Reinventing Web Security
20:37
5 ай бұрын
Hacker Tweets Explained
13:47
7 ай бұрын
Zenbleed (CVE-2023-20593)
26:46
8 ай бұрын
Android App Bug Bounty Secrets
20:14
Hacking Google Cloud?
21:59
10 ай бұрын
Trying to Find a Bug in WordPress
18:07
Defending LLM - Prompt Injection
17:12
Attacking LLM - Prompt Injection
13:23
Cybercrime is Not Hacking!
11:16
Жыл бұрын
Attacking Language Server JSON RPC
16:31
Velocity Exploit on Paper?
14:18
Жыл бұрын
Computer Networking (Deepdive)
14:52
What is a Protocol? (Deepdive)
18:14
Can AI Create a Minecraft Hack?
55:16
Minecraft Reach Hack
12:03
Жыл бұрын
Пікірлер
@nightcross4568
@nightcross4568 8 сағат бұрын
Great explanation, I learned a lot from this video.
@user-xw1nm7pz7d
@user-xw1nm7pz7d 23 сағат бұрын
masterpiece
@BlahBlah-kb1wf
@BlahBlah-kb1wf Күн бұрын
You kinda went overboard when you started talking about VPNs and sockets and whatever else. At least overboard for me. A newb.
@monicadanesi4508
@monicadanesi4508 Күн бұрын
1:28 I am at a loss I need help. I have nothing left. It's been 3 years, are there any resources that could help me? I can't even get a job. It's a living nightmare. Complete access and total control of my tech.
@nBlackyHVH
@nBlackyHVH 3 күн бұрын
We need this series back
@dark_red_blood
@dark_red_blood 3 күн бұрын
thanks.
@GamingBoy-to7zb
@GamingBoy-to7zb 4 күн бұрын
Bro actually showed us how to get ForceOP without even saying 😂
@ricp
@ricp 4 күн бұрын
16:36 great perspective on attempting it regardless!
@ricp
@ricp 4 күн бұрын
This is so great! I love the level of detail you go into, thanks a lot!
@ricp
@ricp 4 күн бұрын
great explainer!
@SnakeSagacity
@SnakeSagacity 4 күн бұрын
How long do steam support usually reply? I got fished and the link automatically changing email address in a blink of an eye.
@foxythefunpirate_yt2738
@foxythefunpirate_yt2738 4 күн бұрын
can you make a tutorial :)
@jacobsurles7555
@jacobsurles7555 6 күн бұрын
I badly needed this. Thank you!
@bunsogamingV.11
@bunsogamingV.11 6 күн бұрын
WOW..TRUE❤❤
@TheGrimPhreaker
@TheGrimPhreaker 7 күн бұрын
Thank you for explaining this! I was thinking of trying CTF just for fun and now I at least know what to expect😊
@chriskaprys
@chriskaprys 9 күн бұрын
Man I wish I understood what actually takes place here, between the stack and the c code. I understood all the videos in this playlist thus far, pausing and reviewing and trying things in my terminal until it made sense. But this one felt like a giant leap and now I'm standing across a chasm and can't find the bridge to the other side, lol. I've watched it over a dozen times, pausing and staring at the code and terminal and listening to the explanation .. still baffled. I get that printf '%x' or '%d' without an argument is leaking memory off the stack. I get what '%n' is doing, printing the number of previously entered chars into a variable, e.g.: > printf 'abc%n' x; echo $x > abc3 What I don't understand is 1) How including the address of the 'target' variable in the payload string affects the value stored in 'target' at that address. -Why would this be treated any differently than some other arbitrary string, e.g. '41414141'? Because you're not actually executing an instruction on 0x8049638 in memory/code, you're simply leaking from the stack the string that you've written, between 'AAAA' and 'BBBB', right? So how is the value at that address affected? 2) How "if(target)" is evaluating to true. -Does 'target' start out as 0 / NUL, and then evaluate to true once it's non-zero? -If so, is 'target' somehow becoming the variable that %n is writing to (like the 'x' above)? (Given the vocabulary used in the video, I'm guessing that's probably the case, but I just don't see it happening.) -If so, (for the sake of understanding the flow of information) what non-zero number is being written to 'target' on success? '4' (AAAA) or '7' (8049638)?
@dancorvalan3205
@dancorvalan3205 9 күн бұрын
Great job man! These challenges r no joke.
@davidyang1519
@davidyang1519 12 күн бұрын
Is there a github link for this?
