What is a zero day attack?

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ต.ค. 2024
  • In this video I explain what is a zero day vulnerability or attack.
    Fundamentals of Networking for Effective Backends udemy course (link redirects to udemy with coupon)
    network.hussei...
    Fundamentals of Database Engineering udemy course (link redirects to udemy with coupon)
    database.husse...
    Introduction to NGINX (link redirects to udemy with coupon)
    nginx.husseinn...
    Python on the Backend (link redirects to udemy with coupon)
    python.hussein...
    Become a Member on TH-cam
    / @hnasr
    Arabic Software Engineering Channel
    / @husseinnasser
    🔥 Members Only Content
    • Members-only videos
    🏭 Backend Engineering Videos in Order
    backend.hussei...
    💾 Database Engineering Videos
    • Database Engineering
    🎙️Listen to the Backend Engineering Podcast
    husseinnasser....
    Gears and tools used on the Channel (affiliates)
    🖼️ Slides and Thumbnail Design
    Canva
    partner.canva....
    Stay Awesome,
    Hussein

ความคิดเห็น • 16

  • @engineeranonymous
    @engineeranonymous 2 ปีที่แล้ว +29

    Another way to detect if the exploit is actively used is to set up a honeypot and wait for the threat actors to attack it. The rate of attack will give you the indication of the level of knowledge and spread among the threat actors.

  • @abassam912
    @abassam912 11 หลายเดือนก่อน +1

    best explanation i found for Zero Day thanks Hussein

  • @JohnMcclaned
    @JohnMcclaned 2 ปีที่แล้ว +32

    it's basically "you're gonna have zero days off until that shit gets fixed"

    • @joostvhts
      @joostvhts 2 ปีที่แล้ว +2

      I thought it would be an exploit that you can use in less than half a day rounded /s

    • @ragnarock811
      @ragnarock811 2 ปีที่แล้ว

      @@joostvhts me too

    • @Namaryop
      @Namaryop 2 ปีที่แล้ว

      ahah that's another way to see it

  • @aymanalmateeg
    @aymanalmateeg 2 ปีที่แล้ว +1

    wow, explanations of confusing stuff in IT can't get any better. thanks a lot!

  • @Akshaya5
    @Akshaya5 10 หลายเดือนก่อน

    Very well explained….You made it sound so easy with the example.Thank you!

  • @autohmae
    @autohmae 2 ปีที่แล้ว +5

    3:04 surprisingly, for large companies like Microsoft it seems to be more like 90 days.
    5:35 their are both good guys and bad guys who after release of a patch try to figure out what the vulnerability might be (if a blog post explaining it doesn't exist or isn't detailed enough), those might release code for an exploit. Which obviously isn't a 0-day, but does mean patching after a vulnerability is still very much advised. Sadly some researcher while looking at it might also find new bugs in the same area and thus a new patch might be released soon after...

  • @wisychrysolyte320
    @wisychrysolyte320 8 หลายเดือนก่อน

    It was very helpful. Thank you!

  • @shashishekhar----
    @shashishekhar---- 2 ปีที่แล้ว

    Informative as always, Hussain 👍

  • @gourabpaul3560
    @gourabpaul3560 2 ปีที่แล้ว +4

    I thought zero day vulnerabilities are those bugs/exploits that are planted into software while building it and the bugs/exploits remain there from "day zero", thus zero day.

  • @abhinavbatta6162
    @abhinavbatta6162 2 ปีที่แล้ว +1

    can you please make a video on encoding, like UTF-8 like that especially related with java.

  • @mindtropy
    @mindtropy 2 ปีที่แล้ว +1

    A vulnerability is a 0-day until to the moment you realize it's been exploited. After finding out that; you have N-days to fix this. Because no one knows how many days it'll take to release a patch for it while everyone knows about the vulnerability itself :)