JavaScript Security Vulnerabilities Tutorial - With Code Examples

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ต.ค. 2024

ความคิดเห็น • 82

  • @takanome-dev
    @takanome-dev ปีที่แล้ว +31

    Turns out that I did not figure out any of these vulnerabilities which means that I have been shipping vulnerable code all this time 😬Thanks for the awesome tuts. Time to debug prod 😅

    • @nishantdalvi9470
      @nishantdalvi9470 4 หลายเดือนก่อน +3

      Keep Shipping vulnerable code, This keeps penetration testers like us in job : >

  • @random_guy1024
    @random_guy1024 ปีที่แล้ว +48

    Finally!!!!!!!
    Just the tutorial I was looking for learning code review.
    As a security researcher and CTF player, this is a very Vital skill one should master. Or at least try to learn basic
    Thanks a lot ❤️

    • @davidtosin6995
      @davidtosin6995 ปีที่แล้ว +2

      i can teach you a better way around this. simply but complex but simple and fast to grasp.

    • @random_guy1024
      @random_guy1024 ปีที่แล้ว

      @@davidtosin6995 how do I contact you?
      And if you don't mind, will you do it for free? Cause I'm broke.

  • @developerGRohit
    @developerGRohit 7 หลายเดือนก่อน +2

    I really enjoyed your coding style, the clarity in presenting scenarios, and your explanations. I look forward to watching more of your videos. Additionally, I believe it's crucial to stay informed about security topics, especially given their significance in today's landscape.

  • @AbAb-q3p
    @AbAb-q3p 4 หลายเดือนก่อน +1

    Does this guy have a course online? What a teacher

  • @ceciljoel9577
    @ceciljoel9577 ปีที่แล้ว +2

    Giving examples is a good idea you should give more of them in your courses

  • @jayseb
    @jayseb ปีที่แล้ว

    Thanks for including proper error management in the second example. I so often see during my tests apps sending global 200's or 500's - not really taking the time to correctly management them -> thus poor having logging information. Many teams should watch this video. Cheers.

  • @saltymiche
    @saltymiche ปีที่แล้ว +1

    Very nice + quick intro to secure code review!

  • @johnsansevere9787
    @johnsansevere9787 ปีที่แล้ว +3

    Please change the color of your comment. I can't read it on a black screen, but otherwise you have a fantastic video.

  • @kooldandy
    @kooldandy ปีที่แล้ว +2

    Good one.
    Would like to see more on this.

  • @dreamofyesterday
    @dreamofyesterday ปีที่แล้ว +4

    Awesome video as always. Would love to see more videos about cyber security/ethical hacking/pentesting!!

  • @keilerguardo2164
    @keilerguardo2164 8 หลายเดือนก่อน

    That was an incredible tutorial, thank you very much for share with us.

  • @मुरलीधरसिंह
    @मुरलीधरसिंह 5 หลายเดือนก่อน

    understood nothing but loved it! Watched almost 9 minutes of this tut, will come back later after learning the basics of js. Still trying to make a tic-tac-toe game> Wish me luck!

  • @ВиталийОвчаренко-и1н
    @ВиталийОвчаренко-и1н 6 หลายเดือนก่อน

    Some common security vulnerabilities in JavaScript include Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). These vulnerabilities can be addressed by following correct development techniques, implementing the same origin policy, and using tools like JavaScript security testing tools and GuardRails for automated security testing. It is important for developers to remain proactive and defensive in securing their JavaScript applications to prevent malicious attacks and keep the web safe.

  • @gk_eth
    @gk_eth ปีที่แล้ว +1

    Looking forward for more videos like this.. it's lit💥

  • @TheJohndward01
    @TheJohndward01 ปีที่แล้ว +2

    Thank you so much, this is incredible!

  • @johny962
    @johny962 ปีที่แล้ว +1

    That is so helpful. Thank you!

  • @patrickchan2503
    @patrickchan2503 หลายเดือนก่อน

    wow, amazing quick fire tips, thanks

  • @alexbird1507
    @alexbird1507 ปีที่แล้ว +2

    Great idea, would be really cool to increase font size and install more contrast theme just for the video, because I can't see comments from my phone and barely can read other code. But nevertheless, thanks!

