Z. Cliffe Schreuders
Z. Cliffe Schreuders
  • Видео 132
  • Просмотров 414 196
Cross-site Request Forgery (CSRF) Attack Demo
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org.
The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Просмотров: 16 245

Видео

Cross-site Request Forgery (CSRF) Examples
Просмотров 4253 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cross-site Request Forgery (CSRF) Prevention and Defence
Просмотров 5243 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Ambient Authority
Просмотров 5693 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
The Confused Deputy Problem
Просмотров 1,8 тыс.3 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cross-site Request Forgery (CSRF)
Просмотров 4543 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Injection Attacks: Prevention
Просмотров 3763 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Injection Attacks: SQL Injection (SQLi)
Просмотров 5373 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Injection Attacks: OS Command Injection
Просмотров 7623 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Injection Attacks
Просмотров 3873 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cross-Site Scripting (XSS): Demo
Просмотров 7193 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cross-Site Scripting (XSS): Part 2 Prevention
Просмотров 4193 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cross-Site Scripting (XSS): Part 1 Types of XSS
Просмотров 5993 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cookies, Sessions, and Security Part 3: Defences
Просмотров 4373 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cookies, Sessions, and Security Part 2: Sessions and Attacks on Session Management
Просмотров 6553 года назад
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org. The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
Cookies, Sessions, and Security Part 1: Cookies
Просмотров 6033 года назад
Cookies, Sessions, and Security Part 1: Cookies
Introduction to Web Security
Просмотров 1,2 тыс.3 года назад
Introduction to Web Security
Open source development and security practices
Просмотров 4203 года назад
Open source development and security practices
Secure Development Lifecycles
Просмотров 4443 года назад
Secure Development Lifecycles
Secure Design Principles
Просмотров 4,9 тыс.3 года назад
Secure Design Principles
Threat modeling using STRIDE and Attack Trees
Просмотров 33 тыс.3 года назад
Threat modeling using STRIDE and Attack Trees
STRIDE Threat Modeling using Microsoft Threat Modeling Tool
Просмотров 66 тыс.3 года назад
STRIDE Threat Modeling using Microsoft Threat Modeling Tool
Rule-based Sandboxing and Mandatory Access Controls
Просмотров 4033 года назад
Rule-based Sandboxing and Mandatory Access Controls
Writing Exploits (Buffer Overflows Part 2)
Просмотров 3203 года назад
Writing Exploits (Buffer Overflows Part 2)
Overflows and Stack Smashing Buffer Overflows
Просмотров 7093 года назад
Overflows and Stack Smashing Buffer Overflows
Memory Management Vulnerabilities
Просмотров 2143 года назад
Memory Management Vulnerabilities
Sandboxing and Virtualisation
Просмотров 3743 года назад
Sandboxing and Virtualisation
Fuzzing Part 2
Просмотров 1943 года назад
Fuzzing Part 2
Fuzzing Part 1
Просмотров 2633 года назад
Fuzzing Part 1
Studying Cyber Security at Leeds Beckett University: including a look at Hacktivity and Hackerbot
Просмотров 4153 года назад
Studying Cyber Security at Leeds Beckett University: including a look at Hacktivity and Hackerbot

Комментарии

  • @hunglethai8075
    @hunglethai8075 26 дней назад

    thanks you very much!!!

  • @satyajitbhuyan1723
    @satyajitbhuyan1723 2 месяца назад

    I have seen some strange validation error messages in the message pane

  • @bennyrentschler4212
    @bennyrentschler4212 2 месяца назад

    Had to watch for a collage class, nice information here. Thank you for sharing. And yes i remember 98 SE to XP.

  • @AhmadErs-k5j
    @AhmadErs-k5j 3 месяца назад

    i really like your work sohil patel

  • @fancybeb
    @fancybeb 4 месяца назад

    Thankz 4 EDU...

  • @aridonkrasniqi5538
    @aridonkrasniqi5538 4 месяца назад

    Ta qifsha mikrofonin

  • @JP-Predictions
    @JP-Predictions 4 месяца назад

    good video

  • @sputnikbreeze5590
    @sputnikbreeze5590 6 месяцев назад

    how to identify functions if verbose logging and log calls notation not known? (has been changed)

  • @duvijan
    @duvijan 6 месяцев назад

    how to export after saving the lib file ? user modifications are ignored , hwo ?

  • @gregdemko5732
    @gregdemko5732 9 месяцев назад

    Great video. Explained it very well and simply

  • @jadex9733
    @jadex9733 9 месяцев назад

    great video! keep it up

  • @vadim3
    @vadim3 10 месяцев назад

    Thanks! Helped me.

  • @andrejesus.
    @andrejesus. 10 месяцев назад

    But how to sanitize it then ?

  • @abohilmee6750
    @abohilmee6750 11 месяцев назад

    😇👍

  • @huddy-o9g
    @huddy-o9g Год назад

    Thanks!

  • @Sohneg
    @Sohneg Год назад

    I tried this on WSL2 and with C++ but I can't get it to work. It still outputs the correct code. If I enter LD_PRELOAD=$PWD/preload.so ./main nothing changes.

  • @travisv6431
    @travisv6431 Год назад

    Thanks!

  • @grain-bi8iu
    @grain-bi8iu Год назад

    gr8 video bro inshallah

  • @gavriel_adi
    @gavriel_adi Год назад

    Wow, just a question, who uses a GET request nowadays to change passwords haha, are you stoned or what???

