Missing HTTP Security Headers - Bug Bounty Tips

In this video we talk about various HTTP headers that can improve or weaken the security of a site. And we discuss how serious they are in the context of Google's bug bounty program.
Find the full playlist with videos for Google here: • BUG HUNTER UNIVERSITY
Chapters:
00:00 - Background Info
03:11 - Intro
03:53 - HTTP Security Header Overview
04:38 - Example #1: X-Frame-Options
06:43 - Example #2: Content-Security-Policy (CSP)
08:16 - Example #3: Strict-Transport-Security (HSTS)
10:44 - Example #4: Cross-Origin Resource Sharing (CORS)
13:12 - Example #5: Cookie Security Flags (HttpOnly)
14:25 - Summary
15:23 - Outro
*advertisement because the video was originally produced for Google: bughunters.google.com/learn/v...
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Instagram: / liveoverflow
→ Blog: liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow

Пікірлер: 171

  • @lukor-tech
    @lukor-tech2 жыл бұрын

    You know what I absolutely love? The sheer idea, that he can sit at home, with a shirt that wasn't ironed for the google video. I am not saying he didn't try - it's just the audience more focused on the content than the creator. I don't know how many will share the thought with me, but here it is. Good stuff.

  • @laja6108

    @laja6108

    2 жыл бұрын

    True, we live in amazing times

  • @Menaceirl

    @Menaceirl

    2 жыл бұрын

    I think a large part, if not the vast majority of the audience this video is intended for are likely sitting at home wearing a shirt that was not ironed.

  • @lukor-tech

    @lukor-tech

    2 жыл бұрын

    @@Menaceirl ha! I didn't even had one!

  • @RaduStancaOnline

    @RaduStancaOnline

    2 жыл бұрын

    This is the curse of being familiar with the content(aka being 1337 h4ck3r), you start to notice things that generaly you would and that would make the video a little bit better.

  • @Zedoy

    @Zedoy

    2 жыл бұрын

    didn't even notice wow

  • @saadmgdm706
    @saadmgdm7062 жыл бұрын

    Nothing makes me more happier than seeing this guy.

  • @JimTheScientist

    @JimTheScientist

    2 жыл бұрын

    same :D

  • @LeonardoNicchio

    @LeonardoNicchio

    Жыл бұрын

    @@JimTheScientist Tô aqui na casa dele e vou ficar com o cara do carro e ele me disse que vai ser um

  • @Root-uno6nw
    @Root-uno6nw2 жыл бұрын

    Finally some browser security; this is the stuff that really needs to be taught, it’s practical and real world content. Keep these kind of videos up man.

  • @SirKrazzy

    @SirKrazzy

    2 жыл бұрын

    Totally agree bro Ahaha nice seeing you here

  • @Root-uno6nw

    @Root-uno6nw

    2 жыл бұрын

    ​@@SirKrazzy This is epic, good to see you here too bro!!

  • @phillawrence9741
    @phillawrence97412 жыл бұрын

    Missing security headers are usually out scope on bug bounties program. Nice presentation is worth demonstrating.

  • @gFamWeb
    @gFamWeb2 жыл бұрын

    This seems to really boil down to: "if you can't accurately and specifically articulate how something can be exploited, it's likely not actually vulnerable"

  • @TimLF

    @TimLF

    2 жыл бұрын

    "POC or GTFO"

  • @TheJobCompany
    @TheJobCompany2 жыл бұрын

    here's my typo bounty submission: at 5:55 in the English subtitles there's a typo - it says "doens't" instead of "doesn't"

  • @LiveOverflow

    @LiveOverflow

    2 жыл бұрын

    what's your paypal so I can send you your bounty?

  • @TheJobCompany

    @TheJobCompany

    2 жыл бұрын

    @@LiveOverflow oh, no, thanks, but I only except payments in high quality cybersecurity videos, if that's cool.. so yea, I'm gonna be needing a couple of these instead, ty

  • @bugr33d0_hunter8

    @bugr33d0_hunter8

    2 жыл бұрын

    @@TheJobCompany yeah apps these days are never getting it right. Same with speech recognition, its going to get me locked up one day for printing out the wrong words.

