How This SQL Command Blew Up a Billion Dollar Company

แชร์
ฝัง
  • เผยแพร่เมื่อ 13 มิ.ย. 2024
  • A story of the Heartland Payment Systems breach from 2007-2009, the world's largest at the time. The specific details of how everything went down is unknown, so this is built on top of the USSS/FBI advisory, and various articles. The FBI advisory (see the third source) covered dozens of breaches that occurred in the late 2000s, all of which had the same attack pattern (Windows, SQL Server, xp_cmdshell, etc). But it's theoretically possible that Heartland was the odd one out, and that everything in this video is wrong ☺️
    SQL injection simulator: www.hacksplaining.com/exercis...
    Sources:
    www.bankinfosecurity.com/hear...
    blog.comodo.com/e-commerce/th...
    www.researchgate.net/publicat... (***Link to FBI advisory is reference [7]***)
    community.fico.com/s/blog-pos...
    www.wired.com/images_blogs/th...
    www.darkreading.com/attacks-b...
    www.forbes.com/sites/davelewi...
    www.justice.gov/opa/pr/two-ru...
    www.cutimes.com/2015/06/05/he...
    kwcsec.gitbook.io/the-red-tea...
    www.hypr.com/security-encyclo...
    blog.quest.com/ntlm-authentic...
    www.crowdstrike.com/cybersecu...
    Assumptions:
    - In the hackers' conversation at 1:05, I arbitrarily chose Gonzalez as the "boss" since he's the only one with a Wikipedia page and I suppose has the longest resume.
    - For 1:38, Amazon does not use a relational database for its product listings, and therefore no SQL queries are used in reality. But this is a relatable and simple example.
    - At 2:38, whether or not Heartland used the 2000 version of SQL Server is a guess. The above Research Gate paper "Heartland Data Breach Analysis" says 2000 is likely as the website was developed 8 years prior. I believe xp_cmdshell was also first introduced in SQL Server 2000, so it could not have been a version prior to that one.
    - Whether or not the web portal was connected to SQL Server with sysadmin credentials is also a guess (5:03). It is possible that the role was not sysadmin, but was granted permission to execute xp_cmdshell for unknown reasons (sysadmin can grant other roles permission to use xp_cmdshell)
    - Heartland's use of NTLM (7:07) is also a guess. Many companies would have not switched over at the time, and the FBI advisory points out the use of fgdump, which is specifically used for NTLM.
    - It is alluded to at 9:02 and onward, but credentials and privilege escalation could have also been obtained through other means.
    - The whole "privilege escalation + hop through various hosts" illustration at 9:18 could be completely wrong, and is the biggest gap in the story. This is just the simplest way the payment network could have theoretically been reached. For all we know the hackers actually did exploit Microsoft Office to hack into the mainframe.
    - Heartland never specifically said what the packets contained (9:34), but they mentioned everything that wasn't leaked, like SSNs, so the assumption here is that packets contained everything that they didn't say wasn't leaked.
    - There's a HSM (hardware security module) section in the FBI advisory as well, but I figured that wasn't too important as the primary issue mentioned throughout every article is the unecrypted in-flight data.
    Error corrections:
    - 3:17 dll files literally contain machine code, usually compiled from C or C++
    Chapters:
    0:00 Brief introduction of Heartland
    0:44 The Beginning
    1:34 SQL and SQL injection
    2:37 Heartland's use of SQL Server
    5:41 Almost Caught?
    6:13 Jump to the payment network
    9:57 Attack shut down, public disclosure
    10:48 The Perpetrators
    11:24 Preventive measures
    12:54 Conclusion
    Music:
    Aloft (by LEMMiNO) - • LEMMiNO - Aloft (BGM)
    "Film Noir Background Music for Videos I Noir Jazz Playlist I No Copyright Music" - • Film Noir Background M...
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 431

  • @kevinfaang
    @kevinfaang  ปีที่แล้ว +466

    Edit: I've since realized that no one reads the description. Pls read the description for extra notes/corrections. If you reply to this comment with any corrections I will add it to the description.
    Original comment:
    Is the audio quality worse in this video than the last one? Didn't notice with my headphones/speakers, just my phone. Feels like there's too much midrange

    • @ankit2388
      @ankit2388 ปีที่แล้ว +16

      Sounds good. Btw great content, you're like @chubbyemu version of tech.This channel will blow up

    • @flicsmo6838
      @flicsmo6838 ปีที่แล้ว +1

      On my phone it sounds a bit midrange heavy too, and maybe could use some more compression?

