No video

Cookie Stealing - Computerphile

  Рет қаралды 1,180,672

Computerphile

Computerphile

8 жыл бұрын

Cookie Monster isn't the only one fond of cookies - thieves on the Internet are partial too. Dr Mike Pound demonstrates & explains the art of cookie stealing.
Follow the Cookie Trail: • Follow the Cookie Trai...
Cracking Websites with Cross Site Scripting: • Cracking Websites with...
Space Carving: • Space Carving - Comput...
Deep Learning: • Deep Learning - Comput...
Secure Web Browsing: • Secure Web Browsing - ...
Anti Counterfeiting & Conductive Inks: • Anti-Counterfeiting & ...
Object Oriented Programming: • Pong & Object Oriented...
Security of Data on Disk: • Security of Data on Di...
/ computerphile
/ computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

Пікірлер: 831
@stevensanders9219
@stevensanders9219 6 жыл бұрын
This guy has forgotten more about computers than I'll ever learn
@antoniajovita2676
@antoniajovita2676 3 жыл бұрын
Ppppppppp
@invalid9553
@invalid9553 3 жыл бұрын
@@antoniajovita2676 true story!
@insan8144
@insan8144 3 жыл бұрын
soo true rn
@HTWwpzIuqaObMt
@HTWwpzIuqaObMt 2 жыл бұрын
Im the 666th like wtf
@Ram_Mandir
@Ram_Mandir 10 ай бұрын
Nothing
@atmunn1
@atmunn1 7 жыл бұрын
This guy and Tom Scott are my 2 favorite people on Computerphile. I just wish Tom still made videos on here.
@lmiddleman
@lmiddleman 8 жыл бұрын
Shouldn't this video be called "Biscuit Nicking"?
@ChaosDivides
@ChaosDivides 8 жыл бұрын
What about Jaffa cakes?
@vonantero9458
@vonantero9458 8 жыл бұрын
Those are cakes. Nothing to do with anything mentioned here.
@ChaosDivides
@ChaosDivides 8 жыл бұрын
Exactly my point,
@jarmo_kiiski
@jarmo_kiiski 8 жыл бұрын
That would make sense.
@aliciabaumgartner1406
@aliciabaumgartner1406 8 жыл бұрын
Biccy pinching for Aussies.
@CRJessen
@CRJessen 8 жыл бұрын
Dr. Pound is really good. I want more videos from him.
@DarkOracleOfDeath
@DarkOracleOfDeath 6 жыл бұрын
I hate you guys. I have stuff to do, it's almost midnight and I keep on watching your so very interesting videos.
@isaaccool3183
@isaaccool3183 5 жыл бұрын
Try 3am
@connerbuxton3320
@connerbuxton3320 5 жыл бұрын
Isaac Cool try Saturday
@Dutch_G
@Dutch_G 5 жыл бұрын
Saaame
@tank3castaneda82
@tank3castaneda82 5 жыл бұрын
U just reminded me i have to work.
@Wouterferdinand
@Wouterferdinand 5 жыл бұрын
This..
@4pThorpy
@4pThorpy 8 жыл бұрын
When I explain session ID's to other people (who usually couldn't care less), I always explain it like this; There are "blind guards" to "doors" in a webpage. At the front of the website there's someone who asks for your secret password, you tell them the password and they give you a special badge with Braille on it. You walk into the website and when you feel like going to another "room" (page)...you walk up to the guard and they grope you and say "oh well...you MUST be that person or they wouldn't have let you in, so I'll show you the stuff that only you are suppose to see"......the problem is when someone else makes a copy of that badge...the guards can't tell the difference. Then I go on about cross-site scripting until they go cross-eyed and then I install the NoScript browser extension for them cause they said "I don't care "how" it works...just make it so they can't do it.
@whydontiknowthat
@whydontiknowthat 3 жыл бұрын
That’s a nice example!
@mistermuffin710
@mistermuffin710 8 жыл бұрын
I love these videos that you and Tom Scott do here on Computerphile with ways people can and do hack websites while providing LEGAL examples. I would really like it if you and Tom Scott do more of these.
