2023-11-20
[public] 20.0K views, 2.14K likes, dislikes audio only
Follow me down the rabbit hole into the wonderful world of IT security.
Buy my terrible font (ad): https://shop.liveoverflow.com
Learn hacking (ad): https://hextree.io
Related Videos:
Tweets:
https://twitter.com/LiveOverflow/status/1720734431659376995
https://twitter.com/LiveOverflow/status/1720799912181284864
https://twitter.com/LiveOverflow/status/1721493232310214910
Understanding the Risks of Stolen Credentials: https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/46437.pdf
Chapters:
00:00 - Intro
00:40 - Security Terminology
01:38 - Direct Database Access
03:40 - Introducing a Security Boundary
05:36 - Typical Web Security Vulnerabilities
07:03 - Clear-text Passwords in Database
09:28 - Security Weakness vs. Vulnerability
11:05 - Effective Mitigations
13:03 - Useless Mitigations
16:37 - Summary: Vulnerability vs. Weakness
19:00 - Outro
=[ ❤️ Support ]=
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
2nd Channel: https://www.youtube.com/LiveUnderflow
=[ 🐕 Social ]=
→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/