    • @misuwu_
      @misuwu_ ปีที่แล้ว

      Initially I thought the voiceover was ai generated, I think the audio from your last video sounded better. The video is great, but I found the voice a bit distracting.

    • @jonny6702
      @jonny6702 ปีที่แล้ว

      Yes, it was worse imo.

    • @qwomp
      @qwomp ปีที่แล้ว +1

      htis is my first video from you that i've seen, however from first impressions i do believe some EQ work would benefit greatly! :) otherwise i really enjoyed it, sat here and watched it while i played minecraft!!!!

  • @FlabbyTabby
    @FlabbyTabby ปีที่แล้ว +366

    1990's teaching people how to create web servers:
    - Create SQL database
    - Create webpage and give it direct access to said database
    - Expose CRUD logic directly as UI

    • @FaySmash
      @FaySmash 9 หลายเดือนก่อน +22

      Sadly that's still common today..

    • @benargee
      @benargee 6 วันที่ผ่านมา

      Managers: *laugh in minimal viable product*
      .
      .
      .
      .
      Managers: *Pikachu surprised face*

  • @DonaldSubert
    @DonaldSubert ปีที่แล้ว +2025

    There were a lot of failure points, here, but the fact that they didn't guard against SQL injection is inexcusable. This company that handles credit card data is less secure than my student project that let you report celebrity sightings.

    • @Teeeh4723
      @Teeeh4723 ปีที่แล้ว +284

      You are missing the fact that nowadays even basic software is protected vs SQL injection, but 2008 were completly different times. Now cybersecurity is lot more important and the software is way more robust. Still there will always be a way, but no so straightforward

    • @HenryLoenwind
      @HenryLoenwind ปีที่แล้ว +130

      @@Teeeh4723 Funnily, if we go back in time another 15 years, we're now looking at a time when protection against SQL injection was the norm.

    • @DonaldSubert
      @DonaldSubert ปีที่แล้ว +66

      Fair enough. I didn't start programming seriously until 2013. Even today, though, I still see people use raw SQL execs with unsanitized user input, bypassing the built-in protections. Not everybody knows to use prepared statements. Important for senior devs to check what the juniors are doing.

    • @lautaro1670
      @lautaro1670 ปีที่แล้ว +61

      ​@@DonaldSubert I would argue that 99% of SQL injections issues nowadays are due to senior devs ignoring current industry practices and not because of junior devs. Most ORMs nowadays (and I say most because I'm sure there is at least kne popular ORM I've never used that contradicts my point) are extremely cautious towards not allowing SQL injections. Problem is senior devs trying to "bypass" utilizing the ORMs and directly writing SQL, mostly because it may just be quicker to them. Some are also the classical kind of crazy tech guy "I know better than the tooling!!!!". Then, they write complex queries where they miss this one spot which allows insecure inputs or simply leave the code for a junior to go "monkey sees, monkey does".
      This is especially relevant in the shitty Java environment dominated by abominable dinosaurs that still believe in Oracle BS usage of stored procedures

    • @Tekner436
      @Tekner436 ปีที่แล้ว +6

      @@HenryLoenwind Yet it's still a top 10 vulnerability lol

  • @adamdapatsfan
    @adamdapatsfan ปีที่แล้ว +612

    As a former T-SQL dev who wrote many stored procs, I can confirm that it is indeed just SQL with a fancy hat.