  • @makezi7
    @makezi72 ай бұрын

    Thank you for sharing this informative content. It's interesting to note how the previous Systems Administrator at my workplace was strongly in favor of implementing HTTP Strict Transport Security (HSTS) and advocated for team members to obtain Security+ certification. Unfortunately, his misconfigured setup contributed to some security issues, highlighting that HSTS isn't always a critical requirement for website security. This situation underscores the impact of knowledge gaps and how they can lead to misplaced pressures within teams. Additionally, thank you for sharing the KZread video-it provided valuable insights, even though it was originally shared on Google. We truly appreciate it.

  • @harshrathod2237
    @harshrathod22372 жыл бұрын

    This is really crucial to understand that absence of a particular header doesn't mean the web application is vulnerable. Instead one should try to figure out how the absence of that header impacts the application in general or maybe chain that impact to find a realistic security flaw.

  • @HD_Heresy
    @HD_Heresy2 жыл бұрын

    I'm new to Cyber Security and have been denying third party application access based on bad results from HTTP header scans, this video has helped me so much thank you!!!

  • @elevatecyber5031
    @elevatecyber50312 жыл бұрын

    Very thought-provoking video! No one else is talking about this.

  • @000t9
    @000t92 жыл бұрын

    Love your videos! So much informative!

  • @7guitarlover
    @7guitarlover2 жыл бұрын

    This is surely one of my favorite Channel on youtube !!!!

  • @SeMoDrix
    @SeMoDrix2 жыл бұрын

    I never knew why i had hsts set up, just did it because it was good practice but never knew how it worked… very informational video, even if it was just for google!

  • @OmegaZ2
    @OmegaZ22 жыл бұрын

    Very informational video, thank you as always for the nice content!!

  • @mohitjaswal7657
    @mohitjaswal7657 Жыл бұрын

    Amazing video. Please keep posting such real life examples of how to assess these reports generated by pen testing automation tools!!

  • @The-solo
    @The-solo2 жыл бұрын

    As always the video is so Informative. I'm a beginner and I'm about to start my bug bounty journey. I must say it helped me a lot.

  • @ca7986
    @ca79862 жыл бұрын

    What an amazing explanation

  • @oldGoatMilk
    @oldGoatMilk2 жыл бұрын

    Great video! I'm going to watch it again, a lot of good information.

  • @kamandejohn
    @kamandejohn9 ай бұрын

    Great insights. Thank you !

  • @sayamqazi
    @sayamqazi2 жыл бұрын

    5:33 This is exactly what I was trying to explain to a client that if a 3rd party npm module is being used in a static client size electron app the vulnerabilities reported by npm have ZERO impact because those only apply if the module is being using to process a user provided input in a route handler in a server app.

  • @jesslopez2494
    @jesslopez24942 жыл бұрын

    Honestly, in the stratus of people out there being "Security Content Creators" L.O. has always come across as a passionate hacker. Even when advertising something, not trying to sell it. I appreciate that you aren't a grifter man, because there are plenty in this field.

  • @ashvinbhuttoo
    @ashvinbhuttoo2 жыл бұрын

    Web dev here, i actually learned something, great content👌

  • @leok6717
    @leok6717 Жыл бұрын

    Great video!!

  • @pentestical8265
    @pentestical82652 жыл бұрын

    Great video as always, but I think one thing could be slightly incorrect. Sometimes (at least the last time I checked) authorization headers are automatically submitted by the browser. HTTP Basic Authentication credentials are cached so you don't need to fill out the prompt every time you visit a new page. A CORS misconfiguration in this case could allow data from a user authenticated with basic with to have data stolen. I think the same also applies to client certificate based auth, but I've never tested this one myself.

