HTTP Strict Transport Security (HSTS) and TLS Stripping Explained

Поділитися
Вставка
  • Опубліковано 23 жов 2024

КОМЕНТАРІ • 51

  • @puneetkulkarni2416
    @puneetkulkarni2416 2 роки тому +8

    I was in an interview this morning. And all we discussed was around HSTS and SSL. I must say all Cyber Security folks should be aware of your channel. If I had watched this video earlier, I would rock the interview. Great videos mate!!
    Keep up the good work!!
    You are making the world better place.

    • @neuodev
      @neuodev Рік тому

      Did you get the job :)?

  • @6s6
    @6s6 4 роки тому +3

    Fantastic video. As a professional software engineer, I appreciate having these concise videos on security to reference when I forget about concepts (particularly in security).
    Seeing as you're a software engineer as well, I would appreciate more videos on cybersecurity from a software engineering perspective e.g. How to properly secure Docker containers, tips on securing my Nginx server that's facing the public Internet, etc.

  • @Girry_
    @Girry_ 4 роки тому +4

    Guy must be really fun to interact with. Great explainer!

  • @veerendrasaikumar1008
    @veerendrasaikumar1008 3 роки тому

    SSL stripping was a great example to start with, which explains why do we need HSTS in the first place. Awesome video, Thank you!

  • @harshgupta9494
    @harshgupta9494 4 роки тому +1

    really good explanation. After going through the video, i was able to identify how HSTS works for the first time and how MITM attack works which i wasn't able to understand after looking at other people's video

    • @hnasr
      @hnasr  4 роки тому

      Harsh Gupta thanks ! Happy the content could help. Have a great day 😊

  • @MM-by6qq
    @MM-by6qq 2 роки тому

    sir I found your channel today, I have exam tomorrow and you helped me..you are talented in explaining thank you so much! +1sub

  • @binaryblog
    @binaryblog 4 роки тому +8

    Your videos are very addicted :) Imo 80% tech videos on YT are garbage, another 15 are good and the last 5% are outstanding. Your videos are definitely in these 5% Keep up the good work sir!

    • @hnasr
      @hnasr  4 роки тому +3

      binaryblog thank you BinaryBlog!! Comment made my morning. So happy I can provide value 😊

  • @Deekudla
    @Deekudla 2 роки тому

    Great videos. Looking forward for some videos on "VPN" security related issues and mitigations around it.

  • @fb_a
    @fb_a 4 роки тому +1

    I just checked this channel content after seeing this video. This channel is super amazing 💥💥.

    • @hnasr
      @hnasr  4 роки тому

      🥳🥳🥳

  • @zaheerkhan8097
    @zaheerkhan8097 4 роки тому +1

    Brilliiant Hussein !. Keep up the good work. As told by @binaryblog your videos are very addictive coz they explain in detail with no doubts hence making them very catchy.

    • @hnasr
      @hnasr  4 роки тому

      Zaheer Khan thank you Zaheer! Can you share rhe binary blog link?

    • @zaheerkhan8097
      @zaheerkhan8097 4 роки тому

      @@hnasr its just below my comment

  • @tommasocanepa587
    @tommasocanepa587 4 роки тому +3

    Neat and clear! Really informative, thank you sir!

    • @hnasr
      @hnasr  4 роки тому +1

      🙏🙏

  • @hessamzahedi5413
    @hessamzahedi5413 2 роки тому

    Great video! quick question, regarding HTTPS interception attacks, what would be the best solution, HSTS or Certificate Pinning. -thanks

    • @hnasr
      @hnasr  2 роки тому +1

      I would choose certificate pinning Hessam. HSTS has still small window of attack.

  • @jatinjindalj
    @jatinjindalj 3 роки тому

    Keep up the good work Husain. I am learning a lot from your videos. Cheers!

  • @codyj07161989
    @codyj07161989 2 роки тому

    Great video with clear explanation 10/10. thank you for making this!

  • @ishandhar2851
    @ishandhar2851 4 роки тому +1

    You keep the interest in IT alive 👍👍

  • @kaustuvkchattopadhyay8566
    @kaustuvkchattopadhyay8566 3 роки тому

    Love your enthusiasm. Thanks

  • @anshikagupta4931
    @anshikagupta4931 3 роки тому

    This is a really cool video. I always heard this term bounce around in office, now I know what it meansssss

  • @Rocky-g2i
    @Rocky-g2i 24 дні тому

    Let's say you create a new website and a client connects to that website for the first time does it mean for the first connection the client will make a http request first then switch to https , and after the website has been added to the hsts list will all the types of web browsers for every client across the world have that updated list or will it just affect only the client that connected to that website?

  • @ongayijohnian8787
    @ongayijohnian8787 5 місяців тому

    Slim Shady's Starbucks took a hit after this video

  • @brod515
    @brod515 3 роки тому +1

    I don't understand why the user-agent/browser does not always just try connect to https regardles, to see if it exists first.

    • @softwarelivre2389
      @softwarelivre2389 3 роки тому

      I agree! That should be the default. HTTPS first, HTTP second! On Firefox, we can enable the HTTPS-Only Mode, which will show an alert before accessing anything through HTTP. Pretty neat!

  • @neadlead2621
    @neadlead2621 Рік тому

    ssl striping is not what u said realy , it's when the client send a request as https but the attacker is in the middel and downgrade it saying that the server only use http , in the case that u mentioned the user in the begining send http which is simple for the attacker no need for striping he will respond instead of the server with an http resp. but thanks for the explanation

  • @whtht
    @whtht 3 роки тому

    good explaining

  • @FuzzyCloud
    @FuzzyCloud 4 роки тому +1

    Thank you!

    • @hnasr
      @hnasr  4 роки тому

      You're welcome!

  • @jlai383
    @jlai383 4 роки тому

    love this content. Very authentic and informative.

    • @hnasr
      @hnasr  4 роки тому

      J Lai thanks J Lai 😊 appreciate your comment

  • @fxstreamer238
    @fxstreamer238 2 роки тому

    when i type my banks official address with https, it goes first to http and shows insecure connection then redirects to https. I find that very disturbing and strange. why does that happen? is it because they registered their dns with http first? im using google dns

  • @mwir_99
    @mwir_99 3 роки тому

    Hi Hussein, what happens if you call an HTTP site, even the site is on the HSTS list? What's the answer?

    • @hnasr
      @hnasr  3 роки тому

      The browser will force HTTPS I believe, will need to check.

  • @AmineOnline
    @AmineOnline 4 роки тому

    NICE

  • @dezuzdazriel4218
    @dezuzdazriel4218 4 роки тому

    Hey, how do i get that kind of a mouse cursor with the trail like that? please reply =)

    • @hnasr
      @hnasr  4 роки тому +1

      Hello! oh thats just the google slides cursor not mac or windows. Open Google Slides, create a slide , go to presentation mode and turn on "pointer"

  • @doomznyt
    @doomznyt 4 роки тому

    well its hard to sniff to someone now! unless you have the power to connect to the main network switch! or create your own evil twin! the attack vector is hard!

    • @hnasr
      @hnasr  4 роки тому +1

      Correct, its very hard to perform MITM if the attacker is not in the line of sight.

    • @doomznyt
      @doomznyt 4 роки тому

      @@hnasr hi hussein, subscribing to your channel, more TUTS to come.. stay safe

  • @StephenRayner
    @StephenRayner 4 роки тому

    subbed

  • @SADOKSADOK
    @SADOKSADOK 2 роки тому

    man make some schema please, is the purpose videos