@AndrewMeyer
@AndrewMeyer 8 жыл бұрын
11:37 It might be worth emphasising here that the reason this works is because the script specifically read the contents of the cookie and included it in the URL parameters for the image. Normally the browser will not send cookies intended for one site to a completely different one.
@Hasi29347
@Hasi29347 3 жыл бұрын
I agree, also worth mentioning little bit about CORS while he's at it.
@OwenMiller9825
@OwenMiller9825 Жыл бұрын
Thanks, I was confused about why this would be happening
@RetroFanEnt
@RetroFanEnt 8 жыл бұрын
If I knew of this channel earlier my web projects would've benefited from it so much!
@richardv519
@richardv519 7 жыл бұрын
Computerphile drinking game. Take a shot every time he tugs on his sweater.
@freestlz1
@freestlz1 5 жыл бұрын
Yes looks like it’s a tick.
@roseforeuropa
@roseforeuropa 5 жыл бұрын
@richard vicente Take a drink every time he ends a sentence or clause with "okay?"
@bunnybreaker
@bunnybreaker 8 жыл бұрын
I'm so out of the loop. I didn't even realise this was possible in this way.
@crypticmauler
@crypticmauler 8 жыл бұрын
please tell me you're not making websites for banks or shopping sites :-D
@bunnybreaker
@bunnybreaker 8 жыл бұрын
I just resigned after watching this video. Since I have resigned, the sites are not fixed. :P
@knucklesamidge
@knucklesamidge 8 жыл бұрын
+bunnybreaker You just need to escape all user input values before you print them to the view. That's it. That way it just comes out as text of the code. Just make sure you always do it at the view layer and never close to the DB or controller.
@TheHaughtsauce
@TheHaughtsauce 8 жыл бұрын
+knucklesamidge Absolutely correct. I made another comment about this mistake that was mentioned in the video. People aren't getting it.
@bunnybreaker
@bunnybreaker 8 жыл бұрын
Just to clarify, I was joking in my follow up comment. I haven't made websites in years. I'm more disappointed in myself for not knowing about this from an end user perspective, rather than as a web dev.
@2Cerealbox
@2Cerealbox 8 жыл бұрын
Upvote for that blog alone.
@moosetwin9023
@moosetwin9023 4 жыл бұрын
r/wrongplatform
@shantanudahiya5122
@shantanudahiya5122 4 жыл бұрын
r/ihavereddit
@AndrewMeyer
@AndrewMeyer 8 жыл бұрын
Might also be worth mentioning the HttpOnly flag for cookies here. I mean, obviously if you're vulnerable to XSS that's a serious problem regardless of what other security measures you've taken to protect users, but at least with HttpOnly set the JavaScript won't be able to steal cookies.
@mohamedhabas7391
@mohamedhabas7391 Жыл бұрын
Thank you for always providing clear content Mike
@pcpmtiservicos9855
@pcpmtiservicos9855 4 жыл бұрын
Great explanation about this issue. Thank you very much.
@ghelyar
@ghelyar 8 жыл бұрын
For anyone thinking about pinning an IP address to a cookie, don't. Not only does it change if you move to new wifi network, it changes if you move between wifi and mobile, if you move between cell towers, if you're on public transport which offers free wifi and some ISPs even use a different IP address for every request (albeit usually South East Asian dial up connections). I've had people complain that they couldn't log in to a website before because their IP address changed between submitting a login form and getting the response back. Also, if you really want to secure yourself from SQL injection you should use prepared statements, ideally with stored procedures, and never adjust the base query at all. Escaping is not generally good enough to stop more advanced attacks.
@user-nl5hj4dy7y
@user-nl5hj4dy7y 8 жыл бұрын
Don't get ghostery... It's owned by ad targeting companies.
@Frosty-oj6hw
@Frosty-oj6hw 8 жыл бұрын
Get Privacy Badger, it's made by the EFF and stops tracking of 3rd party cookies.
@addLDN
@addLDN 8 жыл бұрын
its a browser extension. If you click on 'Why Ghostery' then 'for consumers' you should get to the download pages.