    • @KF-zb6gi
      @KF-zb6gi 11 หลายเดือนก่อน +3

      lmao

    • @xBINARYGODx
      @xBINARYGODx 10 หลายเดือนก่อน +18

      it really is a nice hat though

    • @AK-vx4dy
      @AK-vx4dy 9 หลายเดือนก่อน +2

      It is just sql but does two good things.
      1. Can use specific kind of db and sql to full extent of posibilites and go with maximum efficiency and clearly mantian proper logic state of database and proper use of transactions (in very short time spans)
      2. Keeps one source of truth, promoting DRY i and KISS in some sense and creates level of abstraction and sepearation of concerns.
      Develoler more specialzed in SQL can focus clearly on his job and other developers don't bothered by SQL internals.
      Drawnacks are that this specialization is needed, also tempting tendency to move bisness logic to SP, when this happen project becomes very hard to move to other database technology.

    • @D0Samp
      @D0Samp 7 หลายเดือนก่อน +4

      Meanwhile on Oracle DB, PL/SQL is basically a dialect of Ada that took some Duolingo courses on SQL.

    • @nintendu64
      @nintendu64 6 หลายเดือนก่อน

      @@D0Sampif you don’t like setting money on fire MySQL and Spring Boot can basically be turned into poor man’s oracle with much more 💪

  • @matthewstandridge225
    @matthewstandridge225 ปีที่แล้ว +1223

    This video is insanely good and for such a small channel. This channel is going to skyrocket.

    • @coolmendotdot2
      @coolmendotdot2 ปีที่แล้ว +14

      thank you, random user, for predicting the future

    • @NemanyaIam
      @NemanyaIam ปีที่แล้ว +1

      I just subscribed to this channel and realized that this channel only got 22k subscriber. The content for such a small channel is great.

    • @zac-1
      @zac-1 ปีที่แล้ว

      you jinxed it

    • @--.--
      @--.-- ปีที่แล้ว

      Nah I fell asleep

    • @rdspam
      @rdspam ปีที่แล้ว

      Hopefully invest in Russian accent training 😂.

  • @thekillercow586
    @thekillercow586 ปีที่แล้ว +258

    Quite hilarious that a company working with sensitive data didn't prepare for the most basic of attacks - SQL injection

    • @2112jonr
      @2112jonr ปีที่แล้ว +31

      Cheap, inexperienced staff to cut costs. Project managers with unrealistic scheduling expectations (guesswork).
      What could possibly go wrong.

    • @mustang1912
      @mustang1912 7 หลายเดือนก่อน +11

      It wasn't very much of a exploit, they took months to get a admin user and just brute forced the passsord.

    • @BrunodeSouzaLino
      @BrunodeSouzaLino 4 หลายเดือนก่อน

      You can find a lot of modern websites which are still vulnerable to SQL Injection.

    • @OppieT30
      @OppieT30 2 หลายเดือนก่อน +1

      Was SQL injection around before then? Was it taught in schools?

  • @unknownusername9335
    @unknownusername9335 7 หลายเดือนก่อน +42

    "Recommendation: use passwords" had me do a double take

  • @DomskiPlays
    @DomskiPlays ปีที่แล้ว +349

    What I like is not just that the video is great but you provide sources and clarifications in the description. Love to see it!

  • @HenryLoenwind
    @HenryLoenwind ปีที่แล้ว +109

    Number 0: Don't build your SQL by concatenating data and code. SQL has supported placeholders since...um...forever. (Back in the days before dynamic SQL, statements had to be compiled and installed together with the programs. Building them dynamically wasn't even an option.) Using string operations to form SQL commands is simply inexcusable.
    (And it also is wasteful. The server can cache the access plans for commands with placeholders, but if you concat in the data, you're sending a completely different command every time.)

  • @Rain_MG
    @Rain_MG ปีที่แล้ว +280

    I like how companies show off their fancy security features when some parts of their system rely on software that was written by cavemen on walls in prehistoric times

    • @jan-lukas
      @jan-lukas ปีที่แล้ว +32

      Sometimes that cavemen code will be better than modern one though. Really depends on the exact code

    • @sycration
      @sycration 10 หลายเดือนก่อน +23

      ​@@jan-lukas Once I attempted to rewrite the 1986 SML business logic in F#. Once.