  • @chenmoasis
    @chenmoasis 10 หลายเดือนก่อน

    Thank you for this amazing video! Very informative.

  • @stea27
    @stea27 ปีที่แล้ว +1

    Really nice tutorial with how simple modifications make difference in code. But next time please use a different color for code comments. Grey on grey background makes it really hard to read.

  • @rubenverster250
    @rubenverster250 ปีที่แล้ว +1

    Super nice interview questions :)

  • @ДиванныйМонстр-ъ8с
    @ДиванныйМонстр-ъ8с ปีที่แล้ว

    Amazing course. Thank you sooooooo much for publishing it. Very usefull.

  • @ismailmadeit
    @ismailmadeit ปีที่แล้ว +1

    Thank you Brandon ❤

  • @79Nardo
    @79Nardo 7 หลายเดือนก่อน

    Nice explanation! thanks :)

  • @ASDevelopersTutorials
    @ASDevelopersTutorials ปีที่แล้ว

    Thanks for this !! Very informative

  • @Khal_Rheg0
    @Khal_Rheg0 10 หลายเดือนก่อน

    Great video, thanks!

  • @paras.developer
    @paras.developer ปีที่แล้ว +1

    great video about security information

  • @TopsecretArtpc
    @TopsecretArtpc 9 หลายเดือนก่อน

    The last could be IDOR i mean we can use anothers user ID or others user email, btw learning about JS security

  • @i_am_dumb1070
    @i_am_dumb1070 ปีที่แล้ว +1

    Please make a similar video for solidity . I would say it would help if fcc can upload the famous Secureum Bootcamp for Smart Contract Security Auditing...... it would be very beneficial 🙏

  • @soumadip_banerjee
    @soumadip_banerjee ปีที่แล้ว +2

    Short n sweet! ❤

  • @WebWonders1
    @WebWonders1 ปีที่แล้ว

    Awsome keep the serious long please

  • @FeFeronkaMetallica
    @FeFeronkaMetallica ปีที่แล้ว +1

    Damn this was a cool video. The === surprised me

  • @SASA_maxillo
    @SASA_maxillo 4 หลายเดือนก่อน +1

    for the first one, an attacker can enter a https link which links to his unsafe website and then execute code, isn't that unsafe too?

    • @OS-wp5ew
      @OS-wp5ew 2 หลายเดือนก่อน +1

      Yes , Open redirect vulnerability

  • @Teardrop-u4z
    @Teardrop-u4z ปีที่แล้ว

    thanks man! you are good

  • @FeFeronkaMetallica
    @FeFeronkaMetallica ปีที่แล้ว

    Can we get more of these? Does Brandon has a channell?

  • @sosolowkey9318
    @sosolowkey9318 ปีที่แล้ว

    Can you guys do a RPA Development Tutorial?

  • @jdmayfield88
    @jdmayfield88 10 หลายเดือนก่อน

    Nice. Thank you for that. Can you do a vid on incorporating 2FA/MFA? Preferably something you can do for free with only something you control. I.E. no dependancy on servers you don't control.

  • @OnurKAFALI
    @OnurKAFALI ปีที่แล้ว +3

    You re all stars

  • @dipayancodes
    @dipayancodes ปีที่แล้ว

    Branden teaching Brendan's language 🎉

  • @LoneWolfCodingProfessional
    @LoneWolfCodingProfessional ปีที่แล้ว +2

    what about server side validation?
    since client side is exposed to end user

    • @iamashwincherian
      @iamashwincherian ปีที่แล้ว +1

      Yes, server side validation should be there no matter what. But there will still be vulnerabilities like SQL injections if not handled properly

  • @s.p.sanjay4253
    @s.p.sanjay4253 ปีที่แล้ว

    Please launch a internet of things course

  • @nullcarry6893
    @nullcarry6893 ปีที่แล้ว

    Vue doesn’t have this issue because it prescribes a router for you to use that has param / query sanitization built in.

