Application Security - Understanding, Exploiting and Defending against Top Web Vulnerabilities

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ต.ค. 2024

ความคิดเห็น • 23

  • @okyeabuddyguy
    @okyeabuddyguy 9 ปีที่แล้ว +2

    Regarding the question on amplification... There are numerous protocols that have an amplification factor such as DNS, NTP, Chargen, etc. These protocols have functionality whereby a user can craft a request packet, that generates a reply which is several factors larger. NTP may have the largest amplification factor currently known. An attack looks like:
    - botnet or malicious individual/group send NTP request to a bunch of Open NTP servers on the internet that are vulnerable to this amplification technique
    - The request packet has a spoofed source (the victim)
    - The NTP servers receive the request, generate the significantly LARGER response packet, and fire it off to the spoofed victim
    - The victim receives the traffic and network services are impacted due to the size of each packet and sheer number of them
    It is one of the most effective and popular DoS strategies in use today and very common in the wild.
    Defensive strategies are a combination of hardening DNS, NTP, chargen, etc service, not placing them on the web, upgrading to implementations that are not vulnerable to such amplification weaknesses, and utilizing anycast routing services such as cloudflare.

  • @1anre
    @1anre ปีที่แล้ว

    In 2023, watching this was this very informative for me.

  • @abdulhameed-vo7jq
    @abdulhameed-vo7jq 6 ปีที่แล้ว +1

    Very informative, Thank you.

  • @domaincontroller
    @domaincontroller 4 ปีที่แล้ว

    07:46 Proxy 11:08 XXS, Javascript or HTML Injection

  • @nh142891
    @nh142891 7 ปีที่แล้ว

    Great job - as good as any in covering this in a practical way.

  • @likmijnreet4542
    @likmijnreet4542 6 ปีที่แล้ว

    Was so happy to find a tech talk by a native English speaker, only to find out he slurs his words to the point he's virtually incomprehensible

  • @WuddupDok
    @WuddupDok 8 ปีที่แล้ว

    Fantastic! Thanks, Michael/CernerEng

  • @rw4833
    @rw4833 8 ปีที่แล้ว

    Clear and concise!

  • @Rightly_Divided
    @Rightly_Divided 9 ปีที่แล้ว

    Great video!
    Is HSTS the same as HTTPS everywhere plugin, or essentially the same thing?

    • @aatifshahdadable
      @aatifshahdadable 9 ปีที่แล้ว +1

      SubliminalX7 HSTS is a Server Header that instructs the browser to always serve the content over HTTPS for every user of the site as opposed to a plugin which works for an individual user. In essence, HSTS and HTTPS everywhere both force the communication over HTTPS but the key difference is HSTS does it for the web application (one with the HSTS header set) only and HTTPS everywhere attempts to force usage of HTTPS for every website. Hope that helps.

    • @Rightly_Divided
      @Rightly_Divided 9 ปีที่แล้ว +1

      muziklovershello That makes good sense. Thank you for that!

    • @a.n.7338
      @a.n.7338 5 ปีที่แล้ว

      @@aatifshahdadable is there any video regarding exploiting vulnerability of maybe web or anything?

    • @aatifshahdadable
      @aatifshahdadable 5 ปีที่แล้ว

      @@a.n.7338 yes ofcourse. You can check out many such videos on websites like security tube which is kinda okay for a beginner. Also check our owasp to learn more about exploiting web vulnerabilities. They have decent information in there. Good luck !

  • @KanchanaRandika
    @KanchanaRandika 8 ปีที่แล้ว

    Really interesting! Nice one.

  • @MrRohitxx
    @MrRohitxx 8 ปีที่แล้ว

    very much interesting....thank you so much.

  • @ateeshdipankar5969
    @ateeshdipankar5969 9 ปีที่แล้ว

    Very informative session..

  • @lidongning1108
    @lidongning1108 7 ปีที่แล้ว

    excellent video

  • @iamtheoutsider
    @iamtheoutsider 10 ปีที่แล้ว

    Very informative. Thanks.

  • @GuniMatthiasson
    @GuniMatthiasson 10 ปีที่แล้ว

    Great talk!

  • @MrPandycane
    @MrPandycane 10 ปีที่แล้ว

    I appreciate this video.

  • @DermaJayaPutraWaruwu
    @DermaJayaPutraWaruwu 9 ปีที่แล้ว

    great video

  • @myyou1
    @myyou1 9 ปีที่แล้ว

    Thank You!