@user-nl5hj4dy7y
@user-nl5hj4dy7y 8 жыл бұрын
I'd actually suggest uMatrix - it's by the same person as uBlock Origin and allows complete control of all requests made by your browser.
@Anvilshock
@Anvilshock 8 жыл бұрын
ABP, block any and all ad and tracking sites at 2ndLD-level.
@MrNacknime
@MrNacknime 8 жыл бұрын
If it works, it doesn't matter who made it.
@Kishibe84
@Kishibe84 8 жыл бұрын
I love MIke Pound's videos!
@knucklesamidge
@knucklesamidge 8 жыл бұрын
Fantastic video!! I already knew all this stuff but still very enjoyable to watch. More web dev stuff please!
@kimjongun9915
@kimjongun9915 6 жыл бұрын
I steal my grandma's cookies all the time. Much easier than the way you do it. I just reach into the jar.
@moosetwin9023
@moosetwin9023 4 жыл бұрын
ok kim
@BharCode09
@BharCode09 4 жыл бұрын
But you are Kim Jong Un!
@dinomra7771
@dinomra7771 4 жыл бұрын
@@BharCode09 He stores his cookies in his nukes.
@suola-sirotin
@suola-sirotin 3 жыл бұрын
I thought that jar was a .jar java file for a second...
@ClassifiedPerson
@ClassifiedPerson 3 жыл бұрын
@@suola-sirotin when you're big brain and can't understand the joke at first glance
@lucashansen7149
@lucashansen7149 3 жыл бұрын
Good job as always, Mike.
@alexwolfeboy
@alexwolfeboy 5 жыл бұрын
You guys should do a series on stuff like this and how to try and prevent it. Since not too many people realise stuff like this especially when they begin coding - even Twitter has this happen not that long ago. I see how you show how it’s done, but you didn’t show how to prevent it ( an easy way that I use, is replace all angle brackets with the HTML code for it - it’s an ampersand and some text - now it won’t be valid HTML ). Heck, maybe even videos on how to secure your server itself.
@The_Tribute_Maker
@The_Tribute_Maker 3 жыл бұрын
Looked up ghostery as soon as you mentioned it and installed it to both browsers I use. Thanks!
@acruzp
@acruzp 7 жыл бұрын
Mike Pound is my favorite Computerphile host
@jopaki
@jopaki 8 жыл бұрын
Excellent breakdown.
@nils-erikolsson3539
@nils-erikolsson3539 4 жыл бұрын
Very interesting and eye-opening videos, pedagogically told. Simply great.
@SlyMaelstrom
@SlyMaelstrom 8 жыл бұрын
"It bags my cookie" sounds like British sexual innuendo.
@OfficialPirateFraser
@OfficialPirateFraser 8 жыл бұрын
alert("Just testing... :P")
@AgentM124
@AgentM124 8 жыл бұрын
*KZfaq is Smarter Than That*
@OfficialPirateFraser
@OfficialPirateFraser 8 жыл бұрын
Agent M Of course, google just throw loads of money at it so obviously...
@DaRealMaus
@DaRealMaus 8 жыл бұрын
*
@knucklesamidge
@knucklesamidge 8 жыл бұрын
+OfficialPirateFraser It's pretty fkin simple to get around it. You escape it just like you do with database statements.
@d3line
@d3line 8 жыл бұрын
AFAIK you can just replace < with &lt; and > with &gt; That's it, no html tags could get through this...
@goeiecool9999
@goeiecool9999 8 жыл бұрын
I actually heard a story of the valve steamworks not being protected against XSS which would allow a rogue developer to put HTML tags in the description of their app description and steal the cookies of any valve administrator visiting the info of his app.
@goeiecool9999
@goeiecool9999 8 жыл бұрын
dicription of their app description. :/
@IEJ7654321
@IEJ7654321 Жыл бұрын
This is how Linus got hacked
@karlsmile7054
@karlsmile7054 5 жыл бұрын
Really amazin So well described So exciting
@MrEnderChop
@MrEnderChop 6 жыл бұрын
4:02 "Your blog is bad, and you should feel bad." Futurama reference.