  • @git-tauseef
    @git-tauseef2 жыл бұрын

    What an explanation 🙌

  • @JuanBotes
    @JuanBotes2 жыл бұрын

    Thank you for sharing your knowledge and clear explanations \o/

  • @anilrp112
    @anilrp11211 ай бұрын

    Atleast you said it!! So happy

  • @benjaminnewman3833
    @benjaminnewman38332 жыл бұрын

    Vulnerability scanners are brilliant at what they do and its just that, they give you a static output without providing any context, they cut out all the manual crap you have to go through to assess a web apps/infra vulnerabilities. But people seem to use them as gospel when in fact they should be used to determine the posture of that thing you are scanning. If the output you receive shows a bunch of critical and high ratings then it's probably best to either get an actual pen test conducted or you need to start looking at who is developing and either assess their capability at protecting your data or up-lifting sending them on training courses. Too many orgs I go to and consult for just blindly think because they have Qualys or a similar DAST tool that they have "really good security," when in fact they don't understand what the tool is actually trying to show

  • @SrRunsis

    @SrRunsis

    2 жыл бұрын

    Amen

  • @mistercyber1848
    @mistercyber18482 жыл бұрын

    love your videos

  • @brymko
    @brymko2 жыл бұрын

    ayyyy nice to see that you also still have the offcon covid wristband on your wrist :P

  • @chiragartani
    @chiragartani2 жыл бұрын

    Trust me nowadays people are more interested in this kind of videos I mean bug bounty niche, instead of Buffer Overflow or binary exploitation things. I mean this is what people can easily learn and earn through it. Your last Apisix video was amazing too. Keep it up, Great video. 👏🌟 Thank you!

  • @OthmanAlikhan
    @OthmanAlikhan9 ай бұрын

    Thanks for the video =)

  • @charlie5tanley
    @charlie5tanley2 жыл бұрын

    excellent content. thank you.

  • @rivhaaken9763
    @rivhaaken97632 жыл бұрын

    Love it !

  • @realslimchaggy
    @realslimchaggy2 жыл бұрын

    I recommand subscribing to bug bounty reports explained for the best bug bounty knowledge

  • @lakshanperera9735
    @lakshanperera97352 жыл бұрын

    thank you this video

  • @chizzlemo3094
    @chizzlemo30942 жыл бұрын

    Great video

  • @andyelgangster5320
    @andyelgangster53202 жыл бұрын

    Very informative 😎

  • @umar7110
    @umar71102 жыл бұрын

    Great ❤️❤️

  • @manuelfrosi2799
    @manuelfrosi2799 Жыл бұрын

    Great video, i would have liked that the cache header was also explained

  • @ReposHaug
    @ReposHaug2 жыл бұрын

    To be fair if we only applied CSP to sites with a known existing XSS, that would be a solid way to broadcast a known issue on your site :)

  • @dan-garden
    @dan-garden2 жыл бұрын

    lookin more like John by the day my dood, keep it up

  • @TheKinGG0ld
    @TheKinGG0ld2 жыл бұрын

    Yay!

  • @hernanduran4142
    @hernanduran41422 жыл бұрын

    I constantly have to deal with customer pentest reports stating I have a vulnerability because I don’t have HTTPOnly on cookies that are clearly non-sensitive.

  • @Amd107
    @Amd1075 ай бұрын

    Nice

  • @user-kp7fj1ig6z
    @user-kp7fj1ig6z Жыл бұрын

    At 9:57 when the browser internally redirects to HTTPS the second time, are you sure it has to do with the URI scheme and not the 301 redirect? Any permanent redirects (301) are remembered by the browser and handled internally from then on. If the website had done a 302 redirect instead, would the browser have sent the HTTP request the second time? This distinction doesn't make a difference in this case but if you requested a different webpage on the same domain the 301 redirect wouldn't apply, so would your browser still request the HTTP page?

  • @PaulFisher
    @PaulFisher2 жыл бұрын

    In order to make the transition truly seamless you should have also ripped off your festival wristband. What an oversight!

