- Видео 132
- Просмотров 414 196
Z. Cliffe Schreuders
Добавлен 18 дек 2014
Mostly videos about computer security: including lectures I give at Leeds Beckett University. I am a computer security researcher, software engineer, and free culture advocate. Obligatory: like and subscribe!
Cross-site Request Forgery (CSRF) Attack Demo
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org.
The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Просмотров: 16 245
Видео
Cross-site Request Forgery (CSRF) Examples
Просмотров 4253 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cross-site Request Forgery (CSRF) Prevention and Defence
Просмотров 5243 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Ambient Authority
Просмотров 5693 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
The Confused Deputy Problem
Просмотров 1,8 тыс.3 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cross-site Request Forgery (CSRF)
Просмотров 4543 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Injection Attacks: Prevention
Просмотров 3763 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Injection Attacks: SQL Injection (SQLi)
Просмотров 5373 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Injection Attacks: OS Command Injection
Просмотров 7623 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Injection Attacks
Просмотров 3873 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cross-Site Scripting (XSS): Demo
Просмотров 7193 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cross-Site Scripting (XSS): Part 2 Prevention
Просмотров 4193 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cross-Site Scripting (XSS): Part 1 Types of XSS
Просмотров 5993 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cookies, Sessions, and Security Part 3: Defences
Просмотров 4373 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cookies, Sessions, and Security Part 2: Sessions and Attacks on Session Management
Просмотров 6553 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cookies, Sessions, and Security Part 1: Cookies
Просмотров 6033 года назад
Cookies, Sessions, and Security Part 1: Cookies
Open source development and security practices
Просмотров 4203 года назад
Open source development and security practices
Threat modeling using STRIDE and Attack Trees
Просмотров 33 тыс.3 года назад
Threat modeling using STRIDE and Attack Trees
STRIDE Threat Modeling using Microsoft Threat Modeling Tool
Просмотров 66 тыс.3 года назад
STRIDE Threat Modeling using Microsoft Threat Modeling Tool
Rule-based Sandboxing and Mandatory Access Controls
Просмотров 4033 года назад
Rule-based Sandboxing and Mandatory Access Controls
Writing Exploits (Buffer Overflows Part 2)
Просмотров 3203 года назад
Writing Exploits (Buffer Overflows Part 2)
Overflows and Stack Smashing Buffer Overflows
Просмотров 7093 года назад
Overflows and Stack Smashing Buffer Overflows
Studying Cyber Security at Leeds Beckett University: including a look at Hacktivity and Hackerbot
Просмотров 4153 года назад
Studying Cyber Security at Leeds Beckett University: including a look at Hacktivity and Hackerbot
thanks you very much!!!
I have seen some strange validation error messages in the message pane
Had to watch for a collage class, nice information here. Thank you for sharing. And yes i remember 98 SE to XP.
i really like your work sohil patel
Thankz 4 EDU...
Ta qifsha mikrofonin
good video
how to identify functions if verbose logging and log calls notation not known? (has been changed)
how to export after saving the lib file ? user modifications are ignored , hwo ?
Great video. Explained it very well and simply
great video! keep it up
Thanks! Helped me.
But how to sanitize it then ?
😇👍
Thanks!
I tried this on WSL2 and with C++ but I can't get it to work. It still outputs the correct code. If I enter LD_PRELOAD=$PWD/preload.so ./main nothing changes.
Thanks!
gr8 video bro inshallah
Wow, just a question, who uses a GET request nowadays to change passwords haha, are you stoned or what???
It's true that using a GET request to change passwords is not secure practice. Developers typically use POST requests for sensitive actions like changing passwords to ensure data confidentiality. However, hackers can exploit vulnerabilities by crafting HTML code with hidden inputs to alter passwords via auto-submit mechanisms. When users inadvertently access malicious URLs, their passwords could indeed be changed without their knowledge, highlighting the importance of secure coding practices and user awareness.
Are you? Did you watch the video.
Do you believe that STRIDE is the most efficient threat modeling framework? The framework seems a little vague to me, even though I know that large corporations use it, I even work in one... Apart from the fact that the tool contains some bugs, it lacks stencils for the real world, I would rate it as 4/10 the framework and the tool, that's being generous. but your video is great :D
Amazing content 👍👍
Hi I want to know how to set up to search only lowercases and to put the Len of the password. let us say the password is 11 characters long and only have lowercases, how can I type that on Jhonny to make it work
It is really very interesting but you could put yourself in the top-right corner of the screen to let people see whole commands you entered
subbed! your stuff is great, really helping me brush up for a sec architect interview
Amazing stuff Cliffe! Is there a possibility that we can get the copy of your presentation? It would be helpful to note down those points
Got it 👍 Excellent video. For epochs, use rsync -flags source/ destinationX+0/ For diffs and increments, use rsync -flags source/ --compare-dest= {'X+0', 'X+1', . . . 'x+N'} destinationX+N+1/ Kindest regards, neighbours and friends.
Hi @ZCliffeSchreuders, how can I add a missing element to the application. I do not have the Human User element and need it
thats good dude
Great explanation, thanks!
thank pro
I am working on this subject, currently. I would like to know how create a lab to prove this subject. Any ideas ? thanks!
that's very nice thank you.
Very informative video. Thank you
Nice job, I’ve been watching quite a few of your videos. Comprehensive and quick!
Thank you :) was very helpful
What is the previous video called where you talk about salts ant etc? Mentioned at the beginning of the video.
Good presentation mate this really helped me so much
Just about to sit my security+ exam and this video helped a lot to explain my weak areas (SSO, LDAP, SAML, etc)
how did u get .so file
Hey I have a school assessment on threat modelling,can you help me out pls,as I just start this class and can't do it myself
Appreciated
Thank you ! +1
great video! question: what is an easy way to spot vulnerabilities by looking at the treat property screen? is that the title? For instance, "weak credential storage" that is pretty easy to determine it as vulnerability and the threat would be someone (hacker) tampering with such information. But in the case of the title "elevation by changing the execution flow /etc/passwd" what would be the vulnerability?
How to delete it
00:01 fuzzing
01:03 virus 02:18 worms 04:27 trojan 07:28 rootkit 08:08 zombies and botnets 09:09 spyware, adware 10:26 shareware and rogue antivurus ~ 11:30 ransomware 15:05 drive-by download 18:20 banking trojans
00:24 so
instead of csrf tokens, will having user enter current password on these forms safe?
Helpful video, great work
Wow the first person who actually knows what ldap is