    • @xBINARYGODx
      @xBINARYGODx 10 หลายเดือนก่อน +3

      @@sycration LOL!

    • @Dumb_Killjoy
      @Dumb_Killjoy 9 หลายเดือนก่อน +15

      Kinda like how the IRS still uses (at least in virtualized form) IBM mainframe systems from around the time of the Kennedy Administration. Things like that are why there are still jobs in writing COBOL.

  • @devvy8343
    @devvy8343 ปีที่แล้ว +28

    "And windows will continue to support it until the heat death of the universe" gotta love microsoft

    • @breadone_
      @breadone_ ปีที่แล้ว +3

      why progress with technology when you can be stuck thirty years in the past for some shmuck who doesnt want to change instead 😎

  • @byronk86
    @byronk86 11 หลายเดือนก่อน +30

    I was relatively new in the payments industry when this occurred. Now over 15 years on this has been a great trip down memory lane with a well articulated story line. You’ve got a new subscriber.

  • @jmms49
    @jmms49 ปีที่แล้ว +119

    this is super informative and funny at the same time. Absolutely love it

  • @JetJockey87
    @JetJockey87 ปีที่แล้ว +95

    I use SQL Sprocs and Shell via Task Scheduler to automate all kinds of stuff.
    Files land in a network folder, task scheduler behaves like a cron and fires a shell script every x minutes.
    Shell scans dir for files, finds them, bundles data into JSON, sends via REST to endpoint, etc.
    It works well in some very specific scenarios, most of the time you get cockblocked by airlocker or solarwinds

    • @2112jonr
      @2112jonr ปีที่แล้ว

      And rightly so. Your "cockblocking" is in response to a massive security hole you've just opened up with sloppy coding because you know no better.

  • @MozenBee
    @MozenBee ปีที่แล้ว +13

    I don't usually post comments on youtube.
    But your video is of extremely high quality. Very comprehensive and well thought out.
    As soon as a question popped out in my brain you would immediately answer it right after.
    Good job, sir.

  • @insanitydefined3112
    @insanitydefined3112 ปีที่แล้ว +30

    Love your style, rhythm, content -- everything!! Please keep posting videos like these!!

  • @allak1n
    @allak1n 10 หลายเดือนก่อน +6

    you're such a high value subscription for me, I love your content. you make normally dry technical stuff interesting and comical. never change mate.

  • @testengineeringdaily1957
    @testengineeringdaily1957 ปีที่แล้ว +20

    I was watching one of your other videos and the failure analysis presented here is just as good as what the UCSB does on their investigations and recommendations.
    Great video, and good job!

  • @zshall48
    @zshall48 ปีที่แล้ว +2

    The easy-to-follow explanations, visualizations and humor in this video are awesome!

  • @probablypablito
    @probablypablito ปีที่แล้ว +2

    These videos are so so good. Super well explained., you're able to keep it simple while still explaining more complicated parts like NTLM authentication

  • @MisterSiga
    @MisterSiga 9 หลายเดือนก่อน +2

    love your editing style and the way you break down the complex stuff , awesome video

  • @jwillisbarrie
    @jwillisbarrie 10 หลายเดือนก่อน +2

    Thanks for adding actual captions for the Deaf

  • @joelhaggis5054
    @joelhaggis5054 7 หลายเดือนก่อน +4

    SQL injection is the software equivalent of breaking a lock by hitting it with a hammer. Which is to say, the fact that it works as often as it does (i.e. at all) is extremely alarming.

  • @DatBoi_TheGudBIAS
    @DatBoi_TheGudBIAS 7 หลายเดือนก่อน +2

    i love this chanel. it has alot of humor, and my favorite, -human suffering- i mean explosions

  • @yuck871
    @yuck871 ปีที่แล้ว +2

    Your videos are funny and educational both at the same time! I like the insiders too. Very awesome!!

  • @soroushjavadii
    @soroushjavadii ปีที่แล้ว

    Discovered your channel yesterday via the Cloudbleed video. Loving the content!

