This is the only series that gives some real-world context for these concepts. Thank you for taking the time and effort because there's a lot of us stressing over this . . . not projecting or anything though lol
@britox.6216
2 жыл бұрын
Professor, I think you give the best real world examples. That's honestly the only reason I am understanding any of this as complete noob
@junliu2065
11 ай бұрын
This is the most clear and simple instruction regarding S+. I am taking multiple courses for S+ through different resources. Some of them are really confusing by the way they organize their classes, I find myself always go back to the classes from Prof. Messer because so far this series is the most easy one to navigate.
@jim_tennant
Жыл бұрын
Was studying this morning and this video was immediately followed up by an ad for Capital One and I think that that’s the best thing ever haha
@dirtyd33dz84
Жыл бұрын
Another great video Prof! I've been reading the book then coming here to fully understand what I just read in the book. Also, kind of funny thing. After your capital one example, the ad before the next video was a capital one ad/commercial 😅
@nah3375
Жыл бұрын
that's halarious
@Frawkesish
Жыл бұрын
Wait hold up... That is a looooot of data in one spot Capitol One! They really need to regulate how/where/WHEN data should be stored by companies.. 14years of data in one spot is just irresponsible imo..
@devinrobertson5251
8 ай бұрын
I was so confused cause I was just looking at a captial one video hahaha
@markivashinko9156
3 жыл бұрын
Im trying to understand how the actual request is created when performing this attack. Is this done on the site that the attacker sends as a hyper link?
@jonk4410
2 жыл бұрын
The attacker sends a hyperlink to the victim that has an embedded request in the URL. The browser then uses the victim's privileges to execute requests on the attackers behalf. The site itself has to be vulnerable to this type of attack
@jordanalex8674
3 жыл бұрын
Professor, would a CSRF attack be similar to a reflected XSS attack? Because you are using a crafted link or crafted code to perform an arbitrary action?
@TheToiletOnFire
2 жыл бұрын
I had the same question! Like, are sidejacking and session riding just different terms for essentially the same thing?
@Bryant19999
Жыл бұрын
What the difference between Directory Traversal and Server-side request forgery?
@Anw120
5 ай бұрын
Can’t we get compensation from Capital One for that breach?
@Tarun_Kotagiri
3 жыл бұрын
Awesome...... Everything you need to know..... and clear to the point..as always...!! Love your work prefessor....
@LoganMabry-c6f
Жыл бұрын
Thanks for the helpful video man!
@rrx557
Жыл бұрын
a SSRF can also be a type of injection attack right?
Пікірлер: 19