Reinventing Web Security

Channel:
Subscribers:
879,000
Published on ● Video Link: https://www.youtube.com/watch?v=LxUAnZY_08o



Duration: 20:36
37,458 views
2,215


Follow me down the rabbit hole into the wonderful world of IT security.

Buy my terrible font (ad): https://shop.liveoverflow.com
Learn hacking (ad): https://hextree.io

Related Videos:
https://www.youtube.com/watch?v=866olNIzbrk
https://www.youtube.com/watch?v=lKzsNp4AveY

Tweets:
https://twitter.com/LiveOverflow/status/1720734431659376995
https://twitter.com/LiveOverflow/status/1720799912181284864
https://twitter.com/LiveOverflow/status/1721493232310214910

Understanding the Risks of Stolen Credentials: https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/46437.pdf

Chapters:
00:00 - Intro
00:40 - Security Terminology
01:38 - Direct Database Access
03:40 - Introducing a Security Boundary
05:36 - Typical Web Security Vulnerabilities
07:03 - Clear-text Passwords in Database
09:28 - Security Weakness vs. Vulnerability
11:05 - Effective Mitigations
13:03 - Useless Mitigations
16:37 - Summary: Vulnerability vs. Weakness
19:00 - Outro

=[ ❀ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
vulnerability
risks
weakness
what is a vulnerability?
what is a security risk?
security weakness
cybersecurity definitions
alice in wonderland
alice in hackerland
humpty dumpty
word definitions