  • @git-tauseef
    @git-tauseef2 жыл бұрын

    We would love to have a more systematic video uploads like a series about CTF what you do how you studied ,good resources , just started with picoCTF but unable to solve many crypto , binary like things .... Reply much appreciated ❣️❣️ thanks

  • @ThisIsTheInternet
    @ThisIsTheInternet2 жыл бұрын

    English CC @ 8:08 "[todo checj recording]", just FYI

  • @talalkalai8748
    @talalkalai87482 жыл бұрын

    what would u recommend as the best resource for structured learning all the headers you mentioned, and in-depth http in general ? (something like your THE BEST ON THE INTERNET, HANDS DOWN binary playlist. (am aware of your web hacking playlist))

  • @gk_eth
    @gk_eth2 жыл бұрын

    Woww!! Simply loved the quality of the content in this video! looking forward for much more quality content from you ..✌️✌️

  • @renakunisaki
    @renakunisaki2 жыл бұрын

    You need to proofread your captions. The tags got eaten, and at one point there's a todo note.

  • @Ormaaj
    @Ormaaj2 жыл бұрын

    Yep all good stuff. High-level application level stuff obviously. A ton of that (HSTS, OCSP stapling, HPKP) is largely kludge to mitigate SNI and (much later) ECH coming along far too late with far to much legacy baggage to fully deploy. So we pushed a bunch of workarounds up to the application layer and hope that all of them together are enough to cover our asses long enough for the legacy to become irrelevant. Yep this all requires context and it's always complicated context. CORS also makes a bit more sense if you know it historically came around in part as a means of permitting cross-site websocket access (it's a prerequisite really). Both partly a response to uglier "AJAX" type hacks that were required before there was any other means of "inter-tab" communication, that nobody needs to care about anymore.

  • @allslash7540
    @allslash7540 Жыл бұрын

    Is there any security vulnerability for server if it exposes the content disposition header?

  • @887310954
    @8873109542 жыл бұрын

    one of the most under estimated security issues, which actually can help a lot

  • @arm2644
    @arm26442 жыл бұрын

    Can you please talk about the Expect-CT security header and how it is set right! I cannot find any true worthy information of this header and how it is set right in apache servers!

  • @_clavita
    @_clavita2 жыл бұрын

    i work in a mobile app (that doesnt use webview) and we had a dude reporting to us that we were missing the HSTS, x-frame-options, and others headers that we didnt need!!!! thanks to him we had to delay the production date and it endend ofc being a false positive -_-

  • @soniablanche5672
    @soniablanche56722 жыл бұрын

    img and form tags ignore CORS policy for backward compatibility I'm assuming ?

  • @bjorndunderbeck
    @bjorndunderbeck2 жыл бұрын

    a non related question buut you guys might be able to help me?? my mum in hospital post stroke has wrongly entered her pin to open her ipad so now it is so locked it doesnt even appear when I plug it into her pc. I get how it is supposed to protect a stolen ipad being accessed but I dont understand why her laptop cant talk to it. any ideas on how to get to the pin input stage again? at the moment its just an expensive coaster. oh I know the pin but theres no way to talk to the ipad, it turns on and thats it.

  • @qm3ster
    @qm3ster Жыл бұрын

    Is there a reason not to set "Secure" and "HttpOnly" on all my cookies?

  • @jan_en_ik
    @jan_en_ik2 жыл бұрын

    Are you going to make a video about the mc server research?

  • @LiveOverflow

    @LiveOverflow

    2 жыл бұрын

    Yes, of course. But it will be a few weeks/months

  • @jan_en_ik

    @jan_en_ik

    2 жыл бұрын

    I was also interested why a java object was logged while a normal leave message just logs the name.

  • @LiveOverflow

    @LiveOverflow

    2 жыл бұрын

    Mh I don’t know what exactly you mean. If you send me an email with your question I will check it out :)

  • @Root-uno6nw

    @Root-uno6nw

    2 жыл бұрын

    @@LiveOverflow I think he means the logj4 vulnerability

  • @TimLF
    @TimLF2 жыл бұрын

    Just feeding the algorithm here.