  • @Daniel15au
    @Daniel15au 10 หลายเดือนก่อน

    Wow the production quality of this video is so high. Nice work!! Great video.

  • @frwd-le8ge
    @frwd-le8ge ปีที่แล้ว

    Your channel is super underrated, can't wait to see how you blow up

  • @SpaceshipOperations
    @SpaceshipOperations 8 หลายเดือนก่อน

    I love the editing of this video, from the explosions to the video game and anime references. Good job. 👍

  • @rgbmew
    @rgbmew ปีที่แล้ว

    Discovered your channel like an hour ago and I'm already addicted your videos rule so hard

  • @SaulHeno
    @SaulHeno ปีที่แล้ว

    Great explanation of everything, this video deserves a hell of a lot more views

  • @tommyanderson201
    @tommyanderson201 ปีที่แล้ว +1

    Please keep doing these videos, they're great!

  • @BitwiseMobile
    @BitwiseMobile ปีที่แล้ว +12

    This doesn't surprise me. I work with HPS and I often scratch my head and wonder why they haven't moved on from the 70s and 80s yet. I've worked at plenty of financial institutions, so I know they are usually resistant to change, but come on. I think being 40 years behind in technology is probably a little bit too far. Their systems and especially their modes of integration are so antiquated. Our company is moving on from them as fast as we can unwind our existing financial agreements, but they are being sunset quickly. We have had nothing but problems with them.

    • @williamdrum9899
      @williamdrum9899 4 หลายเดือนก่อน

      Because the only way to make a computer unhackable is to keep it off the internet. And even that sometimes isn't enough. There's still that one Janet Jackson song that destroys hard drives

  • @jdrissel
    @jdrissel 9 หลายเดือนก่อน +4

    From having read the specs of the payment processing systems back when debit cards were becoming a thing, I discovered that the "end to end" encryption was not really end to end. What happens if that at each hop your data is decrypted, possibly operated on and then re-encrypted. A payment processor would have to be able to decrypt the data in order to do their jobs.

  • @unusedTV
    @unusedTV ปีที่แล้ว +6

    Very cool video and I love all the hidden references. It's been a while since I've seen hunter2, and I wonder how many other ones I've missed.

  • @sinancetinkaya
    @sinancetinkaya ปีที่แล้ว +3

    Even today some developers (mostly from frontend background) still use string concatenation in SQL queries

    • @2112jonr
      @2112jonr ปีที่แล้ว

      I'd say "most".

  • @mattbuchanan4330
    @mattbuchanan4330 8 หลายเดือนก่อน

    This was an excellent video. Your explanations were succinct and informative. Thanks!

  • @rabik_dev
    @rabik_dev ปีที่แล้ว

    wow, I'm really impressed by the quality of this video. Great job! You've earned a sub :)

  • @raylopez99
    @raylopez99 ปีที่แล้ว +5

    Stock for Heartland Payment systems didn't suffer much, and in 2015 they were sold to Global Payments Inc which has almost doubled from the sale price. Proving there's money in payment system software, as Mastercard and Visa can also attest.

  • @lucretius1111
    @lucretius1111 ปีที่แล้ว

    Your vids are fascinating! Amazing work

  • @SeaWaves8
    @SeaWaves8 ปีที่แล้ว +1

    what a gem of a channel, cya in a year with over a million subs

  • @Mason11987
    @Mason11987 ปีที่แล้ว

    This is fantastic video, keep up the good stuff!

  • @onemoreguyonline7878
    @onemoreguyonline7878 ปีที่แล้ว

    Absolutely great video. Thanks Kevin!

  • @TheSnero3
    @TheSnero3 ปีที่แล้ว

    man I am loving this channel

  • @EternalATomik
    @EternalATomik ปีที่แล้ว +3

    The animation is as good as the information provided! And the information here is 💯

  • @xfirecard
    @xfirecard ปีที่แล้ว

    Such a well-made, executed, and entertaining video! Kudos from me!