@vortyx090
@vortyx090 8 жыл бұрын
very nice videos, computerphile, keep the good job
@PlexusTen
@PlexusTen 5 жыл бұрын
Excellent video
@deineoma1301
@deineoma1301 4 жыл бұрын
It would be awesome if you could provide your test website codes so one could try out for themselves and follow along Thanks for the awesome content
@ocoro174
@ocoro174 6 жыл бұрын
god bless this man. what a legend
@fablungo
@fablungo 8 жыл бұрын
There are lots of complicated and simple methods that you can implement between IP locking the cookie and nothing. Been a while since I had to develop a web app, but a common technique I would use would be that every time a request is made a new session ID (or a secondary ID) is generated and the last one is invalidated. This will mean your session ID keeps changing, reducing the size of each attack window and if your cookie is stolen and used when you next request with the cookie the attacker has invalidated, it can invalidated both sessions and notify the end user/server administrator that there has been a potential security breech. It doesn't stop the attacks completely but its a nice technique to make it harder and notify a user of the issue.
@feldinho
@feldinho 8 жыл бұрын
Until the user opens multiple tabs… You don't need to break the web in order to keep your users safe from XSS, just escape all the user-generated HTML and you're done!
@fablungo
@fablungo 8 жыл бұрын
Felds Liscia If I am not mistaken, cookies are per computer, not per tab, do some page load on one and when you do to do one on another it should send the cookie as updated in the first tab. Not sure if it can be broken with close concurrency though (i.e request one page and then another before the browser has handled the response to the first). I probably wouldn't implement anything this strict except in an administration backend but this protects from more than XSS. Obviously you should always escape inputs no matter what and that is the minimum level of protection required because XSS can do more than just cookie hijacking.
@kowalityjesus
@kowalityjesus 8 жыл бұрын
so over my head, but nice to have an inkling of what it means!
@ImGeoX
@ImGeoX 4 жыл бұрын
Great video and explanation. However, it would be nice to have a section on how to protect yourself from XSS.
@kopuz.co.uk.
@kopuz.co.uk. 8 жыл бұрын
This takes me back to redirecting quest books.
@kvelez
@kvelez Жыл бұрын
0:49 Requests 1:50 Cookies 2:42 Stealing 3:30 XSS
@WhiteHeart_infosec
@WhiteHeart_infosec 5 жыл бұрын
Excellent !!!!! Ty for such an excellent videos
@TylerMatthewHarris
@TylerMatthewHarris 8 жыл бұрын
Better not steal my cookies
@youtuberocks8397
@youtuberocks8397 8 жыл бұрын
You are a crafty man thanks for the lesson..........
@crypticmauler
@crypticmauler 8 жыл бұрын
you should do a video on Content Security Policy (CSP) and show how it can be used to protect against these types of attacks when having to use 3rd party applications which you may have little control of how they did their security.
@Seegalgalguntijak
@Seegalgalguntijak 8 жыл бұрын
03:46 shows a Samsung subnotebook with a TrackPoint. Which model is it? I really need my TrackPoint, because TouchPads are crappy to use and whenever I have to use them, I feel the need to smash the machine against the wall. So what laptops are there that have a TrackPoint - except for Lenovo ThinkPads, of course??
@WannabeWant3D
@WannabeWant3D 8 жыл бұрын
That's still vulnerable to sql injection, because you used mysql_real_escape_string, instead of mysqli_real_escape_string. The i stands for "improved", so obviously that's the one we should use. The other one has some subtle bugs, mainly character encoding ones.
@tahiriqbal8543
@tahiriqbal8543 7 жыл бұрын
i have a question when we using https protocol, then we can't steel cookies as far as i know then what we need to worry about steeling cookies?
@lukeaussie08
@lukeaussie08 Жыл бұрын
great video
@AgentExhale
@AgentExhale 7 жыл бұрын
What was the name of the program he recommended to install?
@ammobake
@ammobake 8 жыл бұрын
Is it possible to use a similar concept to hijack someone else's toolbars/browser add-ons? I've heard of manipulating or tricking a user's browser to open a blank toolbar. This toolbar runs a script that allows you to access the user's local drives/files. Though I'm not sure it's seemless (not a true remote session). It seems strange that it would be possible but I can confirm I've seen it happen.