  • @Thiago1337
    @Thiago13372 жыл бұрын

    I like your shirt, where did you buy it?

  • @mattsionkowski
    @mattsionkowski2 жыл бұрын

    I found a lack of X-Frame-Options tag and thought I conquered the world. It took tens of hours before I could turn it into anything usable...

  • @shaheenfazim
    @shaheenfazim2 жыл бұрын

    Is password input vulnerable to clickjacking considered a vulnerability by Google.

  • @cuty5372
    @cuty53722 жыл бұрын

    Once you try to deploy an API-Endpoint, you know to hate those headers... Wait, the frontend code that talks to my api works, bit only on Firefox? Because Chrome acts slightly differently with no CORS headers set? Just plain annoying.

  • @alvionjames5925
    @alvionjames59252 жыл бұрын

    Hello can you please do a video about http smuggling request 🙏🙏

  • @sobertillnoon
    @sobertillnoon2 жыл бұрын

    Is this your first time having glasses? I think the ones you chose are nice looking.

  • @tech3425
    @tech3425 Жыл бұрын

    In other words "You don't have to lock your door if there's nothing valuable inside the house"

  • @RoterFruchtZwerg
    @RoterFruchtZwerg2 жыл бұрын

    While I do agree with most, I think with HSTS you missed some important points. You kinda made it look like HSTS is not really important and sites that use https are fine not setting it. But here I disagree. Setting HSTS is important. We can argue if it's bug bounty level important though... First of all, "Browsers do it anyways" is not correct. Browsers will access the site via http if you tell them to. Your experiment was kinda misleading. Your proxy log didn't show a second http request because the browser served the redirect from its cache, not because it prefers https in any way. (devtools will show you it still does an http request) The cache can simply be circumvented by adding query parameters or simply requesting an URL you didn't load before. HSTS works for the complete domain (and subdomains!) and is kept even if you clear the cache, while your example of "browser does it anyways" relies on the browser cache, caching headers, correct redirect type and only works for resources you already visited explicitly (exact URL). Also, as you stated, HSTS preload exists. While HSTS kinda requires TOFU (Trust on first use), HSTS preload does not. But even without preload, HSTS does a good job for sites that are frequently used by users (e.g. all sites with logins etc). Not setting HSTS leaves your site open to MITM attacks (which are not uncommon on open wifis etc), while setting it does a good job in preventing them. And in case someone tries to MITM an https request, it will also prevent the user from ignoring the warning and clicking "visit anyways" which probably some would do otherwise. So while some security headers really have no benefit at all in some cases, HSTS always increases security.

  • @shinjihirako8598

    @shinjihirako8598

    2 жыл бұрын

    excellent points !

  • @_clavita

    @_clavita

    2 жыл бұрын

    thanks! so much learning today :P

  • @effsixteenblock50

    @effsixteenblock50

    2 жыл бұрын

    You can enforce HTTPS server-side.

  • @RoterFruchtZwerg

    @RoterFruchtZwerg

    2 жыл бұрын

    @@effsixteenblock50 you cannot. As long as the client accepts http a MITM can proxy http to https. Only the client can enforce https and that's why HSTS is important.

  • @effsixteenblock50

    @effsixteenblock50

    2 жыл бұрын

    @@RoterFruchtZwerg You're talking about proxying with a tool such as Burp with an installed cert? I know some try to enforce SSL with javascript (a joke - I've had crappy shared hosting providers recommend it). Or are you saying even if SSL is enforced server-side, the client can force a downgrade to http?