  • @timef5059
    @timef5059 ปีที่แล้ว

    That was crazy awesome! Thank you, author!

  • @kreuner11
    @kreuner11 ปีที่แล้ว +12

    Dlls don't contain c++ code, they contain native assembly

    • @2112jonr
      @2112jonr ปีที่แล้ว +1

      Correct. makes you question what else he doesn't understand.

    • @williamdrum9899
      @williamdrum9899 ปีที่แล้ว +4

      I think he meant native code written using C++

    • @kreuner11
      @kreuner11 ปีที่แล้ว

      @@williamdrum9899 yeah maybe, seems he could've just added "machine code which was usually written in c++"

  • @Noxictyz
    @Noxictyz ปีที่แล้ว

    Holy cow. Love these videos!!! Please more

  • @kratosgodofwar777
    @kratosgodofwar777 9 หลายเดือนก่อน +1

    This video was very well paced

  • @mrpetervideo
    @mrpetervideo ปีที่แล้ว +7

    Using NoSQL or SQL frameworks that prevent SQL injections is not just a trend, but a highly recommended practice in modern web development. These frameworks provide an extra layer of security and help safeguard sensitive data from malicious attacks. It's crucial for developers to prioritize implementing these frameworks to ensure the integrity and safety of their websites. Stay secure, everyone!. 😁

    • @FascistTrex
      @FascistTrex 9 หลายเดือนก่อน

      Lmao how does Nosql prevent an sqli attack?
      Do you realize sql os still used to interrogate an sql db?
      An what the fuck even is a SQL framework lmao, i think you are referring to something like JPA that handles sql queries for you.

    • @WolkenDesigns
      @WolkenDesigns 9 หลายเดือนก่อน

      I think you are refering to a part of a larger dev. Framework which prevents SQL Injections. These exist and are highly recomended.

  • @MyMfDominoes
    @MyMfDominoes ปีที่แล้ว +1

    The Nuke API graphic had me rolling lmfaoo redis into k8s then to a nuclear missile

  • @privateness.network
    @privateness.network ปีที่แล้ว

    Fantastic content and coverage man.
    +1 subscriber 😀

  • @user-cp6tg4iy7k
    @user-cp6tg4iy7k ปีที่แล้ว +1

    Loving this content!

  • @stubstunner
    @stubstunner ปีที่แล้ว +4

    I work in cyber security and have for over 10 years. This was a great video! I worked in the PCI for a huge portion of my career and dealt with quite a few of these types of attacks.

  • @WolfrostWasTaken
    @WolfrostWasTaken ปีที่แล้ว +13

    I wish the example you gave for SQL was THAT simple. Amazon uses hundreds of microservices to process their requests and rely mostly on DynamoDB

  • @oOiWaRRioRzOo
    @oOiWaRRioRzOo ปีที่แล้ว +1

    God this channel is sick, I loved the editing at 9:07 Made me giggle way more than it should have 🤣

  • @thekingofallblogs
    @thekingofallblogs ปีที่แล้ว +3

    All you need to do to prevent sql injection is to bind your input variables and not build the query by appending strings. The developers are really ignorant if they allow this.

  • @Shytzedaka
    @Shytzedaka ปีที่แล้ว

    Love this Channel!!

  • @katspa
    @katspa ปีที่แล้ว

    Great video. Keep up the good work

  • @MHX11
    @MHX11 ปีที่แล้ว

    I love the editing style

  • @notapplicable7292
    @notapplicable7292 ปีที่แล้ว +3

    This was great! Dangerously close to being a cyber security beat poem.

  • @actuallynotsteve
    @actuallynotsteve ปีที่แล้ว +15

    How are you videos so good, yet you only have 17k subs? This shit is god-tier levels of content, I'm not even a coder but this stuff is gripping.

    • @ElisArid
      @ElisArid ปีที่แล้ว

      Holy shit this was 8hrs ago and he had 17k? 19.1k now

  • @agranero6
    @agranero6 ปีที่แล้ว +4

    Extended Stored Procedures run (or at least ran) on the database engine memory space. A badly done one could corrupt the database. No responsible company would use them not only because of the hackers, but because there was no need, they were dangerous and much more complex to write.
    Only by reading the documentation of MS SQL Server you were strongly discouraged to use them.
    They did that to themselves...