@helloworld8583
@helloworld8583 4 жыл бұрын
Why server does not use an IP address instead of cookie when it wishes to track clients requests and let's say shopping card? Because server can see only external IP address and can not see a local address of device. Is it the reason?
@j2simpso
@j2simpso 4 жыл бұрын
Trading a browser cookie for a photo of the Cookie Monster? Seems like a fair trade to me! 🤣
@arturssosnars811
@arturssosnars811 4 жыл бұрын
One thing that would be nice in these videos, imo, would be simplest ways in few words, how to defend yourself from most known exploits for new Web developers, uni students etc
@Crazytomm
@Crazytomm 4 жыл бұрын
This would be good to go through if your going to take your Comptia Security + test
@AntoshaPushkin
@AntoshaPushkin 8 жыл бұрын
Who is this guy? He is the coolest one to tell about computers at this channel, the videos about computer vision are totally amazing and this one was great too despite I've known all the information long before I've seen it. But if I need to tell someone what "XSS" is, I will definitely give the link to this video
@gyroninjamodder
@gyroninjamodder 8 жыл бұрын
This video seems like it might transition into a video about CSRF pretty well.
@whiteeyedshadow8423
@whiteeyedshadow8423 5 жыл бұрын
ive nearly had my cookies stolen twice(or more) on discord! it was some kind of script that ran when you joined a server...and its quite clever
@shayansec
@shayansec 2 жыл бұрын
"I get back an image and I think nothing's gone wrong but they've now got my cookies" scariest words.
@realmikekotsch
@realmikekotsch 7 жыл бұрын
Can you get this guy to explain software models, functions, attributes … I understand so many things for the first time when he is explaining it.
@sean3533
@sean3533 8 жыл бұрын
what program did he recommend at the star to block cookies?
@CatnamedMittens
@CatnamedMittens 8 жыл бұрын
Why did they choose the name "cookie"?
@EKULvideos
@EKULvideos 8 жыл бұрын
Comes from fortunes cookies I think. They hold small bits of information, like fortune cookies.
@holdream
@holdream 8 жыл бұрын
thorin might know :>
@CatnamedMittens
@CatnamedMittens 8 жыл бұрын
iZz⤴c Thanks.
@CatnamedMittens
@CatnamedMittens 8 жыл бұрын
+holdream Maybe :>
@hellterminator
@hellterminator 8 жыл бұрын
Truth is nobody knows. There are several theories, the most likely of which seems to be that it's a reference to “magic cookies” (basically the same thing, but in pre-web age and nobody knows why those were called that either), but nobody really knows.
@MEANASSJAMSTER
@MEANASSJAMSTER 5 жыл бұрын
My screen jumps up and down sometimes; - but I have an optical mouse ...it seems to stop when I turn the mouse upside down... - I could run wireshark but just stare at it like a spastic...
@efraimg8543
@efraimg8543 4 жыл бұрын
Thank you As far I am aware, if an attacker will gain the session ID he won't be able to use it again because it was already used by the original user.
@bluesquare23
@bluesquare23 5 жыл бұрын
Is there also cookie spoofing after you get someone’s cookies and how does that work?
@Doct0r0710
@Doct0r0710 8 жыл бұрын
I remember when Facebook didn't require https for their mobile site. Soo many users details were visible in my school when I fired up FaceNiff or Firesheep. (ARP poisoning, traffic sniffing, cleartext cookies)
@Doct0r0710
@Doct0r0710 8 жыл бұрын
+pm79080 bu that's effort. I don't like doing effort.
@Doct0r0710
@Doct0r0710 8 жыл бұрын
+pm79080 that's even more effort. You just can't match with my laziness
@knucklesamidge
@knucklesamidge 8 жыл бұрын
+pm79080 what do you mean? Google returned nothing
@prillewitz
@prillewitz 2 жыл бұрын
Very clear! Read more books though!
@nerdnalist
@nerdnalist 5 жыл бұрын
What was the cookie removing software he mentioned?