  • @krispern
    @krispern ปีที่แล้ว

    19:07 Number 8 is missing the intro/explanation part

  • @toyin5522
    @toyin5522 ปีที่แล้ว +1

    Timing attacks make sense

  • @captainalpha4853
    @captainalpha4853 ปีที่แล้ว

    In 14:35, in this case won't we get an error before even entering the find method? because the request's body is in JSON format but the username is an object that can't be inserted into the request's body.

  • @aboutaline3423
    @aboutaline3423 ปีที่แล้ว +1

    Great tutorial, but most of vulnerabilities you've talked about are not really vulnerabilities, this video should be renamed to some bug you may have in your project

  • @Mari_Selalu_Berbuat_Kebaikan
    @Mari_Selalu_Berbuat_Kebaikan 8 หลายเดือนก่อน

    Let's always do alot of good ❤️

  • @adeni4359
    @adeni4359 ปีที่แล้ว +1

    Does he have a TH-cam channel?

  • @As74ful
    @As74ful ปีที่แล้ว +3

    what the heck is that hand in the thumbnail of this video

  • @Hardwork012
    @Hardwork012 ปีที่แล้ว +3

    Please upload android development full course using kotlin

  • @kephas-media
    @kephas-media 8 หลายเดือนก่อน

    I heard search Param, saw redirect and started laughing 😂😂😂

  • @mynameisrezza
    @mynameisrezza ปีที่แล้ว

    Gold Bro!

  • @brandon_wallace
    @brandon_wallace ปีที่แล้ว

    Very nice.

  • @NewPath-w9h
    @NewPath-w9h ปีที่แล้ว

    Are these videos allowed to download?

  • @sitter2207
    @sitter2207 ปีที่แล้ว

    I don't get the first vulnerability. Since when is just clicking links dangerous ? What can a malicious js code running in browser do at worst ?

    • @treebucket5382
      @treebucket5382 ปีที่แล้ว +1

      Lookup same-origin policy, it can allow the javascript to be run as if you were on the host website, potentially leaking tokens, cookies etc.

  • @ahmed.systems
    @ahmed.systems ปีที่แล้ว +12

    This guy is literally Ryan from The Office

    • @richardprakash4630
      @richardprakash4630 ปีที่แล้ว

      RYAN STARTED THE FIRE 🔥🔥😂

    • @ahmed.systems
      @ahmed.systems ปีที่แล้ว +2

      @@richardprakash4630 Fire Guy *insert kevin giggle*

  • @anisdragan
    @anisdragan ปีที่แล้ว

    About the Mass Assignment Attack, it seems like you've only made it more challenging for the attacker without completely preventing the attack. This is because req.body.username can still contain any value. I believe it's necessary to validate the data you receive in addition to the measures you've taken to enhance security.

    • @jnath
      @jnath ปีที่แล้ว

      Of course validation is implied. The point is to prevent user from assigning data to a parameter that they're not supposed to.

  • @hack_crack
    @hack_crack ปีที่แล้ว

    Excelente

  • @trysetyo
    @trysetyo ปีที่แล้ว

    great euy

  • @pythonxsecurity8287
    @pythonxsecurity8287 ปีที่แล้ว +2

    it's easy af

  • @AveN7ers
    @AveN7ers ปีที่แล้ว

    Bioshock Infinite ❤

  • @ayushdhokriya6488
    @ayushdhokriya6488 ปีที่แล้ว

    i found 1'

  • @samgarg5228
    @samgarg5228 ปีที่แล้ว

    "Do not trust the client"

  • @Natures_Doctor
    @Natures_Doctor ปีที่แล้ว +1

    👍👍

  • @the.abdullah.nouman
    @the.abdullah.nouman ปีที่แล้ว

    2 hours

  • @rohulahadi3990
    @rohulahadi3990 ปีที่แล้ว

    🔥🤩

  • @pablomatos1707
    @pablomatos1707 ปีที่แล้ว

    Brasil em peso😂

  • @mrcoded7454
    @mrcoded7454 ปีที่แล้ว +1

    First comment yay

  • @massobu
    @massobu ปีที่แล้ว

    waw :000

  • @ashwinkhasa
    @ashwinkhasa ปีที่แล้ว

    First 🥇

  • @sadaharu_tr
    @sadaharu_tr ปีที่แล้ว

    I mean..... Angular exists for a reason..