  • @eschoepis
    @eschoepis2 жыл бұрын

    1-2 year im, I am already hearing google's product mgmt opinion in the intro

  • @yy6u
    @yy6u2 жыл бұрын

    lol the quality difference, its almost as you can tell it been filmed months before :)

  • @KuopassaTv
    @KuopassaTv2 жыл бұрын

    Also such headers can be per page, not site-wide 😉

  • @hashimmirdad8678
    @hashimmirdad86782 жыл бұрын

    what is the exact difference between ( HSTS, secure attribute)?

  • @huntit4578

    @huntit4578

    2 жыл бұрын

    4 This strategy protects against passive eavesdropping by making it hard for an attacker to trick your user into using something other than SSL to access your site. It also probably ensures that any bookmarks users store will point to the https URLs, which is good. However, HSTS still offers advantages in the event of a man-in-the-middle attack. The core of the problem that HSTS tries to solve is that the browser doesn't know whether a given site should be using SSL or not. And most users don't explicitly try SSL first; if they type in a URL, they generally go to the non-SSL http site first, and usually they're just following links. If an attacker can trick your user into going to your site via an http URL and can sit in the middle of the user's traffic (by being their wireless AP, for example), that attacker can launch a man-in-the-middle attack against your site by proxying the user's traffic to your site and presenting the site to the user without SSL (this is a type of downgrade attack). Since the user won't see SSL, their browser won't recognize that the attacker doesn't have a valid certificate for your site and that they're not connecting to your site directly. (A more complicated approach would be to intercept the SSL traffic and present a self-signed or otherwise invalid certificate for your site, but this will normally result in browser warnings.) In this scenario, redirecting non-SSL users to SSL or setting the secure flag on cookies doesn't actually help you very much. The man-in-the-middle attacker will be connecting to your SSL site (and proxying the user's actions to it), and will just remove the secure flag from your cookies when passing them along to the user. The attacker can, of course, also remove the HSTS header. The point of the HSTS protocol, however, is that if the user had ever successfully gone directly to your site in the past, their browser will remember that your site sent HSTS. If they then later connect to your site and find that it's not using SSL or that the browser can't verify the certificate, the browser will throw an error and refuse to continue. This will prevent the attacker from downgrading your site to non-SSL if the browser supports HSTS and has your site recorded as requiring SSL.

  • @angeloanan
    @angeloanan2 жыл бұрын

    Subtitle broke at 8:08 :

  • @ocean3323
    @ocean33232 жыл бұрын

    F for old MDN theme

  • @cadeathtv
    @cadeathtv2 жыл бұрын

    hope VA tool guys understand this, they should not be scaring people because of a VA results without understanding

  • @Valery0p5
    @Valery0p5 Жыл бұрын

    The thumbnail xD

  • @el7440
    @el7440 Жыл бұрын

    its all about the context baybee

  • @takeshikovacs667
    @takeshikovacs6672 жыл бұрын

    Missing HTTP Security Headers is out of scope 99% of Bug Bounty Programs. It's more a thing about penetration testing reported as good practice information depending of the context. But yeah I agree that many HTTP headers are useless like the X-XSS-Protection (because not implemented in any browser) while some are useful like HSTS or CSP. Yeah if there is an XSS and there is HTTPOnly flag you can still then an XHR but you can't leak the cookie. So if the attacker has only a reflected XSS and not a stored one he will have a far less permanent access. PS: I know the title is just for clickbait

  • @LiveOverflow

    @LiveOverflow

    2 жыл бұрын

    yeah it's out of scope, and still there are many reports about it. So this video hopefully helps those people understand why it's usually not rewarded ;) But what's clickbait about the title? The video is about HTTP Security Headers. That's literally the most accurate boring title lol

  • @takeshikovacs667

    @takeshikovacs667

    2 жыл бұрын

    @@LiveOverflow I found the "Bug Bounty Tips" clickbaity. Lot of vloger use the word "bug bounty" as a shiny word when it's only general security not specific to bug bounty. The title could have been "HTTP Security Headers real impact" or "HTTP Security Headers - What not to report on Bug Bounty" if you really wanted to use the term "bug bounty". But as I said it is always out of scope of bug bounty so putting it in the title is weird, the title could have been "HTTP Security Headers - Pentest tips" and just saying a parenthesis : HTTP Security Headers are out of scope of BB programs 99% of the time so we'll focus on pentest. But nowaday "bug bounty" is such a trendy word where youg people think they can become rich with it that youtuber use it for every infosec video to get more clicks.