@justin3594
@justin3594 5 жыл бұрын
I love that he’s using MariaDB
@aranw
@aranw 8 жыл бұрын
"It's all very positive. Oh, well, nearly." My words exactly when I get 25% on a assignment.
@JerenVelletri
@JerenVelletri 8 жыл бұрын
oh man why do so many good videos come out after midnight
@axesspwns
@axesspwns 5 жыл бұрын
So rather getting an image from the server that holds the blog file, the attacker is redirecting the request to his submitcookie.php file on the attacker server. This .php file stores the cookie in a databse and returns back to the defendless user the cookie monster image. Am I understanding this correctly?
@atoth91
@atoth91 8 жыл бұрын
In a normal situation, wouldn't the post with the session cookie be stopped by the browser because of same origin policy?
@mrfincher
@mrfincher 7 жыл бұрын
i love these videos!!!
@tanchienhao
@tanchienhao 8 жыл бұрын
since most forums allow img tags, for pictures, (or tell me if they dont :p), doesnt it mean that practically every forum is vulnerable? what countermeasures do they use?
@David-yr3xd
@David-yr3xd 8 жыл бұрын
most fora use BBscript
@tanchienhao
@tanchienhao 8 жыл бұрын
Oh i see hahaha thanks Daviddadj​
@TriggerHappyRC1
@TriggerHappyRC1 3 жыл бұрын
Am I understanding this correctly or am I missing something? The script that he sent is now a permanent part of the website as it will be loaded from the database as soon as a user requests to view the blog entries. When the script is loaded, the client will run it and send their cookie to the attacker's website. The user doesn't need to do anything other than load that blog post in order to send off their cookie?
@raymondtan9112
@raymondtan9112 5 жыл бұрын
Prof. Can you please do a similar video for heap overflow? Thanks
@AlbertSirup
@AlbertSirup 7 жыл бұрын
the interviewer really sounds like the guy from sonicstate. I always thought Brady was doing the interviews...
@moebrowne
@moebrowne 8 жыл бұрын
Lots of PHP frameworks will now change your session ID on each request (while keeping the data associated to the new ID), this prevents these types of attacks as the ID that gets stolen is immediately invalid
@RAYNINGMAKER
@RAYNINGMAKER 7 жыл бұрын
Is there the possibility of reading out the whole cookie file? I mean it's just a file on the computer which can be read out. Can Javascript do such things?
@deeXaeed
@deeXaeed 8 жыл бұрын
Shouldn't the animation show the cookie being sent to a different server on which the image is hosted?
@andreo4511
@andreo4511 4 жыл бұрын
Is that code still vulnerable to SQL injection? I thought it should be using prepared statements and enforcing UTF-8?
@stingaling
@stingaling 3 жыл бұрын
Right at the start you recommend installing an app to stop cookies 'tracking our whereabouts' but I couldn't understand what you said. Ghost something?
@alexwolfeboy
@alexwolfeboy 5 жыл бұрын
It’s scary how easy doing these sorts of things are sometimes. If I recall, however, XSS attacks aren’t nearly that much of a threat because because of SSL. The request is private, and you’d have to forge the certificate, which is nearly impossible. Do I understand correctly?
@TheMgamesM
@TheMgamesM 7 жыл бұрын
Cookie stealing only permits logging into other person's account when their account is set up to "keep me logged in" right? Because then the server doesn't ask for username and password?
@Ivo--
@Ivo-- 8 жыл бұрын
Ghostery itself does tracking. It's pretty messed up.
@The0x539
@The0x539 8 жыл бұрын
Privacy Badger for the win, or Disconnect.
@Ivo--
@Ivo-- 8 жыл бұрын
The0x539 Yeah, I use disconnect personally.
@N....
@N.... 8 жыл бұрын
AdBlock also does tracking, which is why people recommend the completely separate project AdBlock Plus
@Ivo--
@Ivo-- 8 жыл бұрын
Nicholas Braden I suggest ublock origin over adblock plus.
