid.

  • @Alex-hn3lc
    @Alex-hn3lc ปีที่แล้ว

    Very well explained thank you.🙏

  • @HubertHeller
    @HubertHeller ปีที่แล้ว +1

    Aside from security, how much will it make my website faster?

    • @PracticalNetworking
      @PracticalNetworking  ปีที่แล้ว +2

      The speed gain is negligible. It could save you a round trip, in certain cases, but the main benefit of implementing HSTS should be security, not speed (that's a side perk).

    • @HubertHeller
      @HubertHeller ปีที่แล้ว +1

      @@PracticalNetworking what about HS TS preload? Any speed advantage there?

    • @PracticalNetworking
      @PracticalNetworking  ปีที่แล้ว +3

      @@HubertHeller Again, there would be a slight advantage (in some cases) ... but speed shouldn't be the main driver of implementing HSTS =).
      For instance, if the user already initiated a session to the https version of the site.. there would be no visible affect to speed whether you implement HSTS and/or preload

  • @AshishMishra-kw2zm
    @AshishMishra-kw2zm 2 ปีที่แล้ว +1

    Wow ... Amazing Video ❤️❤️ ... Need session on SDN as well... VMware NSX-T please 🙏🙏

    • @PracticalNetworking
      @PracticalNetworking  2 ปีที่แล้ว

      Glad you enjoyed it =).
      There are so many videos on my list to make. SDN is going to be a ways back. VMware probably isn't on the list, I'm afraid =(

  • @ayyapanr
    @ayyapanr ปีที่แล้ว +1

    Hey Ed.. great explanation on ssl stripping. However I am wondering what happens if the MITM strips the HSTS headers on the response traffic in the scenario of Server MITM Client.

    • @rezamirzazadefarkhani6915
      @rezamirzazadefarkhani6915 11 หลายเดือนก่อน

      Great question. Preloading is supposed to partially address this issue by making the very first request in HTTPS. However, Preloading does not scale up to the whole internet. Therefore, if the website is not in the Preloading list and if the attacker can strip the HSTS headers by MITM, then the attack scenario you mentioned is possible.

  • @sushilshiwaniwal
    @sushilshiwaniwal 7 หลายเดือนก่อน

    Thanks for the shared information.

  • @waverache8296
    @waverache8296 2 ปีที่แล้ว +2

    Nice explanation

  • @DebasishMandal
    @DebasishMandal 2 หลายเดือนก่อน

    great video; thansk!

  • @AliRem
    @AliRem 2 ปีที่แล้ว +1

    Perfect !

  • @subee128
    @subee128 4 หลายเดือนก่อน

    Thanks

  • @abdirahmanabdullahi1150
    @abdirahmanabdullahi1150 2 ปีที่แล้ว +1

    Ed thank you 😊

  • @govindraj1092
    @govindraj1092 2 ปีที่แล้ว +2

    Hello Master could you share me STP protocol & FHRP.. Details please

    • @PracticalNetworking
      @PracticalNetworking  2 ปีที่แล้ว +1

      I hope to make some STP videos at some point, yes.
      While not explicitly about FHRP, I wrote an article on Gratuitous ARP that touches on how HSRP works, slightly. If you're interested:
      www.practicalnetworking.net/series/arp/gratuitous-arp

    • @pavankumarkj255
      @pavankumarkj255 2 ปีที่แล้ว +2

      STP is explained by Keith barker here on YT. Definitely check that out. And always banger video form PN.

  • @chadsexinton
    @chadsexinton ปีที่แล้ว

    What specifically on the browser does it use to remember that 63M seconds ?

  • @youssefblt9839
    @youssefblt9839 11 หลายเดือนก่อน

    thanks verry infomative

  • @munirajulu
    @munirajulu 2 ปีที่แล้ว +1

    Thanks Sir 🙏

  • @nosajix
    @nosajix 10 หลายเดือนก่อน

    What about self signed warnings?

  • @kornelijekovac9793
    @kornelijekovac9793 5 หลายเดือนก่อน

    Why all this? Can't they just enforce SSL connection at browser level for all websites?

    • @casper64
      @casper64 4 หลายเดือนก่อน

      The point is not to protect users but protect your self with encryption. If you use HSTS you can enforce encryption yourself instead of having to rely on the client

  • @fekkon_rasulegando
    @fekkon_rasulegando 5 หลายเดือนก่อน

    ❤❤❤

  • @BrendaSnead-z7d
    @BrendaSnead-z7d 2 หลายเดือนก่อน

    Enoch Field