@Dominik-K
@Dominik-K 12 күн бұрын
Love serenity
@KRIGBERT
@KRIGBERT 12 күн бұрын
I find that I'm best at teaching the things I've struggled with myself -- apparently this isn't just true for me. Great video :)
@xfrazle
@xfrazle 14 күн бұрын
i played this on my win 98 pc lol
@mubarakharuna6425
@mubarakharuna6425 15 күн бұрын
I have changed my mind from going we web application, let me capitalize on mobile App
@Adam_483
@Adam_483 15 күн бұрын
AWESOME! Very clear!
@newstonight123
@newstonight123 16 күн бұрын
"uncrackable" and what if you just remove the if/else statement lmao?
@FelipeGuimaraes45
@FelipeGuimaraes45 17 күн бұрын
I always come back to watch this video, this is cinema
@user-ti1mu8ki9w
@user-ti1mu8ki9w 18 күн бұрын
tell me how
@samucancld
@samucancld 18 күн бұрын
Fascinating content, thanks!
@PercivalBrianalt1
@PercivalBrianalt1 18 күн бұрын
useless bruh fully different topic
@user-ws7wh8kz8h
@user-ws7wh8kz8h 18 күн бұрын
Great Job. I'm new to all this, and you made it easy for me to understand.
@ImadSaci-xc4rm
@ImadSaci-xc4rm 19 күн бұрын
I love you bro,i follow since along time,but am not pregressing 😂
@derelictmanchester8745
@derelictmanchester8745 19 күн бұрын
Love the intro music snippet... where's is sampled from..?
@LordMarlle
@LordMarlle 19 күн бұрын
The old man glitch was incredibly strange and interesting to me as a child. I knew about game genie and understood that it changed the data of the game, so that wasn't mysterious or strange at all, it only got a bit fascinating when random codes sometimes would do unexpected things to the game. But talking to the old man, rewatching his tutorial, flying to some arbitrary yet specific locale, and then surfing, but only on the ledge, and then weird encounters would start, and somehow a single item slot would get multiplied? That was so frikkin weird. I'm not an expert of processors or programming at all, but I have a certain interest and I think it stems from that very glitch
@grain-bi8iu
@grain-bi8iu 21 күн бұрын
"a lot of the games arent played anymore" man i played that map on warcraft 3 nooo use that example
@Celvin1000
@Celvin1000 22 күн бұрын
Great Video !
@f4zer_
@f4zer_ 22 күн бұрын
very acceptable, thank you for this video, you keep saying that there's no clear path, though I figured it out right as you give m0re and more examples. "if you cannot see the path, your destination is far away"- best quote by you, and this helps in many other aspects of life. this was the best video I've watched and gained a clear perspective on ethical hacking..!! keep creating awesome content loved your work on this video!!!
@james-wihz
@james-wihz 22 күн бұрын
🤣🤣🤣🤣🤣🤣🤣🤣 coool
@v_gg6
@v_gg6 22 күн бұрын
Whytf yt didn't recommend this video before 6 years ago why now
@ariadesupriyatna
@ariadesupriyatna 22 күн бұрын
😅
@smellslikemaurice
@smellslikemaurice 23 күн бұрын
I came here after watching the Leeroy Hacker Exposed video and damn. This is awesome. I love Minecraft and I'm learning python rn. It's unbelievable how much I already understand due to your great explanations.
@makezi7
@makezi7 23 күн бұрын
Thank you for sharing this informative content. It's interesting to note how the previous Systems Administrator at my workplace was strongly in favor of implementing HTTP Strict Transport Security (HSTS) and advocated for team members to obtain Security+ certification. Unfortunately, his misconfigured setup contributed to some security issues, highlighting that HSTS isn't always a critical requirement for website security. This situation underscores the impact of knowledge gaps and how they can lead to misplaced pressures within teams. Additionally, thank you for sharing the KZfaq video-it provided valuable insights, even though it was originally shared on Google. We truly appreciate it.
@e.m.451
@e.m.451 23 күн бұрын
rule no. 1 never ever plug a random found usb stick in your personal computer
@lizzyeliz
@lizzyeliz 24 күн бұрын
UR INSANEEEEEEEEEE TYYSM ILYYY
@TECHN01200
@TECHN01200 24 күн бұрын
Choose your hard!
@roeesi-personal
@roeesi-personal 25 күн бұрын
1:45AM HUFO here: Fuzzing is dumb, the moral should not be duplicate your code to make it more secure and the way they found the vuln was reading the code and understanding an attacker's input can go to the function where an assumption on it would be incorrect.