    • @alexaneals8194
      @alexaneals8194 ปีที่แล้ว +1

      This was a SQL Server 2000 database. Back then, SQL Server did not have many of the admin tools that it has today. XP procs were used to perform many of those tasks. For example to set permissions or change a password.

    • @agranero6
      @agranero6 ปีที่แล้ว

      @@alexaneals8194 Worse yet. But I used SQL server before 2000 when it was yet based on Sybase and both had he grant command. It was inexcusable then as it is inexcusable now. If I earned 2 bucks every time someone said "It can't be done without a cursor" or "It can't be done without an XP" I would be rich now.

  • @Prem-qv1ru
    @Prem-qv1ru 10 หลายเดือนก่อน

    Loving these vids

  • @kharmachaos667
    @kharmachaos667 3 หลายเดือนก่อน +1

    I understood almost none of this, but for some reason the first step strikes me as similar to what happens to when you can get infinite items of choice from stardew valley by renaming your character a special line

  • @corvus8638
    @corvus8638 ปีที่แล้ว +2

    I only know a little SQL but I feel like I learned so much from this video!

  • @deamon6681
    @deamon6681 ปีที่แล้ว +10

    A sequel is a continuation in a series, not a database querying language, the later would be pronounced "S-Q-L". This a my cozy hill and I will die on it.

    • @pcdispatch
      @pcdispatch 8 หลายเดือนก่อน

      People who call it sequel never read a good book about SQL. Usually the first chapter is about this topic and the origin of SEQUEL. Which is not SQL.

    • @JohnSmith-qy1wm
      @JohnSmith-qy1wm 4 หลายเดือนก่อน +1

      It's pronounced "SQUEEL"

    • @Donnerjkks
      @Donnerjkks 4 หลายเดือนก่อน

      Much like the SQL star wars movies

  • @EstebanGM245
    @EstebanGM245 ปีที่แล้ว

    Keep up the good content!

  • @BudgiePanic
    @BudgiePanic ปีที่แล้ว +3

    The more I learn while studying computer science degree, the funnier these videos become

  • @JK-mo2ov
    @JK-mo2ov ปีที่แล้ว +1

    Great job on this video

  • @halofreak644
    @halofreak644 ปีที่แล้ว

    I subbed haha made me laugh many times and was very informative and interesting

  • @amaarquadri
    @amaarquadri ปีที่แล้ว +1

    Great video! I felt like I was watching a spy movie the whole time!

  • @SIMULATAN
    @SIMULATAN ปีที่แล้ว

    The amount of explosions in this video is impressive

  • @iTzStick
    @iTzStick หลายเดือนก่อน

    Bro your videos are freaking hilarious

  • @masonallermann1275
    @masonallermann1275 4 หลายเดือนก่อน

    2:48 i was distracted while this was playing on my headphones and i thought something happened when i heard you read off the list

  • @MarioS271
    @MarioS271 หลายเดือนก่อน

    The eXPlosions were just perfect 😂

  • @AnimeGIFfy
    @AnimeGIFfy ปีที่แล้ว +1

    I wonder how many such hacks go unnoticed right now at this moment. We only hear about the ones that get caught.

    • @2112jonr
      @2112jonr ปีที่แล้ว

      There's hundreds out there, mostly from crap software vendors who hire cheap, inexperienced low knowledge developers.

  • @rushbnostopp
    @rushbnostopp ปีที่แล้ว

    This is 100% quality content

  • @zeluski
    @zeluski ปีที่แล้ว

    great detailed video

  • @mariobisignani4477
    @mariobisignani4477 ปีที่แล้ว +6

    Cool video, but the initial description about how Amazon works is most probably wrong. You don't usually implement search (especially not Amazon) as a full text search over a table in a relational database. What companies usually do is to use technologies like Apache Solr, Lucene or Elasticsearch, for instance they could use a cronjob to periodically update an Elasticsearch index using data taken from the actual database.