    • @X21E0dayAbysiniya
      @X21E0dayAbysiniya 11 месяцев назад

      It's true that using a GET request to change passwords is not secure practice. Developers typically use POST requests for sensitive actions like changing passwords to ensure data confidentiality. However, hackers can exploit vulnerabilities by crafting HTML code with hidden inputs to alter passwords via auto-submit mechanisms. When users inadvertently access malicious URLs, their passwords could indeed be changed without their knowledge, highlighting the importance of secure coding practices and user awareness.

    • @Jesse_Johnson
      @Jesse_Johnson 7 месяцев назад

      Are you? Did you watch the video.

  • @lucassilva-qk4iw
    @lucassilva-qk4iw Год назад

    Do you believe that STRIDE is the most efficient threat modeling framework? The framework seems a little vague to me, even though I know that large corporations use it, I even work in one... Apart from the fact that the tool contains some bugs, it lacks stencils for the real world, I would rate it as 4/10 the framework and the tool, that's being generous. but your video is great :D

  • @SecurityMadeSimple
    @SecurityMadeSimple Год назад

    Amazing content 👍👍

  • @EDW1NCM2008
    @EDW1NCM2008 Год назад

    Hi I want to know how to set up to search only lowercases and to put the Len of the password. let us say the password is 11 characters long and only have lowercases, how can I type that on Jhonny to make it work

  • @PCMrTrickster
    @PCMrTrickster Год назад

    It is really very interesting but you could put yourself in the top-right corner of the screen to let people see whole commands you entered

  • @manfrombritain6816
    @manfrombritain6816 Год назад

    subbed! your stuff is great, really helping me brush up for a sec architect interview

  • @suhassk100
    @suhassk100 Год назад

    Amazing stuff Cliffe! Is there a possibility that we can get the copy of your presentation? It would be helpful to note down those points

  • @chromerims
    @chromerims Год назад

    Got it 👍 Excellent video. For epochs, use rsync -flags source/ destinationX+0/ For diffs and increments, use rsync -flags source/ --compare-dest= {'X+0', 'X+1', . . . 'x+N'} destinationX+N+1/ Kindest regards, neighbours and friends.

  • @hlalanathimadotyeni2253
    @hlalanathimadotyeni2253 Год назад

    Hi @ZCliffeSchreuders, how can I add a missing element to the application. I do not have the Human User element and need it

  • @stoneeedman
    @stoneeedman Год назад

    thats good dude

  • @bartmax15
    @bartmax15 Год назад

    Great explanation, thanks!

  • @kijutonett
    @kijutonett Год назад

    thank pro

  • @edzioauditore8013
    @edzioauditore8013 Год назад

    I am working on this subject, currently. I would like to know how create a lab to prove this subject. Any ideas ? thanks!

  • @serhatkoroglu6708
    @serhatkoroglu6708 Год назад

    that's very nice thank you.

  • @redblood-f7f
    @redblood-f7f Год назад

    Very informative video. Thank you

  • @nickie17301
    @nickie17301 Год назад

    Nice job, I’ve been watching quite a few of your videos. Comprehensive and quick!

  • @EliotRecords
    @EliotRecords 2 года назад

    Thank you :) was very helpful

  • @0797cjm
    @0797cjm 2 года назад

    What is the previous video called where you talk about salts ant etc? Mentioned at the beginning of the video.

  • @shayjay1112
    @shayjay1112 2 года назад

    Good presentation mate this really helped me so much

  • @mantle6311
    @mantle6311 2 года назад

    Just about to sit my security+ exam and this video helped a lot to explain my weak areas (SSO, LDAP, SAML, etc)

  • @michallebel3236
    @michallebel3236 2 года назад

    how did u get .so file

  • @sundayawo8767
    @sundayawo8767 2 года назад

    Hey I have a school assessment on threat modelling,can you help me out pls,as I just start this class and can't do it myself

  • @lancemarchetti8673
    @lancemarchetti8673 2 года назад

    Appreciated

  • @redbeardjunior
    @redbeardjunior 2 года назад

    Thank you ! +1

  • @rumildaolik4905
    @rumildaolik4905 2 года назад

    great video! question: what is an easy way to spot vulnerabilities by looking at the treat property screen? is that the title? For instance, "weak credential storage" that is pretty easy to determine it as vulnerability and the threat would be someone (hacker) tampering with such information. But in the case of the title "elevation by changing the execution flow /etc/passwd" what would be the vulnerability?

  • @JoKeRff-jg5eq
    @JoKeRff-jg5eq 2 года назад

    How to delete it

  • @domaincontroller
    @domaincontroller 2 года назад

    00:01 fuzzing

  • @domaincontroller
    @domaincontroller 2 года назад

    01:03 virus 02:18 worms 04:27 trojan 07:28 rootkit 08:08 zombies and botnets 09:09 spyware, adware 10:26 shareware and rogue antivurus ~ 11:30 ransomware 15:05 drive-by download 18:20 banking trojans

  • @domaincontroller
    @domaincontroller 2 года назад

    00:24 so

  • @moosegoose1282
    @moosegoose1282 2 года назад

    instead of csrf tokens, will having user enter current password on these forms safe?

  • @balintmucsanyi6322
    @balintmucsanyi6322 2 года назад

    Helpful video, great work

  • @onetwo234
    @onetwo234 2 года назад

    Wow the first person who actually knows what ldap is