Web Cache Poisoning: Hunting Methodology & Real-World Examples

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ต.ค. 2024

ความคิดเห็น • 9

  • @dittonachan
    @dittonachan วันที่ผ่านมา

    great explaination, loved it.

  • @testauthoritytes9917
    @testauthoritytes9917 วันที่ผ่านมา

    Medusa reminds me modlishka. Anyway great explanation.
    Some more points - you have worked on lazy loading cache hit and cache miss architecture that has a condition that this type of cache poisioning is only real of cache is updated.
    There are some more architecture you may want to explore, its write through and session storing.
    For write through architecture , cache is cant be poisoned or updated to be delivered to multiple users for same content of you are not writing to DB.
    For session storing cached
    architecture mechanisms xss will fall short and you may want to try csrf.

  • @nishantdalvi9470
    @nishantdalvi9470 วันที่ผ่านมา

    Please make this sort of video for Oauth misconfiguration as well

  • @smilehackermax
    @smilehackermax วันที่ผ่านมา

    Nice one!

  • @mysteriousministar2481
    @mysteriousministar2481 วันที่ผ่านมา

    Nice video

  • @Aquax1000
    @Aquax1000 วันที่ผ่านมา +1

    Yo man hook me up with some BAC resources (not basics)

  • @Bluesurfer-w8g
    @Bluesurfer-w8g วันที่ผ่านมา +1

    Ps : don't use glitch screen background when explaining something, it's uncomfortable

    • @testauthoritytes9917
      @testauthoritytes9917 วันที่ผ่านมา

      How comfortable is that when you have your website hosting different image or probably your user poset is changed or someone rides csrf and transfer legit amount from your digital wallet to some of your friend that you don't know.
      Get used it if you are blue 🔵, life will be less stressful 😊

    • @pratiksawant8119
      @pratiksawant8119 วันที่ผ่านมา

      Agree