    • @therealjib
      @therealjib ปีที่แล้ว

      It was just an example using a well-known website, not meant to be taken seriously

    • @mariobisignani4477
      @mariobisignani4477 ปีที่แล้ว

      @@therealjib yeah I know, I just wanted to point that out because some people might get the wrong ideas on how complex search functionalities work.

  • @greed7513
    @greed7513 ปีที่แล้ว

    I love that things randomly explode sometimes

  • @kxuydhj
    @kxuydhj 4 หลายเดือนก่อน +2

    okay, but the one recommendation i don't see is "don't run ancient garbage, especially if it's developed by microsoft". also known as "properly maintain your systems".

  • @sanderdejong66
    @sanderdejong66 8 หลายเดือนก่อน +1

    6:31 One thing that could have happened during the development of this system: project manager: “What’s taking you so long?” Dev: “Christ, this pyramid of privileges, it’s so complicated.” Project manager: “Just use the sysadmin account for everything and move on!”

  • @deliriumsd142
    @deliriumsd142 ปีที่แล้ว +2

    Amazon uses DynamoDB for its product catalog which is a NoSQL database, however, you may be able to query it like that. I'm not super familiar with DynamoDB queries compared to SQL.

  • @lohphat
    @lohphat ปีที่แล้ว

    There goes Bobbski Tablesova making mischief again!

  • @Not_Even_Wrong
    @Not_Even_Wrong 10 หลายเดือนก่อน

    Unbelievably good and funny!

  • @JimMilton-ej6zi
    @JimMilton-ej6zi 10 หลายเดือนก่อน +2

    It's crazy how places that are allowed to store your data at all, let alone do it badly. Companies that store any amount of data beyond what is required should just be shut down entirely at this point, either that or the owner of the company should be forced to give every single bit of their personal information (including passwords) up to everyone affected, seeing how they love to store other peoples sensitive information and all :p

  • @wiserdivisor
    @wiserdivisor ปีที่แล้ว +1

    I never thought that I could understand such a complex attack.
    Video so good it gave me hope that I too can learn Cyber-Security.
    Thanks Kevin! And of course, liked+subbed :)

  • @jayatflyt
    @jayatflyt 9 หลายเดือนก่อน

    i've been watching a bunch of your videos in a row and i've learned that it's always active directory's fault

  • @Chris-gh5yw
    @Chris-gh5yw ปีที่แล้ว

    LMAO ur videos r fires n love the references esp the one at 10:04 LFMAOAO

  • @miguelito3056
    @miguelito3056 ปีที่แล้ว

    Dude love the video, can you do ronin network breech

  • @Ruboka
    @Ruboka ปีที่แล้ว

    i am having trouble how to realize e2e encryption if your app relies on querying data stored in a nosql database. mongodb has a public beta for achieving this but how are you supposed to secure your app with other nosqls ?

  • @jaden6781
    @jaden6781 ปีที่แล้ว +1

    This is such a good video

  • @goldenglish8721
    @goldenglish8721 ปีที่แล้ว

    Big fan of your work. Don’t stop! (Definitely not a bot)

  • @BadPixelArtist.
    @BadPixelArtist. ปีที่แล้ว

    Good video!

  • @sanderdejong66
    @sanderdejong66 8 หลายเดือนก่อน +1

    Seeing videos like this always makes me wonder: all that time and energy that the hackers have invested, couldn’t they have invested it in a normal job? I mean, it sounds very difficult and they were never sure it was ever going to pay off. In fact, some of them landed in prison.

    • @your_-_mom
      @your_-_mom 7 หลายเดือนก่อน

      They can and likely do have normal jobs

  • @ujjvalw2684
    @ujjvalw2684 ปีที่แล้ว

    that Csgo gun sound on point

  • @btarg1
    @btarg1 ปีที่แล้ว +2

    How did a security firm deem them compliant when they were using such outdated tech?

  • @puucca
    @puucca ปีที่แล้ว

    Great video