  • @reduced1420

    @reduced1420

    2 жыл бұрын

    bro the video was literally made for google to give tips to people using their bug bounty program, shut up lmaoo

  • @x3ICEx
    @x3ICEx2 жыл бұрын

    8:08 [todo checj recording]

  • @ari_archer
    @ari_archer2 жыл бұрын

    good soup

  • @ahmedsaadsabit1749
    @ahmedsaadsabit17492 жыл бұрын

    First comment yes

  • @aviationbutterr
    @aviationbutterr11 ай бұрын

    🏈🏈🏈🏈🏈🏈

  • @the_hanged_clown
    @the_hanged_clown2 жыл бұрын

    2:36 wait....youtube isn't google's website?

  • @dummyevil7638
    @dummyevil76382 жыл бұрын

    You have changed.

  • @ninostephen
    @ninostephen2 жыл бұрын

    I'm going to post this in our Vulnerability Management Team group. I hate it when they make us report petty header issues without checking the context. I might get kicked for it. But fuck it. - _ -

  • @georgehammond867
    @georgehammond8672 жыл бұрын

    somebody is uploading buggy ubuntu 20.04 on my pc al the time, this comes from Ubuntu HQ. kernel version 5.13.0-35-generic. very bad indeed.

  • @GoBzi
    @GoBzi2 жыл бұрын

    Cookie missing secure flag, server has only 443 open

  • @nullvoidpointer

    @nullvoidpointer

    2 жыл бұрын

    MiTM.

  • @mmmdyarcavadl9004

    @mmmdyarcavadl9004

    2 жыл бұрын

    @@nullvoidpointer is it possible mitm when you are in different network? I mean mitm to public ip

  • @myzel394
    @myzel3942 жыл бұрын

    13:53 yeah then when should you use HttpOnly? You basically said that the flag is completely useless.

  • @NorbertdeRooy
    @NorbertdeRooy2 жыл бұрын

    I really dislike the HSTS header, I mean why is it a header and not a DNS record, it would be so much simpler and we could disable http all together if it was simply a DNS record.

  • @ELYESSS
    @ELYESSS2 жыл бұрын

    Should've also changed shirt

  • @fn-fn-fn
    @fn-fn-fn2 жыл бұрын

    where's the penguin?

  • @oedebiri
    @oedebiri2 жыл бұрын

    enough people do this that google paid to commission a video discouraging them

  • @mikeyz8775
    @mikeyz87752 жыл бұрын

    The line is discussing n theory is a crime

  • @TheWoosh
    @TheWoosh2 жыл бұрын

    The whole video is an advertisement?

  • @LiveOverflow

    @LiveOverflow

    2 жыл бұрын

    I explained it in the beginning what the deal with this video is. Also german regulations requires to properly label it in the video as well.

  • @yy6u

    @yy6u

    2 жыл бұрын

    yes and no, see his reply, i suggest seeing tom scott video about exactly this kind of disclaimer, its explained there

  • @tommasobarbolani2147
    @tommasobarbolani21474 ай бұрын

    but of * cors *

  • @mnovagwati8744
    @mnovagwati87442 жыл бұрын

    Isai neshona

  • @RaduStancaOnline
    @RaduStancaOnline2 жыл бұрын

    How can we get you to iron your shirts?

  • @x7themm

    @x7themm

    2 жыл бұрын

    Hack him

  • @1e1001

    @1e1001

    2 жыл бұрын

    @@x7themm hack his iron

  • @AmgadEmad
    @AmgadEmad2 жыл бұрын

    All this information is mistaken and not technical gaps and for this reason, this is not considered within the bug buny HANTING system, which is presented by Google