video thumbnail 20:36
Reinventing Web Security

2023-11-20

[public] 20.0K views, 2.30K likes, dislikes audio only

channel thumbLiveOverflow

Follow me down the rabbit hole into the wonderful world of IT security.

Buy my terrible font (ad): https://shop.liveoverflow.com

Learn hacking (ad): https://hextree.io

Related Videos:

/youtube/video/866olNIzbrk

/youtube/video/lKzsNp4AveY

Tweets:

https://twitter.com/LiveOverflow/status/1720734431659376995

https://twitter.com/LiveOverflow/status/1720799912181284864

https://twitter.com/LiveOverflow/status/1721493232310214910

Understanding the Risks of Stolen Credentials: https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/46437.pdf

Chapters:

00:00 - Intro

00:40 - Security Terminology

01:38 - Direct Database Access

03:40 - Introducing a Security Boundary

05:36 - Typical Web Security Vulnerabilities

07:03 - Clear-text Passwords in Database

09:28 - Security Weakness vs. Vulnerability

11:05 - Effective Mitigations

13:03 - Useless Mitigations

16:37 - Summary: Vulnerability vs. Weakness

19:00 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow

→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/

→ Streaming: https://twitch.tvLiveOverflow/

→ TikTok: https://www.tiktok.com/@liveoverflow_

→ Instagram: https://instagram.com/LiveOverflow/

→ Blog: https://liveoverflow.com/

→ Subreddit: https://www.reddit.com/r/LiveOverflow/

→ Facebook: https://www.facebook.com/LiveOverflow/


Intro
/youtube/video/LxUAnZY_08o?t=0
Security Terminology
/youtube/video/LxUAnZY_08o?t=40
Direct Database Access
/youtube/video/LxUAnZY_08o?t=98
Introducing a Security Boundary
/youtube/video/LxUAnZY_08o?t=220
Typical Web Security Vulnerabilities
/youtube/video/LxUAnZY_08o?t=336
Clear-text Passwords in Database
/youtube/video/LxUAnZY_08o?t=423
Security Weakness vs. Vulnerability
/youtube/video/LxUAnZY_08o?t=568
Effective Mitigations
/youtube/video/LxUAnZY_08o?t=665
Useless Mitigations
/youtube/video/LxUAnZY_08o?t=783
Summary: Vulnerability vs. Weakness
/youtube/video/LxUAnZY_08o?t=997
Outro
/youtube/video/LxUAnZY_08o?t=1140