Application Security - Understanding, Exploiting and Defending against Top Web Vulnerabilities

Поділитися
Вставка
  • Опубліковано 29 гру 2024

КОМЕНТАРІ • 23

  • @okyeabuddyguy
    @okyeabuddyguy 9 років тому +2

    Regarding the question on amplification... There are numerous protocols that have an amplification factor such as DNS, NTP, Chargen, etc. These protocols have functionality whereby a user can craft a request packet, that generates a reply which is several factors larger. NTP may have the largest amplification factor currently known. An attack looks like:
    - botnet or malicious individual/group send NTP request to a bunch of Open NTP servers on the internet that are vulnerable to this amplification technique
    - The request packet has a spoofed source (the victim)
    - The NTP servers receive the request, generate the significantly LARGER response packet, and fire it off to the spoofed victim
    - The victim receives the traffic and network services are impacted due to the size of each packet and sheer number of them
    It is one of the most effective and popular DoS strategies in use today and very common in the wild.
    Defensive strategies are a combination of hardening DNS, NTP, chargen, etc service, not placing them on the web, upgrading to implementations that are not vulnerable to such amplification weaknesses, and utilizing anycast routing services such as cloudflare.

  • @1anre
    @1anre Рік тому

    In 2023, watching this was this very informative for me.

  • @domaincontroller
    @domaincontroller 4 роки тому

    07:46 Proxy 11:08 XXS, Javascript or HTML Injection

  • @likmijnreet4542
    @likmijnreet4542 7 років тому

    Was so happy to find a tech talk by a native English speaker, only to find out he slurs his words to the point he's virtually incomprehensible

  • @abdulhameed-vo7jq
    @abdulhameed-vo7jq 6 років тому +1

    Very informative, Thank you.

  • @WuddupDok
    @WuddupDok 9 років тому

    Fantastic! Thanks, Michael/CernerEng

  • @nh142891
    @nh142891 7 років тому

    Great job - as good as any in covering this in a practical way.

  • @rw4833
    @rw4833 8 років тому

    Clear and concise!

  • @ateeshdipankar5969
    @ateeshdipankar5969 10 років тому

    Very informative session..

  • @KanchanaRandika
    @KanchanaRandika 8 років тому

    Really interesting! Nice one.

  • @Rightly_Divided
    @Rightly_Divided 9 років тому

    Great video!
    Is HSTS the same as HTTPS everywhere plugin, or essentially the same thing?

    • @aatifshahdadable
      @aatifshahdadable 9 років тому +1

      SubliminalX7 HSTS is a Server Header that instructs the browser to always serve the content over HTTPS for every user of the site as opposed to a plugin which works for an individual user. In essence, HSTS and HTTPS everywhere both force the communication over HTTPS but the key difference is HSTS does it for the web application (one with the HSTS header set) only and HTTPS everywhere attempts to force usage of HTTPS for every website. Hope that helps.

    • @Rightly_Divided
      @Rightly_Divided 9 років тому +1

      muziklovershello That makes good sense. Thank you for that!

    • @a.n.7338
      @a.n.7338 5 років тому

      @@aatifshahdadable is there any video regarding exploiting vulnerability of maybe web or anything?

    • @aatifshahdadable
      @aatifshahdadable 5 років тому

      @@a.n.7338 yes ofcourse. You can check out many such videos on websites like security tube which is kinda okay for a beginner. Also check our owasp to learn more about exploiting web vulnerabilities. They have decent information in there. Good luck !

  • @lidongning1108
    @lidongning1108 8 років тому

    excellent video

  • @GuniMatthiasson
    @GuniMatthiasson 10 років тому

    Great talk!

  • @DermaJayaPutraWaruwu
    @DermaJayaPutraWaruwu 9 років тому

    great video

  • @MrRohitxx
    @MrRohitxx 8 років тому

    very much interesting....thank you so much.

  • @iamtheoutsider
    @iamtheoutsider 10 років тому

    Very informative. Thanks.

  • @MrPandycane
    @MrPandycane 10 років тому

    I appreciate this video.

  • @myyou1
    @myyou1 9 років тому

    Thank You!