@Ivo--
@Ivo-- 8 жыл бұрын
hcblue I couldn't really say. Privacy badger is made by the EFF, which counts for something IMO. I haven't used it myself though.
@MikeTrieu
@MikeTrieu Жыл бұрын
Reauth when performing important tasks is one method of hardening security. Another might be to challenge again if geoip logs detect impossible travel (i.e. it suddenly looks like you're on the other side of the world or, at least, a completely different Autonomous System).
@AgentM124
@AgentM124 8 жыл бұрын
this was a good video!
@tmmyhmmie7761
@tmmyhmmie7761 3 жыл бұрын
would the attacker also need to be authenticated to actually use your cookie?
@AlexGW
@AlexGW 5 жыл бұрын
7:14 Code like that, takes me waaay back 😂
@caparazo3488
@caparazo3488 5 жыл бұрын
Put that cookie down, now!
@Minitomate
@Minitomate 4 жыл бұрын
Instructions unclear, the cookies monster came after me stoling it's cookies.
@keyzi99
@keyzi99 7 жыл бұрын
Is it legal to do this on your website images? So if someone else excepting yours users is using that image, they will also send their cookies to your website?
@MegaMrMarlboro
@MegaMrMarlboro 8 жыл бұрын
An alternative to XSS and often used in Spam emails, is Clickjacking. Look it up if you're a web dev, or perhaps a video on this would be nice +Computerphile
@osiris5449
@osiris5449 6 жыл бұрын
Great video. I already know all this but know; PHP Sessions and Cookies are WAY different. Just like LocalStorage.
@dsnunes
@dsnunes 6 жыл бұрын
Even a "myimage.jpg" can perfectly be a php file (or any other scripting language, fwiw). The "file extension" concept have no place in HTTP protocol, so the browser doesn't actually know if "image.jpg" is an image or anything else named like that (including a folder). It doesn't even have to exist on the server, as you have multiple configuration options for your routing and rewriting of the request paths once the request hits the server.
@byonic3308
@byonic3308 8 жыл бұрын
Where can I download this example site?
@pablostreams
@pablostreams 6 жыл бұрын
BRUH this guy really knows his stuff wow.........makes me wanna drop electrical and pick up programming/coding
@hornchannel
@hornchannel 4 жыл бұрын
crosseyed what? awesome, thanks
@AngelOnFira
@AngelOnFira 8 жыл бұрын
Cool tutorial
Hacking Out of a Network - Computerphile
25:52
Computerphile
Рет қаралды 239 М.
Log4J & JNDI Exploit: Why So Bad? - Computerphile
26:31
Computerphile
Рет қаралды 498 М.
Lehanga 🤣 #comedy #funny
00:31
Micky Makeover
Рет қаралды 24 МЛН
Алексей Щербаков разнес ВДВшников
00:47
A teacher captured the cutest moment at the nursery #shorts
00:33
Fabiosa Stories
Рет қаралды 58 МЛН
小宇宙竟然尿裤子!#小丑#家庭#搞笑
00:26
家庭搞笑日记
Рет қаралды 22 МЛН
Running a Buffer Overflow Attack - Computerphile
17:30
Computerphile
Рет қаралды 2 МЛН
Elliptic Curve Back Door - Computerphile
12:24
Computerphile
Рет қаралды 510 М.
The Opposite of Infinity - Numberphile
15:05
Numberphile
Рет қаралды 4,3 МЛН
Power LED Attack - Computerphile
12:05
Computerphile
Рет қаралды 256 М.
LogJam Attack - Computerphile
18:47
Computerphile
Рет қаралды 180 М.
Difference between cookies, session and tokens
11:53
Valentin Despa
Рет қаралды 612 М.
The Worst Programming Language Ever - Mark Rendle - NDC Oslo 2021
1:00:41
NDC Conferences
Рет қаралды 1,3 МЛН
DNS Cache Poisoning - Computerphile
11:04
Computerphile
Рет қаралды 301 М.
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,4 МЛН
Breaking RSA - Computerphile
14:50
Computerphile
Рет қаралды 357 М.
Lehanga 🤣 #comedy #funny
00:31
Micky Makeover
Рет қаралды 24 МЛН