AppSecCali 2020 Closing Keynote: Browser Manipulation for Bypassing Firewalls - Samy Kamkar

แชร์
ฝัง
  • เผยแพร่เมื่อ 13 ต.ค. 2024

ความคิดเห็น • 25

  • @es8559
    @es8559 3 ปีที่แล้ว +2

    Dude is super smart! Respect.
    Computer code and security is so complex. Crazy.

  • @yusufanything
    @yusufanything 4 ปีที่แล้ว +8

    Samy is my hero.

  • @matthewvjohnson9356
    @matthewvjohnson9356 3 ปีที่แล้ว

    I absolutely loved this and I may have to watch this a million time after I lean some of the acronyms. You would make a great teacher because you make your lectures very interesting even though I didn't understand a lot of this I watched the whole thing. I hope to learn more!

  • @TheEndOfMadness
    @TheEndOfMadness 4 ปีที่แล้ว +4

    Genius.

  • @hadestech8147
    @hadestech8147 3 ปีที่แล้ว

    Nice work

  • @coronapack
    @coronapack 3 ปีที่แล้ว +2

    So scary

  • @sommeone4582
    @sommeone4582 ปีที่แล้ว

    Browser should warn if local ip addresses are being used in script or html

  • @gianfrancofini
    @gianfrancofini 3 ปีที่แล้ว

    I have no idea what he's talking about

  • @wolu9456
    @wolu9456 3 ปีที่แล้ว

    spend all that time
    tell everyone "hey look"
    they "fix it"
    you receive no money
    we all need energy drinks people. that s%%^ ain't free

  • @deanguy9626
    @deanguy9626 3 ปีที่แล้ว

    📱

  • @lotfipnr
    @lotfipnr 2 หลายเดือนก่อน

    Hello,
    I am Marko. I am a graduate student studying cryptography, and my project involves analyzing the KeeLoq algorithm. I need to evaluate its strengths and weaknesses and review the types of attacks that have been conducted against this algorithm so far. Ultimately, I need to propose a solution to break this algorithm.
    Up to this point, I have reviewed all the attacks that have been conducted, and they all adhere to the following two conditions:
    Initial conditions are considered.
    Hardware access is available.
    Given the nature of my project, where I do not have hardware access and cannot consider initial conditions, I cannot use these types of attacks. I am looking for a method to theoretically break this algorithm, even if it involves reducing the key space or any other approach that can help me.
    I would appreciate it if you could help me out and guide me out of this confusion.
    Thank you.

  • @justknot4481
    @justknot4481 3 ปีที่แล้ว

    that tool called miranda , for upnp 🤓🤣🤣🤣🤣